Chapter 15 Windows Operating Systems
|
|
|
- Lorena Pitts
- 10 years ago
- Views:
Transcription
1 Understanding Operating Systems, Fifth Edition 15-1 Chapter 15 Windows Operating Systems At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics Additional Projects Additional Resources Key Terms
2 Understanding Operating Systems, Fifth Edition 15-2 Lecture Notes Overview The products now categorized as Windows operating systems are descended from a series of graphical interfaces designed to work with or on top of Microsoft s MS-DOS operating system. Over time, Windows evolved into complex operating systems independent of MS-DOS. This chapter discusses Windows operating systems in general, though it provides greater coverage of the operating systems built on the Windows NT kernel, including Windows XP Professional and Windows Server. It begins by presenting the development of the Windows operating system and the design goals. The role of the Memory Manager, especially the Virtual Memory Manager, is discussed. The use of the Device, Processor, and Network Managers in recent versions of Windows is reviewed. The chapter then explains the role of the file system in file management and the challenges for Windows system security today. The chapter concludes by explaining how the current Windows user interface functions. Throughout this chapter, many acronyms are introduced to describe this networked operating system. A list of the Microsoft acronyms can be found in Appendix B. Learning Objectives After completing this chapter, the student should be able to describe: The role of MS-DOS in early Windows releases The design goals for Windows operating systems The role of the Memory Manager and Virtual Memory Manager The use of the Device, Processor, and Network Managers in recent versions of Windows The challenges for Windows system security How the current Windows user interface functions s Windows Development 1. Provide students with a brief overview of Windows development, noting that the first Windows product used a graphical user interface (GUI) as its primary method of communication with the user. 2. Remind students that a comparison of GUIs from several operating systems is available in Appendix C.
3 Understanding Operating Systems, Fifth Edition 15-3 Early Windows Products 1. Provide students with a brief overview of Windows development, using Table 15.1 on page 460 as a guide. 2. Provide students with a brief introduction to Windows for Workgroups, which was the first Windows product to accommodate the needs of network users by including programs and features for small LANs. Operating Systems for Home and Professional Users 1. List the disadvantages of running early Windows operating systems on top of MS-DOS, such as little built-in security, no multitasking capability, no interprocess communication capability, and the difficulty in moving the OS to other platforms. 2. Discuss Microsoft s response to these disadvantages. 3. Provide students with an overview of the evolution of key Microsoft Windows operating systems for home and professional use, using Table 15.2 on page 461 as a guide. Operating Systems for Networks 1. Provide students with an overview of the development of more powerful networking products, beginning with Windows NT ( New Technology ). List the primary market requirements that were identified for Windows NT. Point out that unlike the single-user versions of Windows, Windows NT never relied on MS-DOS for support. 2. Explain the evolution of key Microsoft Windows networking operating systems, using Table 15.3 as a guide. Mention that all Microsoft networking operating systems have evolved from Windows NT. 3. List different versions of Windows NT and Windows 2000 and explain their key features. 4. Discuss the advantages that the Server and Advanced Server editions of Windows introduced. Refer to the following Web site to learn more about the history of Windows operating systems: Design Goals 1. Explain why the designers of the Windows operating system had to incorporate a set of software design goals to facilitate decision making as the coding process evolved.
4 Understanding Operating Systems, Fifth Edition Explain that when they were designed, Windows networking operating systems were influenced by several operating system models and incorporated already existing frameworks while introducing new features. Discuss the object model. 3. List the five design goals that the Windows design team identified to accommodate the various needs of its users and to optimize resources: extensibility, portability, reliability, compatibility, and performance. Extensibility 1. Discuss the concept of extensibility, which refers to the ability of the system to be easily enhanced. 2. Discuss the separation of Windows functions into a privileged executive process and the set of nonprivileged processes called protected subsystems. Explain how these help to ensure the integrity of the Windows operating system. 3. Briefly explain four more features that were included to ensure integrity: modular structure, objects, the capability of adding drivers at any time, and remote process calls. Portability 1. Explain the concept of portability, the operating system s ability to operate on different machines based on different processors or configurations. List the guidelines that the Windows development group followed to achieve this goal. 2. Discuss briefly the key portability features of Windows NT and its successor systems, such as the use of modular code, the fact that the OS was written in C, and the hardware extraction layer (HAL). Reliability 1. Discuss the concept of reliability, which refers to the robustness of a system and its ability to protect itself and its users from accidental or deliberate damage by user programs. Briefly explain the different features that strengthen Windows systems. Compatibility 1. Explain the concept of compatibility, which refers to an operating system s ability to execute programs written for other operating systems or for earlier versions of the same system. Explain how this feature is addressed in Windows operating systems. Performance 1. Discuss the features that help Windows achieve good performance levels, i.e., fast and efficient performance. Use the bullet points on page 466 as a guide. To view the
5 Understanding Operating Systems, Fifth Edition 15-5 Demonstrate performance and reliability in a Windows system by pressing the Windows logo key and the R key together. Then type perfmon.msc. Click OK to see the performance monitor. Quick Quiz 1 1. Which of the following Microsoft Windows networking operating systems includes a Web edition? a. Window NT 4.0 b. Windows 2000 c. Windows Server 2003 d. All of the above Answer: c 2. Which of the following is a design goal of the Windows operating systems? (Choose all that apply.) a. Extensibility b. Profitability c. Compatibility d. Performance Answer: a, c, and d 3. Which of the following file systems is supported by recent versions of Windows operating systems? (Choose all that apply.) a. POSIX b. CDFS c. NTSC d. NTFS Answer: b and d Memory Management 1. Provide students with an overview of memory management in Windows operating systems. Discuss the concept of virtual memory. 2. Point out the challenges involved in memory management for all Windows operating systems, e.g., the challenge of running application programs written for Windows, MS- DOS, or POSIX without programs crashing into each other s memory. 3. Discuss the layout of memory in recent versions of Windows, using Figure 15.1 on page 467 in the text as a guide.
