0% found this document useful (0 votes)
18 views

Operating System

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views

Operating System

Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 65

Operating Systems

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
The Purpose of an Operating System
▪ The operating system (OS) controls almost all
functions on a computer.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
Characteristics of an Operating System
▪ Multi-user – Two or more users have individual accounts that
allow them to work with programs and peripheral devices at the
same time.

▪ Multitasking – The computer is capable of operating multiple


applications at the same time.

▪ Multiprocessing – The operating system can support two or


more CPUs.

▪ Multithreading – A program can be broken into smaller parts


that are loaded as needed by the operating system. Multithreading
allows individual programs to be multitasked.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
Basic Function of an Operating System
▪ All computers rely on an operating system (OS) to
provide the interface for interaction between users,
applications, and hardware.
▪ The operating system boots the computer and
manages the file system.
▪ The operating system has four main roles:
• Control hardware access
• Manage files and folders
• Provide user interface
• Manage applications

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
The Types of User Interface
▪ Command Line Interface ▪ Graphical User Interface
(CLI): The user types (GUI): The user interacts
commands at a prompt. with menus and icons.

Most operating systems include both a GUI and a CLI.


Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
Processor Architecture
▪ 32-bit Windows Operating System and x86 Processor
Architecture
• Capable of addressing 4 GB of RAM
• x86 uses a Complex Instruction Set Computer (CISC)
• x86 processors use fewer registers than x64 processors
▪ 64-bit Windows Operating System and x64 Processor
Architecture
• Capable of addressing 128+ GB of RAM
• Enhanced performance for memory management
• Additional security features
• x64 architecture is backward compatible with x86
• Process much more complex instructions at a much higher rate

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
Types of Operating Systems
Desktop Operating Network Operating
System System
• Supports a single user • Supports multiple users

• Runs single-user • Runs multi-user


applications applications

• Shares files and folders • Robust and redundant

• Shares peripherals • Provides increased security

• Used on a small network • Used on a network

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
Types of Operating Systems
▪ Desktop operating systems:
• Microsoft Windows: Windows 7
• Macintosh: Mac OS X
• Linux
• UNIX

▪ A desktop OS has the following


characteristics:
• Supports a single user
• Runs single-user applications
• Shares files and folders on a small
network with limited security

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
Network Operating Systems (NOS)
▪ Common NOS include:
• Microsoft Windows Server
• Linux
• UNIX
• Mac OS X Server

▪ NOS has the following characteristics:


• Supports multiple users
• Runs multi-user applications
• Robust and redundant
• Provides increased security compared to desktop operating
systems

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
Identify Minimum Hardware Requirements
▪ Customer may need to upgrade or purchase additional
hardware to support the required applications and OS.
▪ A cost analysis will indicate if purchasing new
equipment is a better idea than upgrading.
▪ Possible hardware upgrades:
•RAM capacity
•Hard drive size
•CPU
•Video card memory and speed
•Motherboard

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
Hardware Compatibility
▪ Most operating systems have an HCL.
▪ HCLs can be found on the manufacturer's website.
▪ HCL includes list of hardware that is known to work with
the operating system.
▪ Use Microsoft Compatibility Center for Windows 7 and
Vista.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
Installing the Operating System
▪ Reasons to perform a clean installation of an OS:
•When a computer is passed from one employee to another.
•When the operating system is corrupted.
•When the primary hard drive is replaced in a computer .