6 Understanding Operating Systems, Fifth Edition 15-6 User-Mode Features 1. Discuss briefly the Virtual Memory (VM) Manager and the services that it provides, using the bullet points on pages in the text as a guide. Virtual Memory Implementation 1. List the two techniques on which the Virtual Memory Manager relies, namely address space management and paging. 2. Provide students with a brief overview of address space management, using Figure 15.1 on page 467 as a guide. Point out that the upper half of the virtual address space is accessible only to kernel-mode processes, and that code in the lower part of this section, kernel code and data, is never paged out of memory. 3. Discuss the function of the pager. Point out that it is a complex combination of software policies and hardware mechanisms. Briefly discuss these software policies and hardware mechanisms, including their roles. 4. Explain the paging policies, including the fetch, placement, and replacement policies. Refer to the following Web site to learn more about memory management in Windows operating systems: Processor Management 1. Provide students with an overview of processor management in Windows operating systems. Stress that Windows is a preemptive-multitasking, multithreaded operating system. 2. Remind students of the concepts of threads, including their contents (the thread s context) and their purpose. 3. Explain unitasking and multitasking in Windows, using Figures 15.2 and 15.3 on page 471 in the text as a guide. Point out that in multitasking, all threads belonging to one process share its global variables, heap, and environment strings. 4. Discuss the advantages of multithreading. Device Management 1. Provide students with an overview of device management in Windows operating systems.
7 Understanding Operating Systems, Fifth Edition List the different features that the I/O system in Windows NT and its networking descendents provided, using the bullet points on page 472 as a guide. 3. Describe the packet-driven I/O system in Windows operating systems. Discuss the roles of the I/O Manager and the driver in creating and receiving an I/O request packet (IRP). 4. Discuss the additional tasks of the I/O manager. 5. Discuss the need for a device-independent model for I/O services and the concept of a multilayered device driver in Windows operating systems. Explain the importance of a multilayered device driver. List the routines of a device driver. 6. Discuss the concepts of driver object and device object that are useful in determining which driver should be called to process the request. Explain how an application instruction results in disk access, using the examples shown in Table 15.4 and Figure 15.4 on page 474 as a guide. 7. Discuss the advantages of representing devices and drivers with different objects. 8. Explain how the I/O Manager interacts with a layered device driver to satisfy a user command, using the example shown in Figure 15.5 on page Mention that the I/O Manager knows nothing about the file system. Outline the differences between a single-layer and a multilayer device driver approach. Provide examples of devices for which such approaches are used. Be sure to mention that there is overhead involved when the I/O Manager passes requests for information back and forth. 10. Explain the asynchronous I/O operation feature that is unique to current Windows operating systems. Refer to the following Web site to learn more about device management technologies: File Management 1. Provide students with an overview of important features of file management in Windows operating systems. Point out that current versions of Windows are designed to be independent of the file system on which they operate. List the different file systems for hard disks supported by Windows. 2. Explain the concepts of virtual file, file handles, and file objects in file management.
8 Understanding Operating Systems, Fifth Edition Use Figure 15.6 on page 478 to illustrate the contents of file objects and the services that operate on them. Use Table 15.5 on page 478 in the text to illustrate the object body attributes. 4. Discuss the distinction between a file object, a memory-based representation of a shareable resource that contains only data unique to an object handle, and the file itself, which contains the data to be shared. 5. Using an example such as the one provided on page 479 in the text, explain the concept of mapped file I/O, which is an important feature of the I/O system and is achieved through the cooperation of the I/O system and the VM Manager. 6. Point out that the file management system supports long filenames that can include spaces and special characters. Moreover, the file management system can automatically shorten filenames when required. Network Management 1. Provide students with an overview of network management in Windows operating systems. Point out that networking is an integral part of the Windows NT-based operating systems. List the services that networking provides. 2. Explain the concept of named pipes to provide a high-level interface for passing data between two processes regardless of their locations. 3. Explain the concept of Mailslots to provide one-to-many and many-to-one communication mechanisms useful for broadcasting messages to any number of processes. MS-NET 1. Provide students with an overview of Microsoft Networks (MS-NET), which became the model for the NT Network Manager. 2. Explain the three MS-NET components: the redirector, the server message block (SMB) protocol, and the network server. Discuss their key features and functions. 3. Explain how the seven layers of the OSI reference model are implemented in current Windows network management, using Figure 15.7 on page 481 as a guide. Directory Services 1. Explain the concept of Active Directory, which is a general-purpose directory service for a heterogeneous network. Discuss its key features. Make sure students understand DNS and LDAP. 2. Describe how Active Directory clients locate objects on the network using standard DNS and LDAP protocols. Use Figure 15.8 on page 482 as a guide.
9 Understanding Operating Systems, Fifth Edition 15-9 Refer to the following Web site to learn more about network management in Windows operating systems: Refer to the following Web site to learn more about active directory in Windows 2003 server: Security Management 1. Briefly discuss the object-based security model that Windows network operating systems provide. Point out that one of the biggest concerns in Windows operating systems is the need for aggressive patch management to combat many viruses and worms that target these systems. Security Basics 1. Discuss the features that Windows operating systems include to comply with the Class C2 level of security, using the bullet points on page 483 as a guide. 2. Discuss the multilayered security system that Windows uses to prevent access by unauthorized users while allowing entry to legitimate users. Security Terminology 1. Discuss the built-in security feature of recent Windows network operating systems, which is a necessary element for managers of Web servers and networks. 2. Describe how security is implemented using Kerberos. 3. Explain that every user who wants to securely access remote services must log on to a Kerberos server. Use Figure 15.9 on page 484 in the text to illustrate the path followed by a request from an application to a service provided on the network. Refer to the following Web site to learn more about Microsoft Kerberos:
10 Understanding Operating Systems, Fifth Edition User Interface 1. Provide students with an overview of the user interface in Windows operating systems. Point out the options to start or to quit an application in Windows operating systems. 2. Briefly discuss the Start Menu, which organizes files and programs into logical groups. Outline different functions that users can perform from the Start Menu. Use Figure on page 484 to illustrate a typical Start Menu. 3. Discuss how the Start Menu organizes files and programs into logical groups and the common functions of the Start Menu. 4. Discuss the utility of the Windows Task Manager and Windows Explorer. Use Figures and on pages 486 and 487 to illustrate these features. 5. Discuss security in Windows networked systems. Note the tools to help users identify and access network resources (folders, printers, and connections to other nodes). Explain and demonstrate them by: a. Going to the Network and Sharing Center b. Clicking on View Computers and Devices c. Clicking the option to map a network drive Illustrate these steps pictorially using Figure on page 488 in the text. 6. Briefly discuss various other features including the command interface, keyboard shortcuts, the onscreen keyboard, built-in input methods, fonts for many languages, and the resource monitor. 7. Illustrate these features pictorially using Figures through For a list of vendors of Windows-based accessibility utilities, refer to the following Web site: Quick Quiz 2 1. The VM Manager uses a(n) replacement policy. a. LRU b. MRU c. FCFS d. FIFO Answer: d
11 Understanding Operating Systems, Fifth Edition A(n) is a data structure that controls how the I/O operation is processed at each step. Answer: I/O request packet (IRP) 3. The segment of system memory labeled is never paged to disk because it s used to store critical NT objects. Answer: nonpaged pool Class Discussion Topics 1. Have students discuss device management in Windows operating systems. How is it different from device management in the MS-DOS operating system? Ask students to list all the advanced key features of device management in Windows operating systems. 2. Have students discuss their thoughts on security management in Windows network operating systems? How do they feel about Microsoft s commitment to security? Additional Projects 1. Have students research online to compile a list of the features of the Windows XP operating system that are designed to ensure Microsoft s design goals of compatibility and portability. 2. Ask students to describe two types of file I/O synchronization: synchronous file I/O and asynchronous file I/O. What are the pros and cons of each type? Provide examples of different situations in which each type would be suitable. Additional Resources 1. Microsoft.com: 2. Microsoft Windows: 3. MSDN Library: 4. Microsoft Security Guidance Kit:
12 Understanding Operating Systems, Fifth Edition WindowSecurity.com: Key Terms Active Directory: Microsoft Windows directory service that offers centralized administration of application serving, authentication, and user registration for distributed networking systems. Cache manager: a component of the I/O system that manages the part of virtual memory known as cache. The cache expands or shrinks dynamically depending on the amount of memory available. Compatibility: the ability of an operating system to execute programs written for other operating systems or for earlier versions of the same system. Domain Name Service or Domain Name System (DNS): a general-purpose, distributed, replicated, data query service. Its principal function is the resolution of Internet addresses based on fully qualified domain names such as.com (for commercial entity) or.edu (for educational institution). Extensibility: one of an operating system s design goals that allows it to be easily enhanced as market requirements change. Fetch policy: the rules used by the Virtual Memory Manager to determine when a page is copied from disk to memory. Graphical user interface (GUI): a user interface that allows the user to activate operating system commands by clicking on desktop icons or menus using a pointing device such as a mouse or touch screen. GUI evolved from command-driven user interfaces. Kerberos: MIT-developed authentication system that allows network managers to administer and manage user authentication at the network level. Kernel mode: name given to indicate