▪ Before performing a clean installation:


•Back up all data first.
•Explain to the customer that existing data will be erased.
•Confirm that all needed data has been successfully
transferred.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
Hard Drive Setup Procedures
▪ Operating system setup methods:
•Install an OS over a network from a server.
•Install from OS files stored on CDs or DVDs.
▪ Partitioning and Formatting:
•Hard drive must be logically divided (partitioned).
•File system must be created on the hard drive.
•During the installation phase, most operating
systems will automatically partition and format the
hard drive.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
Hard Drive Setup Procedures
A technician should understand the process related to
hard drive setup.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
Terms used when referring to hard drive
setup:

▪ Primary partition – This partition is usually the first


partition. A primary partition cannot be subdivided into
smaller sections. There can be up to four partitions per
hard drive.
▪ Active partition – This partition is the partition used by
the operating system to boot the computer. Only one
primary partition can be marked active.
▪ Extended partition – This partition normally uses the
remaining free space on a hard drive or takes the place
of a primary partition. There can be only one extended
partition per hard drive, and it can be subdivided into
smaller sections called logical drives.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
Terms used when referring to hard drive
setup:

▪ Logical drive – Is a section of an extended partition


that can be used to separate information for
administrative purposes.
▪ Formatting – This process prepares a file system in a
partition for files to be stored.
▪ Track – A track is one complete circle of data on one
side of a hard drive platter. A track is broken into
groups of 512 bytes, called sectors.
▪ Drive mapping – Drive mapping is a letter assigned to
a physical or logical drive.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
Hard Drive Formatting
▪ The first portion of the installation process deals with
formatting and partitioning the hard drive.
▪ The second portion prepares the disk to accept the file
system.
▪ The file system provides the directory structure that
organizes the user's operating system, application,
configuration, and data files.
▪ Examples of file systems:
•The New Technology File System (NTFS) - Supports
partition sizes up to 16 exabytes
•The FAT32 file system - Supports partition sizes up to 2 TB.
Used by Windows XP and earlier OS versions.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
Install the Operating System
▪ When a computer boots up with the Windows installation CD, the
Windows installation process starts with three options:
• Install now - Sets up and installs the Windows OS.
• What to know before installing Windows - Opens Help.
• Repair your computer - Opens the System Recovery Options.
▪ Under Install now three options are available:
• Upgrade - Upgrades Windows but keeps your current files, settings,
and programs. You can use this option to repair an installation.
• Custom (advanced) - Installs a clean copy of Windows in your choice
of location and allows you to change disks and partitions. It is also
known as a clean installation.
• Quit - Exits Setup.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
Custom Installation Options – Disk Cloning
With Microsoft System Preparation
▪ Follow these steps for disk cloning:
1. Create a master installation on one computer.
2. Run Sysprep.
3. Create a disk image of the configured computer using third-
party disk-cloning software.
4. Copy the disk image onto a server.
▪ When the destination computer is booted:
• A shortened version of the Windows setup program runs.
• Setup installs drivers, creates user accounts, and
configures network settings.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
Custom Installation Options
▪ Windows has several different types of custom
installations.
• Network Installation - Requires all setup files to be copied to a
network server.
• Preboot Execution Environment (PXE) Installation - Uses a
PXE boot program and a client’s network card to access the
setup files.
• Unattended Installation - Uses a network distribution point that
uses an answer file.
• Image-based Installation - Uses Sysprep and a disk-imaging
program, that copies an image of the OS directly to the hard
drive with no user intervention.
• Remote Installation - Downloads the installation across the
network.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
Startup Modes
Pressing the F8 key during the boot process opens the
Windows Advanced Startup Options menu, which allows
you to select how to boot Windows.
▪ Safe Mode – Starts Windows but only loads drivers for basic
components, such as the keyboard and display.
▪ Safe Mode with Networking Support – Starts Windows
identically to Safe Mode and also loads the drivers for network
components.
▪ Safe Mode with Command Prompt – Starts Windows and loads
the command prompt instead of the GUI interface.
▪ Last Known Good Configuration – Enables a user to load the
configurations settings of Windows that was used the last time that
Windows successfully started. It does this by accessing a copy of
the registry that is created for this purpose.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
Disk Operating System (DOS)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
What is DOS, and
Why Learn About it?
▪ Microsoft developed (DOS), in
1981. DOS was designed for
the IBM Personal Computer
▪ DOS is a collection of programs
and commands used to control
the overall computer operation
in a disk-based system
▪ Three sections make up DOS:
Boot files
File management files
Utility files