that processes are granted privileged access to the processor. Therefore, all machine instructions are allowed and system memory is accessible. Contrasts with the more restrictive user mode. Lightweight Directory Access Protocol (LDAP): a protocol that defines a method for creating searchable directories of resources on a network. It s called lightweight because it is a simplified and TCP/IP-enabled version of the X.500 directory protocol. Mailslots: a high-level network software interface for passing data among processes in a one-to-many and many-to-one communication mechanism. Mailslots are useful for broadcasting messages to any number of processes. Named pipes: a high-level software interface to NetBIOS, which represents the hardware in network applications as abstract objects. Named pipes are represented as file objects in Windows NT and later, and they operate under the same security mechanisms as other executive objects. NT file system (NTFS): the file system introduced with Windows NT that offers file management services, such as permission management, compression, transaction logs, and the ability to create a single volume spanning two or more physical disks. Placement policy: the rules used by the Virtual Memory Manager to determine where the virtual page is to be loaded in memory. Portability: the ability to move an entire operating system to a machine based on a different processor or configuration with as little recoding as possible.
13 Understanding Operating Systems, Fifth Edition POSIX: Portable Operating System Interface, an operating system application program interface developed by the IEEE to increase the portability of application software. Reliability: the ability of an operating system to respond predictably to error conditions, even those caused by hardware failures; or the ability of an operating system to actively protect itself and its users from accidental or deliberate damage by user programs. Replacement policy: the rules used by the Virtual Memory Manager to determine which virtual page must be removed from memory to make room for a new page. Ticket granting ticket: a virtual ticket given by a Kerberos server indicating that the user holding the ticket can be granted access to specific applications servers. The user sends this encrypted ticket to the remote applications server, which can then examine it to verify the user s identity and authenticate the user. User mode: name given to indicate that processes are not granted privileged access to the processor. Therefore, certain instructions are not allowed and system memory isn t accessible. Contrasts with the less restrictive kernel mode.
Network operating systems typically are used to run computers that act as servers. They provide the capabilities required for network operation.
NETWORK OPERATING SYSTEM Introduction Network operating systems typically are used to run computers that act as servers. They provide the capabilities required for network operation. Network operating
Learning Objectives. Chapter 1: Networking with Microsoft Windows 2000 Server. Basic Network Concepts. Learning Objectives (continued)
Chapter 1: Networking with Microsoft Learning Objectives Plan what network model to apply to your network Compare the differences between Windows 2000 Professional, Server, Advanced Server, and Datacenter
Parallels Plesk Panel
Parallels Plesk Panel Copyright Notice Parallels Holdings, Ltd. c/o Parallels International GMbH Vordergasse 49 CH8200 Schaffhausen Switzerland Phone: +41 526320 411 Fax: +41 52672 2010 Copyright 1999-2011
4.1 Introduction 4.2 Explain the purpose of an operating system 4.2.1 Describe characteristics of modern operating systems Control Hardware Access
4.1 Introduction The operating system (OS) controls almost all functions on a computer. In this lecture, you will learn about the components, functions, and terminology related to the Windows 2000, Windows
Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10
Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS
FileMaker Pro 12. Using a Remote Desktop Connection with FileMaker Pro 12
FileMaker Pro 12 Using a Remote Desktop Connection with FileMaker Pro 12 2007 2012 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker
How To Write A Windows Operating System (Windows) (For Linux) (Windows 2) (Programming) (Operating System) (Permanent) (Powerbook) (Unix) (Amd64) (Win2) (X
(Advanced Topics in) Operating Systems Winter Term 2009 / 2010 Jun.-Prof. Dr.-Ing. André Brinkmann [email protected] Universität Paderborn PC 1 Overview Overview of chapter 3: Case Studies 3.1 Windows Architecture.....3
Windows8 Internals, Sixth Edition, Part 1
Microsoft Windows8 Internals, Sixth Edition, Part 1 Mark Russinovich David A. Solomon Alex lonescu Windows Internals, Sixth Edition, Part i Introduction xvii Chapter 1 Concepts and Tools 1 Windows Operating
Functions of NOS Overview of NOS Characteristics Differences Between PC and a NOS Multiuser, Multitasking, and Multiprocessor Systems NOS Server
Functions of NOS Overview of NOS Characteristics Differences Between PC and a NOS Multiuser, Multitasking, and Multiprocessor Systems NOS Server Hardware Windows Windows NT 4.0 Linux Server Software and
Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003
Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while
AdminToys Suite. Installation & Setup Guide
AdminToys Suite Installation & Setup Guide Copyright 2008-2009 Lovelysoft. All Rights Reserved. Information in this document is subject to change without prior notice. Certain names of program products
Managing and Maintaining a Windows Server 2003 Network Environment
Managing and maintaining a Windows Server 2003 Network Environment. AIM This course provides students with knowledge and skills needed to Manage and Maintain a Windows Server 2003 Network Environment.
Windows Server 2003 default services
Windows Server 2003 default services To view a description for a particular service, hover the mouse pointer over the service in the Name column. The descriptions included here are based on Microsoft documentation.
FileMaker Pro 13. Using a Remote Desktop Connection with FileMaker Pro 13
FileMaker Pro 13 Using a Remote Desktop Connection with FileMaker Pro 13 2007 2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker
KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual
KASPERSKY LAB Kaspersky Administration Kit version 6.0 Administrator s manual KASPERSKY ADMINISTRATION KIT VERSION 6.0 Administrator s manual Kaspersky Lab Visit our website: http://www.kaspersky.com/
VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide
VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes
MCSE 2003. Core exams (Networking) One Client OS Exam. Core Exams (6 Exams Required)
MCSE 2003 Microsoft Certified Systems Engineer (MCSE) candidates on the Microsoft Windows Server 2003 track are required to satisfy the following requirements: Core Exams (6 Exams Required) Four networking
Chapter 14 MS-DOS Operating System
Understanding Operating Systems, Fifth Edition 14-1 Chapter 14 MS-DOS Operating System At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics Additional
Windows 2000 Security Configuration Guide
Windows 2000 Security Configuration Guide Version 1.0 October 4, 2002 Prepared For: Microsoft Corporation Corporate Headquarters One Microsoft Way Redmond, WA 98052-6399 Prepared By: Science Applications
8 NETWORK SERVERS AND SERVICES FUNDAMENTALS
8 NETWORK SERVERS AND SERVICES FUNDAMENTALS PROJECTS Project 8.1 Project 8.2 Project 8.3 Project 8.4 Project 8.5 Understanding Key Concepts Comparing Network Operating Systems Understanding Basic Services
SWsoft, Inc. Plesk File Server. Administrator's Guide. Plesk 7.5 Reloaded
SWsoft, Inc. Plesk File Server Administrator's Guide Plesk 7.5 Reloaded (c) 1999-2005 ISBN: N/A SWsoft Inc 13755 Sunrise Valley Drive Suite 325 Herndon VA 20171 USA Tel: +1 (703) 815 5670 Fax: +1 (703)
Faculty Details. : Assistant Professor ( OG. ),Assistant Professor (OG) Course Details. : B. Tech. Batch : 2010-2014. : Information Technology
COURSE FILE (COURSE PLAN) Year : 2012-13 Sem: ODD Faculty Details Name of the Faculty : Mullai.P & Yaashuwanth.C Designation : Assistant Professor ( OG. ),Assistant Professor (OG) Department : Information
OPERATING SYSTEM SERVICES
OPERATING SYSTEM SERVICES USER INTERFACE Command line interface(cli):uses text commands and a method for entering them Batch interface(bi):commands and directives to control those commands are entered
Chapter 5: Fundamental Operating Systems
Chapter 5: Fundamental Operating Systems IT Essentials: PC Hardware and Software v4.1 Chapter5 2007-2010 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Chapter 5 Objectives 5.1 Explain the purpose
Intel Entry Storage System SS4200-E Active Directory Implementation and Troubleshooting
Intel Entry Storage System SS4200-E Active Directory Implementation and Troubleshooting 1 Active Directory Overview SS4200-E Active Directory is based on the Samba 3 implementation The SS4200-E will function
The Win32 Network Management APIs
The Win32 Network Management APIs What do we have in this session? Intro Run-Time Requirements What's New in Network Management? Windows 7 Windows Server 2003 Windows XP Network Management Function Groups
CONFIGURING ACTIVE DIRECTORY IN LIFELINE
White Paper CONFIGURING ACTIVE DIRECTORY IN LIFELINE CONTENTS Introduction 1 Audience 1 Terminology 1 Test Environment 2 Joining a Lenovo network storage device to an AD domain 3 Importing Domain Users
Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the
Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names,
Installing Windows XP Professional
CHAPTER 3 Installing Windows XP Professional After completing this chapter, you will be able to: Plan for an installation of Windows XP Professional. Use a CD to perform an attended installation of Windows
Upon completion of this chapter, you will able to answer the following questions:
CHAPTER 2 Operating Systems Objectives Upon completion of this chapter, you will able to answer the following questions: What is the purpose of an OS? What role do the shell and kernel play? What is the
EUCIP - IT Administrator. Module 2 Operating Systems. Version 2.0
EUCIP - IT Administrator Module 2 Operating Systems Version 2.0 Module 2 Goals Module 2 Module 2, Operating Systems, requires the candidate to be familiar with the procedure of installing and updating
FileMaker Pro 11. Running FileMaker Pro 11 on Citrix XenApp
FileMaker Pro 11 Running FileMaker Pro 11 on Citrix XenApp 2007 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark
Network Station - Thin Client Computing - Overview
Network Station - Thin Client Computing - Overview Overview The objective of this document is to help develop an understanding of a Server Based Computing/Thin-Client environment using MS Windows NT 4.0,
ANNE ARUNDEL COMMUNITY COLLEGE ARNOLD, MARYLAND COURSE OUTLINE CATALOG DESCRIPTION
ANNE ARUNDEL COMMUNITY COLLEGE ARNOLD, MARYLAND COURSE OUTLINE COURSE: Windows 2003 Server COURSE NO: CSI 265 CREDIT HOURS: 3 hours of lecture weekly DEPARTMENT: CATALOG DESCRIPTION CSI 265 Windows 2003
HOUR 3. Installing Windows Server 2003
HOUR 3 Installing Windows Server 2003 In this hour, we discuss the different types of Windows Server 2003 installations, such as upgrading an existing server or making a clean install on a server that
MCSE Objectives. Exam 70-236: TS:Exchange Server 2007, Configuring