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23
What is DOS, and
Why Learn About it?
▪ DOS is useful as a troubleshooting aid when Windows
will not boot. It allows the hard drive to be accessed
without the GUI and provides the ability to run
troubleshooting or diagnostic programs.
DOS is a command line operating system, it is not user-
friendly
DOS can only run one program at a time.
DOS can only run small programs and has memory
limitations
DOS is an essential tool for IT professionals and is used
extensively for troubleshooting

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 24
The DOS File Structure
▪ A file is simply a block of logically
related data that is given a single
name and treated as a single
unit.
▪ Examples include programs,
documents, drawings and other
illustrations, sound files, etc.
▪ The common attributes for DOS
files include:
Hidden File
Read Only
Archive (backup) status
System File

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 25
The DOS File Structure
▪ Hard drives organize the disk into directories and
subdirectories. The main directory is known as the
root directory.
▪ All other directories, if they exist, then radiate (branch
out) from the root directory, similar to the branches of
a tree.
▪ Locating any given file requires knowledge of the
drive, directory, and subdirectory in which the file is
found.
▪ The first hard drive in most computer systems is
labeled “C”.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 26
Overview of Basic DOS Commands
▪ Basic commands are
generally internal and
more advanced
commands are usually
external.
▪ The command line is
the space immediately
following the DOS
prompt, C:\> where C:\
represents the hard
disk drive root
directory, and ">" is
known as the prompt.
▪ A switch is added to the
command by adding a
space, a forward-slash
(/), and a single letter.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 27
The Windows Registry
▪ Recognized by distinctive names, beginning with
HKEY_
▪ Every setting in Windows is stored in the registry
▪ Changes to the Control Panel settings, File
Associations, System Policies, or installed software are
stored in the registry
▪ Each user has their own section of the registry
▪ The Windows logon process uses the registry to set the
system to the state that it was in the last time the user
logged in

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 28
The Windows Registry Files

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 29
The NT Kernel and Security Authority
▪ Next, the NT kernel, NTOSKRNL.EXE, takes over
It starts the login file, WINLOGON.EXE
That program starts the Local Security Administration file,
LSASS.EXE (Local Security Administration)
LSASS.EXE is the program that displays the XP welcome
screen
▪ Heart of the operating system
▪ There are few differences between the Windows XP
and the Windows 2000 boot process

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 30
Manipulating Operating System Files
▪ The registry is a database that contains information and settings
for all of the hardware, software, users and preferences. REGEDIT
allows users to edit the registry.
▪ REGEDIT (System Registry)
▪ GPEDIT.MSC (Group Policy)

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 31
Manipulating Operating System Files
▪ After you have installed Windows, you can use
MSCONFIG for post-installation modifications:
This boot configuration utility allows you to set programs that
will run at startup, and to edit configuration files

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32
Manipulating Operating System Files
▪ The registry is a database that contains information and
settings for all of the hardware, software, users and
preferences. REGEDIT allows users to edit the registry.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 33
Multiboot Procedures
▪ Multiple OS can be installed on one computer
▪ To create a dual-boot system in Microsoft Windows:
• Must have more than one hard drive or a hard drive with more than
one partition.
• Install the oldest OS on the primary partition or the hard drive
marked with an active partition.
• Install the second OS on the second partition or hard drive.
• The boot files are automatically installed in the active partition.
▪ During the dual-boot process:
• The BOOTMGR file indicates that more than one OS is present.
• You are prompted to choose the OS that you want to load.
• NOTE: In Windows XP, the BOOT.INI file fills the role of the
BOOTMGR file.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
Disk Management Utility
▪ This utility can be to used to complete the following
tasks:
• View drive status
• Extend partitions
• Split partitions
• Assign drive letters
• Add drives
• Add arrays
▪ To access the Disk Management utility in Windows 7 and Windows
Vista, use the following path:
Select Start > right-click Computer > Manage > select Disk
Management

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
Directory Structures
▪ The root level of the Windows directory structure, the
partition, is usually labeled drive C.
• Contains a set of standardized directories, called folders, for the
operating system, applications, configuration information, and
data files.
• Directories may contain subdirectories. Subdirectories are
commonly called subfolders.