MCSE Objectives Exam 70-236: TS:Exchange Server 2007, Configuring Installing and Configuring Microsoft Exchange Servers Prepare the infrastructure for Exchange installation. Prepare the servers for Exchange
Click to view Web Link, click Chapter 8, Click Web Link from left navigation, then click BIOS below Chapter 8 p. 395 Fig. 8-4.
Chapter 8 Objectives Chapter 8 Operating Systems and Utility Programs Identify the the types types of of system software Summarize the the startup process on on a a personal computer Describe the the functions
Unit 11: Installing, Configuring and Administering Microsoft Windows Professional
Unit 11: Installing, Configuring and Administering Microsoft Windows Professional Learning Outcomes A candidate following a programme of learning leading to this unit will be able to: Log on, access and
System Structures. Services Interface Structure
System Structures Services Interface Structure Operating system services (1) Operating system services (2) Functions that are helpful to the user User interface Command line interpreter Batch interface
50331D Windows 7, Enterprise Desktop Support Technician (Windows 10 Curriculum)
This course can be purchased by authorized Microsoft Learning Centers at the Courseware Marketplace web-site. Microsoft Certified Trainers (MCTs) can get a free copy at the same website. About the Course
Chapter 1: Operating System Models 1 2 Operating System Models 2.1 Introduction Over the past several years, a number of trends affecting operating system design are witnessed and foremost among them is
Multiprogramming. IT 3123 Hardware and Software Concepts. Program Dispatching. Multiprogramming. Program Dispatching. Program Dispatching
IT 3123 Hardware and Software Concepts Operating Systems II October 26 Multiprogramming Two or more application programs in memory. Consider one CPU and more than one program. This can be generalized to
How To Install And Configure Windows Server 2003 On A Student Computer
Course: WIN310 Student Lab Setup Guide Microsoft Windows Server 2003 Network Infrastructure (70-291) ISBN: 0-470-06887-6 STUDENT COMPUTER SETUP Hardware Requirements All hardware must be on the Microsoft
Outline: Operating Systems
Outline: Operating Systems What is an OS OS Functions Multitasking Virtual Memory File Systems Window systems PC Operating System Wars: Windows vs. Linux 1 Operating System provides a way to boot (start)
Getting Started Guide
Getting Started Guide Microsoft Corporation Published: December 2005 Table of Contents Getting Started Guide...1 Table of Contents...2 Get Started with Windows Server 2003 R2...4 Windows Storage Server
Chapter 2 System Structures
Chapter 2 System Structures Operating-System Structures Goals: Provide a way to understand an operating systems Services Interface System Components The type of system desired is the basis for choices
Software: Systems and Application Software
Software: Systems and Application Software Computer Software Operating System Popular Operating Systems Language Translators Utility Programs Applications Programs Types of Application Software Personal
WINDOWS 2000 Training Division, NIC
WINDOWS 2000 Active TE Directory Services WINDOWS 2000 Training Division, NIC Active Directory Stores information about objects on the network and makes this information easy for administrators and users
Lecture 6: Operating Systems and Utility Programs
Lecture 6: Operating Systems and Utility Programs Chapter 8 Objectives Identify the types of system software Summarize the startup process on a personal computer Summarize the features of several stand-alone
Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide
Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec
PaperClip32. Installation Guide. for Workgroup and Enterprise Editions. Document Revision 2.1 1
PaperClip32 Installation Guide for Workgroup and Enterprise Editions Document Revision 2.1 1 Copyright Information Copyright 2005, PaperClip Software, Inc. The PaperClip32 product name and PaperClip Logo
The Windows Server 2003 Environment. Introduction. Computer Roles. Introduction to Administering Accounts and Resources. Lab 2
Islamic University of Gaza College of Engineering Computer Department Computer Networks Lab Introduction to Administering Accounts and Resources Prepared By: Eng.Ola M. Abd El-Latif Mar. /2010 0 :D Objectives
Core Protection for Virtual Machines 1
Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this
features at a glance
hp availability stats and performance software network and system monitoring for hp NonStop servers a product description from hp features at a glance Online monitoring of object status and performance
FileMaker. Running FileMaker Pro 10 on Citrix Presentation Server
FileMaker Running FileMaker Pro 10 on Citrix Presentation Server 2004-2009 FileMaker, Inc. All rights reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker, the file
FileMaker Server 7. Administrator s Guide. For Windows and Mac OS
FileMaker Server 7 Administrator s Guide For Windows and Mac OS 1994-2004, FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark
Running FileMaker Pro 5.0v3 on Windows 2000 Terminal Services
Running FileMaker Pro 5.0v3 on Windows 2000 Terminal Services 2000 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 www.filemaker.com FileMaker
Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
How to manage non-hp x86 Windows servers with HP SIM
How to manage non-hp x86 Windows servers with HP SIM Introduction... 3 HP SIM inventory for non-hp x86 Windows servers... 3 Discovery and Identification... 3 Events... 4 System properties and reports...