▪ Drive Mapping - letters are used to name physical or


logical drives.
▪ Mounting a Volume - mapping a drive to an empty
folder on a volume. Mounted drives are assigned drive
paths instead of letters.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
File Extensions and Attributes
▪ Windows file system naming conventions:
•Maximum of 255 characters may be used.
•Characters such as a period (.) or a slash (\ /) are not allowed.
•An extension of three or four letters is added to the filename to
identify the file type.
•Filenames are not case sensitive.
▪ Windows filename extension examples:
•.docx- Microsoft Word
•.txt - ASCII text only
•.jpg - graphics format
•.pptx - Microsoft PowerPoint
•.zip - compression format
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
Windows Desktop
▪ A GUI provides graphical representations of all the files,
folders, and programs on a computer.
▪ Windows 7 and Windows Vista have a default theme called Aero.
Aero has translucent window borders, numerous animations, and
icons that are thumbnail images of the contents of a file
▪ Windows 7 includes the following new Aero features:
• Shake -Minimize all windows that are not being used by clicking the title bar
of one window and shaking the mouse.
• Peek - View the icons and gadgets on the desktop by pointing the mouse at
the right edge of the taskbar to make all windows transparent.
• Snap - Resize a window by dragging it to one edge of the screen.
▪ Gadgets -Windows 7 and Windows Vista users can place Gadgets
on the desktop. Gadgets are small applications such as games,
sticky notes, or a clock.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38
Windows Desktop Properties

▪ To customize the desktop in Windows 7 and


Windows Vista, right-click anywhere on the
desktop and choose Personalize to:
•change desktop icons, mouse pointers, and
your account picture.
•modify a theme’s background, color, sound,
and screensaver.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39
Windows Desktop, Tools, and Applications

▪ To customize the Start Menu or the Taskbar,


right-click it and choose Properties.
▪ The Task Manager allows you to view all
applications that are running and to close any
applications that have stopped responding:
•CTRL-ALT-DEL and select Start Task Manager.
•right-click the taskbar and select Start Task
Manager.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40
Computer and Windows Explorer
▪ Computer allows access to the various installed drives (My Computer
in Windows XP)
▪ Windows Explorer - used to navigate the file system includes:
• Search box - Access previous searches. Filter search results.
• New folder button - Create new folders with one click.
• Arrange by - Organize items easily according to different criteria.
• Preview pane button - Turn the preview pane on or off.
▪ Applications can be launched in several ways:
• Click the application on the Start menu or Taskbar.
• Double-click the application shortcut icon on the desktop.
• Double-click the application executable on the desktop or in Windows
Explorer.
• Launch the application from the Run window or command line.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41
Windows Libraries
▪ Allows for easy organization of content from storage
devices on local computer and network.
▪ Are virtual folders that present content from different
locations within the same view.
▪ Include four default Libraries - Documents, Music, Pictures,
and Videos.
▪ To add a file to a library, right-click it, select Include in
library, and then choose which library to add the item.
▪ To create a new library, open a folder and select Include in
Library > Create new library

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 42
Control Panel Utilities
▪ System and Security - To configure system and security settings
▪ Network and Internet - To configure network connection types
▪ Hardware and Sound - To configure devices connected to the
computer and settings for sound
▪ Programs - To remove, change, and repair applications
▪ User Accounts and Family Safety - To create and remove user
accounts and set up parental controls
▪ Appearance and Personalization - To control the look and feel of
the Windows GUI
▪ Clock, Language, and Region - To specify location and language
▪ Ease of Access - To configure Windows for vision, hearing, and
mobility needs
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 43
User Accounts
▪ User Accounts Utility:
•Create a user account.
•Manage password, change picture, change account
name and type, manage another account, and
change User Account Control (UAC) settings.
•Start > Control Panel> select User Accounts
▪ User Account Control (UAC):
•Monitors programs on a computer and warns users
when an action might present a threat to the system.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 44
Windows Firewall
▪ The Windows Firewall Utility implements a security
policy by adjusting the following settings:
•Allow a program or feature through Windows Firewall
•Change notification settings
•Turn Windows Firewall on or off
•Restore defaults
•Advanced settings
▪ Start > Control Panel > Windows Firewall.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 45
The System Utility
▪ View basic system information, access tools and
configure advanced settings including:
• Computer Name -View or modify the name and workgroup
settings for a computer, as well as change the domain or
workgroup.
• Hardware - Access the Device Manager or adjust the device
installation settings.
• Advanced -Configure settings for performance, user profiles,
startup, and recovery.
• System Protection - Access System restore and configure
protection settings.
• Remote -Adjust settings for Remote Assistance and Remote
Desktop.

▪ Start > Control Panel > System


Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 46
Device Manager
▪ View settings for devices
in the computer and:
• Update a driver - Change
the currently installed driver.
• Roll back a driver - Change
the currently installed driver
to the previously installed
driver.
• Uninstall a driver
• Disable a device
• Start > Control Panel >
System > Device Manager

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 47
Computer Management Console
▪ Provides utilities to manage
your computer including:
• Task Scheduler
• Event Viewer
• Shared Folders
• Local Users and Groups
• Performance
• Device Manager
• Disk Management
▪ Start > Control Panel >
Administrative Tools > Computer
Management

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 48
Event Viewer
▪ Logs a history of events
regarding applications,
security, and the system.
▪ These log files are a
valuable troubleshooting
tool.
▪ Start > Control Panel >
Administrative Tools >
Event Viewer

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 49
Services
▪ Services are executable programs that require little or no user
input.
▪ Optimize the performance of operating systems
▪ Are a type of application that runs in the background and waits for
requests
Only necessary services should be started
Services may be enabled if clients need them
Services may be stopped for troubleshooting purposes
▪ Four settings, or states, used to control services:
Automatic - Starts when the PC starts
Manual - Administrator must enable or disable the service
Disabled - Administrator may disable or stop a service
Stopped - The state of a service that has been disabled

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 50
Services and Performance Monitor
Services:
•Start, stop, or disable services.
•Start > Control Panel >
Administrative Tools > Services.

Performance Monitor:
•Record performance data and
configure alerts.
•Start > Control Panel >
Administrative Tools > Performance
Presentation_ID Monitor 51
© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Disk Defragmenter and Disk Error-
Checking Tool
▪ Disk Defragmenter makes files on the hard drive
contiguous and speeds up the reading of files.
▪ To access the Disk Defragmenter in Windows 7, select
Start > All Programs > Accessories > System Tools
> Disk Defragmenter.
▪ CHKDSK checks the integrity of files and folders by
scanning the hard disk surface for physical errors.
▪ Access CHKDSK from within the Disk Defragmenter or
enter CHKDSK in command line to detect and repair
disk errors.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 52
System Information Tool
▪ Collect and display information about local and remote
computers
▪ To access the System Information tool, Start > All
Programs > Accessories > System Tools > System
Information

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 53
Remote Desktop

▪ Remote Desktop
•View and control a computer from a remote location.
▪ Remote Assistance
•Also allows user to view what the remote technician
is doing to the computer.
▪ To access in Windows 7 or Windows Vista, select Start
> All Programs > Accessories > Remote Desktop
Connection