Windows Services. Support Windows and mixed-platform workgroups with high-performance, affordable network services. Features
Windows Services Support Windows and mixed-platform workgroups with high-performance, affordable network services. Features File and print services Integrated Samba 3 for native SMB/CIFS protocol support
Symantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide
Symantec Backup Exec 12.5 for Windows Servers Quick Installation Guide 13897290 Installing Backup Exec This document includes the following topics: System requirements Before you install About the Backup
VERITAS Backup Exec TM 10.0 for Windows Servers
VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software
FileMaker Pro 11. Running FileMaker Pro 11 on Terminal Services
FileMaker Pro 11 Running FileMaker Pro 11 on Terminal Services 2007 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark
Best Practices: Integrating Mac OS X with Active Directory. Technical White Paper April 2009
Best Practices: Integrating Mac OS X Technical White Paper April 2009 2 Contents Page 3 Page 5 Page 9 Page 10 Page 11 Page 12 Apple s Built-In Solution How to Integrate Mac OS X Getting Started dsconfigad
Operating System Installation Guide
Operating System Installation Guide This guide provides instructions on the following: Installing the Windows Server 2008 operating systems on page 1 Installing the Windows Small Business Server 2011 operating
A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows
: Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows
Getting Started with Vision 6
Getting Started with Vision 6 Version 6.9 Notice Copyright 1981-2009 Netop Business Solutions A/S. All Rights Reserved. Portions used under license from third parties. Please send any comments to: Netop
CS420: Operating Systems OS Services & System Calls
NK YORK COLLEGE OF PENNSYLVANIA HG OK 2 YORK COLLEGE OF PENNSYLVAN OS Services & System Calls James Moscola Department of Physical Sciences York College of Pennsylvania Based on Operating System Concepts,
Operating System Structures
Operating System Structures Meelis ROOS [email protected] Institute of Computer Science Tartu University fall 2009 Literature A. S. Tanenbaum. Modern Operating Systems. 2nd ed. Prentice Hall. 2001. G. Nutt.
Objectives. Chapter 2: Operating-System Structures. Operating System Services (Cont.) Operating System Services. Operating System Services (Cont.