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 54
Command-Line Tools

▪ Start > Type Cmd in the search box > Press Enter

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 55
Run Line Utility
▪ Enter commands to configure settings and system
modifications.
▪ To access in Windows 7 select Start > Search box > Type
run > Enter.
▪ Common Commands
• CMD –Used to execute command line programs.
• DXDIAG - Displays details for all DirectX components and drivers.
• EXPLORER – Opens Windows Explorer.
• MMC - Opens the Microsoft Management console (MMC).
• MSCONFIG - Opens the System Configuration Utility.
• MSINFO32 - Displays complete system summary of the computer.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 56
Virtualization

▪ Host machine uses its system resources to host a


virtual machine.
▪ Hosting a virtual machine allows users to access the
functionality and resources provided by an OS that is
not on the local PC.
▪ Provides access to applications, file-sharing services,
and other productivity tools.
▪ Users can further increases the functionality of their
system by running multiple virtual machines.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 57
Virtualization

▪ The software that creates and manages a virtual


machine on a host machine is called the hypervisor,
or Virtual Machine Manager (VMM).
• Allocates the physical system resources, such as CPU, RAM,
and hard drive, to each virtual machine as needed.

▪ Windows Virtual PC is the virtualization platform for


Windows 7
• Allows you to partition system resources for a Window OS
among virtual machines .

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 58
Virtual Machine PC Requirements

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 59
Schedule Tasks
▪ The CLI at command launches tasks at a specified time
using the command line interface.
▪ The Windows Task Scheduler launches tasks at a
specified time using a graphical interface.
▪ To access the Windows Task Scheduler in Windows 7
and Windows Vista, select Start > All Programs >
Accessories > System Tools > Task Scheduler.
▪ Both of these tools allow users to set commands to run
at a certain time just once, or to repeat at selected days
or times.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 60
Restore Point
▪ If a computer crashes, the OS can roll back to a restore point
using the System Restore Utility.
•The restore utility only operates on OS and application files.
•Anti-virus software should be run to remove malware before
creating a restore point.
▪ When to create a restore point:
•Before updating or replacing
the OS.
•When installing or updating
hardware.
•When an application or
driver is installed.
▪ Start > All Programs >
Accessories > System Tools >
System Restore

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 61
Backup the Hard Drive
▪ Use the Microsoft Backup Tool to perform backups.
▪ Establish a backup strategy that will allow for the
recovery of data.
▪ Decide how often the data must be backed up and the
type of backup to perform.
▪ It is only necessary to make copies of the files that
have changed since the last backup.
▪ To access the backup utility in Windows 7, select Start
> Control Panel > Backup and Restore.

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 62
Types of Backups
Clear
Description
marker
Normal Selected files and folders Yes

Copy Selected files and folders No

Selected files and folders that


Differential changed since the last backup
No

Selected files and folders that


Incremental changed since the last backup
Yes

Selected files and folders that


Daily changed during the day
No

Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 63
Types of Backups
• Normal backup is also called a full backup. During a normal
backup, all selected files on the disk are archived to the backup
medium. These files are marked as having been archived.
• Copy backup will copy all selected files. It does not mark the files
as having been archived.
• Differential backup backs up all the files and folders that have
been created or modified since the last normal backup or the last
incremental backup. The differential backup does not mark the
files as having been archived. Making differential backups is
important because only the last full and differential backups are
needed to restore all the data.
• Incremental backup procedure backs up all the files and folders
that have been created or modified since the last normal or
incremental backup.
• Daily backups only back up the files that are modified on the day
of the backup. Daily backups do not mark the files as being
archived. To access the daily backup utility on a Windows XP Pro
system, use the following path: Start > All Programs >
Accessories > System Tools > Backup.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 64
Chapter 5 Summary
▪ Several different operating systems are available, and
you must consider the customer's needs and
environment when choosing an operating system.
▪ The main steps in setting up a customer's computer
include preparing the hard drive, installing an operating
system, creating user accounts, and configuring
installation options.
▪ A GUI shows icons of all files, folders, and applications
on the computer. A pointing device, such as a mouse, is
used to navigate in a GUI desktop.
▪ A CLI uses commands to complete tasks and navigate
the file system.
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 65

You might also like