Objectives To describe the services an operating system provides to users, processes, and other systems To discuss the various ways of structuring an operating system Chapter 2: Operating-System Structures
Windows NT. Chapter 11 Case Study 2: Windows 2000. Windows 2000 (2) Windows 2000 (1) Different versions of Windows 2000
Chapter 11 Case Study 2: Windows 2000 11.1 History of windows 2000 11.2 Programming windows 2000 11.3 System structure 11.4 Processes and threads in windows 2000 11.5 Memory management 11.6 Input/output
CSE 120 Principles of Operating Systems. Modules, Interfaces, Structure
CSE 120 Principles of Operating Systems Fall 2000 Lecture 3: Operating System Modules, Interfaces, and Structure Geoffrey M. Voelker Modules, Interfaces, Structure We roughly defined an OS as the layer
Windows 2003 Server Installation Guide
Windows 2003 Server Installation Guide Revision 2.0 April 14, 2011 Licenses This manual is the exclusive property of Prometric, Inc. This manual is licensed for use with restrictions to authorized centers
For Active Directory Installation Guide
For Active Directory Installation Guide Version 2.5.2 April 2010 Copyright 2010 Legal Notices makes no representations or warranties with respect to the contents or use of this documentation, and specifically
SQL Server Setup Guide for BusinessObjects Planning
SQL Server Setup Guide for BusinessObjects Planning BusinessObjects Planning XI Release 2 Copyright 2007 Business Objects. All rights reserved. Business Objects owns the following U.S. patents, which may
FAS Asset Accounting FAS CIP Accounting FAS Asset Inventory SQL Server Installation & Administration Guide Version 2011.1
FAS Asset Accounting FAS CIP Accounting FAS Asset Inventory SQL Server Installation & Administration Guide Version 2011.1 2011 Sage Software, Inc. All rights reserved. Published by Sage 2325 Dulles Corner
Operating System Today s Operating Systems File Basics File Management Application Software
Lecture Content Operating System Today s Operating Systems File Basics File Management Application Software Operating Systems and File Management 2 Operating Systems and File Management 3 Operating System
Active Directory Monitoring With PATROL
Active Directory Monitoring With PATROL Contents What is Active Directory?...1 Why Monitor?...1 Active Directory and PATROL...2 Critical Active Directory Components to Monitor...3 Address Book...3 Domain
Setting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
Windows Server 2008 Essentials. Installation, Deployment and Management
Windows Server 2008 Essentials Installation, Deployment and Management Windows Server 2008 Essentials First Edition. This ebook is provided for personal use only. Unauthorized use, reproduction and/or
Planning Domain Controller Capacity
C H A P T E R 4 Planning Domain Controller Capacity Planning domain controller capacity helps you determine the appropriate number of domain controllers to place in each domain that is represented in a
Symantec Backup Exec 2010 R2. Quick Installation Guide
Symantec Backup Exec 2010 R2 Quick Installation Guide 20047221 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
Guest PC. for Mac OS X. User Guide. Version 1.6. Copyright 1996-2005 Lismore Software Systems, Ltd. All rights reserved.
Guest PC for Mac OS X Version 1.6 User Guide Copyright 1996-2005 Lismore Software Systems, Ltd. All rights reserved. Table of Contents About Guest PC... 1 About your Virtual Computer... 1 Creating a Virtual
SQL Backup and Restore using CDP
CDP SQL Backup and Restore using CDP Table of Contents Table of Contents... 1 Introduction... 2 Supported Platforms... 2 SQL Server Connection... 2 Figure 1: CDP Interface with the SQL Server... 3 SQL
CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS
CHAPTER 1: OPERATING SYSTEM FUNDAMENTALS What is an operating? A collection of software modules to assist programmers in enhancing efficiency, flexibility, and robustness An Extended Machine from the users
5-Bay Raid Sub-System Smart Removable 3.5" SATA Multiple Bay Data Storage Device User's Manual
5-Bay Raid Sub-System Smart Removable 3.5" SATA Multiple Bay Data Storage Device User's Manual www.vipower.com Table of Contents 1. How the SteelVine (VPMP-75511R/VPMA-75511R) Operates... 1 1-1 SteelVine
VMware Mirage Web Manager Guide
Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
Using SUSE Linux Enterprise Desktop with Microsoft * Active Directory Infrastructure
Technical White Paper DESKTOP www.novell.com Using SUSE Linux Enterprise Desktop with Microsoft * Active Directory Infrastructure * Using SUSE Linux Enterprise Desktop with Microsoft Active Directory Infrastructure
Open Directory. Apple s standards-based directory and network authentication services architecture. Features
Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data
Kaseya Server Instal ation User Guide June 6, 2008
Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's
2-Bay Raid Sub-System Smart Removable 3.5" SATA Multiple Bay Data Storage Device User's Manual
2-Bay Raid Sub-System Smart Removable 3.5" SATA Multiple Bay Data Storage Device User's Manual www.vipower.com Table of Contents 1. How the SteelVine (VPMP-75211R/VPMA-75211R) Operates... 1 1-1 SteelVine
Windows Server 2008 R2 Essentials
Windows Server 2008 R2 Essentials Installation, Deployment and Management 2 First Edition 2010 Payload Media. This ebook is provided for personal use only. Unauthorized use, reproduction and/or distribution
Chapter Contents. Operating System Activities. Operating System Basics. Operating System Activities. Operating System Activities 25/03/2014
Chapter Contents Operating Systems and File Management Section A: Operating System Basics Section B: Today s Operating Systems Section C: File Basics Section D: File Management Section E: Backup Security
MS-50292 - MCITP: Windows 7 Enterprise Desktop Support Technician Boot Camp
MS-50292 - MCITP: Windows 7 Enterprise Desktop Support Technician Boot Camp Table of Contents Introduction Audience At Completion Prerequisites Microsoft Certified Professional Exams Student Materials
for Windows 7 Laplink Software, Inc. Quick Start Guide h t t p : / / w w w. l a p l i n k. c o m / h e l p MN-LLG-EN-15 (REV.
1 for Windows 7 Laplink Software, Inc. Customer Service/Technical Support: Web: http://www.laplink.com/help E-mail: [email protected] Laplink Software, Inc. 14335 NE 24th Street, Suite 201 Bellevue,
