Windows operating system

FIND A SOLUTION AT Academic Writers Bay

Managing a Successful Computing Project Assignment Questions & Answers
Assignment Details:
Topic: Managing Successfully Project
Document Type:: Assignment Help (any type)
Subject: Project Management
Deadline :*: As Per Required
Number of Words:: 5000
Citation/Referencing Style: As Per Required
1).   The procedures involved in the installation and upgrade of an operating system. (Answer each in 100-150 words.)
ANS: To begin the Windows, installation or update process, you should design your PC to boot from a CD or DVD before booting to the hard drive. Changing the boot procedure powers, the PC to search for the Windows establishment plate before attempting to boot from the hard drive
Access the computer’s BIOS setup.
Change the computer’s boot order
Save the settings change and exit BIOS
Place the Windows disc in the CD/DVD drive or USB thumb drive into the back of the computer.
Turn on or restart the computer
After the Windows install begins, there are several prompts that you need to answer. Select either Yes or the appropriate option to install Windows
When asked which partition to install Windows onto, select the main partition, which is usually the C: drive or one labelled “Unallocated partition”. If upgrading Windows, select the existing installation of Windows on the hard drive
You may be asked if you want to erase all contents on the hard drive, then install Windows. It is recommended that you choose this option, as it will also properly format the hard drive to allow the Windows operating system to be installed.
The computer may need to restart several times during the Windows install process. The restarts are normal and if prompted to restart, select the Yes option.
When the install process is nearly complete, the Windows configuration option screens are shown. On these screens, you may be asked to select the time zone you live in, your preferred language, and the name of the account you use to access Windows. Select the appropriate options and enter the appropriate information on each configuration screen.
The Windows install process will be complete when the computer prompts you to log in with the account you created on the configuration screens, or when it loads directly into Windows.
2).  The most common techniques involved in the installation and upgrade of an operating system. (Answer each in 100-150 words.)
Ans:
Determining Which Operating System to Install
Check the system requirement
Decide whether purchase or download
Research the computer software compatibility
Obtaining your new operating system
Backup your data.
Installing your new operating system
Determine your installation order
Boost from your installation disc
Try your Linux distribution before installing
Wait for the setup program to load
Enter your product key
Choose your installation type
Format your partitions
Set your Linux obtains
Wait for the installation to complete
Create your windows login
Installing specific operating system
Install windows 7
Install windows 8
Install ubuntu
Install mac os x
Install fedora
Install mac os x on intel or AMD computer
3).  What are the key procedures and principals involved in an unattended installation process? (Write your answer in 100-150 words)
Ans:principals involved in an unattended installation process are listed below:
Download and install the Windows Automated installation kit at the designated technician computer.
Create a reference computer (Master Computer) containing the operating system and software applications.
Create an answer file.
Run the system prep utility to prepare and create an ISO image of the reference computer.
Create a bootable Windows system media such as CD, DVD, or USF flash drive or copy the image to a network location to be used for distribution of the image.
Distribute the System Media at the destination computer, insert the distribution media and then press Ctrl-Alt-Del to boot the computer and start the unattended installation process.
What is an operating system configuration? (Answer in 40-50 words)
Answer:operating System configuration is a term in systems engineering that defines the computer hardware, the processes as well as the various devices that comprise the entire system and its boundaries. This term also refers to the settings or the hardware-software arrangement and how each device and software or process interact with each other based on a system settings file created automatically by the system or defined by the user.
Explain the operating system configuration issues that you may encounter while working with hardware and software. (Answer in 40-50 words).
Explain the following terms.
Local resources
A peripheral device, such as a disk, modem or printer, that is directly connected to a user’s computer (inside the cabinet or attached via cable).
configuring the local resource
sharing of local resources
Shared resources, also known as network resources, refer to computer data, information, or hardware devices that can be easily accessed from a remote computer through a local area network (LAN) or enterprise intranet. Successful shared resource access allows users to operate as if the shared resource were on their own computer. The most frequently used shared network environment objects are files, data, multimedia and hardware resources like printers, fax machines and scanners.
4).  Answer the following questions
A). What are the common problems in the hardware resources? (Answer in 200-300 words.)
Blank monitors
A blank monitor is the most common computer problem. Most people who work with computers might have dealt with such non-working blank monitor at least once. In such cases, first and foremost check the supply cord and power systems. Sometimes, the video cable might be loosened. Just push the video cable and place it again, it should help your now.
Mouse Problems
The mouse is used for a variety of purposes, such as playing games or opening files and moreover, it facilitates easy navigation, thus easy access to your data. The most common problems related to the mouse include failure to move, connection problems, freezing on the screen or damage to the mouse.
Jumpy Mouse
Jumpy Mouse! Sounds strange right?  A jumpy mouse is just a muted mouse i.e. cannot be scrolled. If you have a track and ball mouse, then simply turn it over and open the ball container and remove the excess debris and clean the dirt that lines the rollers. For an optical mouse, eliminate the dust that has collected around the optical sensor.
PC won’t recognize my USB camera
In this case, even when you connect your USB camera, you PC might not be able to recognize it and hence throw errors like “Device not recognized” error. This might be due to the USB connector problems or the software malfunctioning. Before plugging in the camera, turn it on. This action can usually solve your problem.
My smartphone will not synch with my PC
In order to ensure backup of your smartphone, it is important that you regularly synch your phone content with your computer. At times, your PC might fail to sync with your smartphone. It can be due to many reasons. Sometimes it is required that all programs are closed, during synching or backup.
Keyboard Problems
As we all know the keyboard is a vital part of any computer. It not only allows typing, but it also gives commands as well. However, you might encounter some common potential problems with the keyboard that includes keyboards that will not connect to the computer, stuck keys, broken keyboards or keyboards where the letters end up jumbled.
Power Cord Problems
Whether it is a laptop or a desktop, power cords are a vital part of any computer. The desktop needs the power cord to work. A laptop can run on batteries for a limited amount of time, but then needs the power cord for recharging. The most common problem with the power cord is an improper connection.
Motherboard Problems
The motherboard contains several parts of the computer including the RAM, BIOS system, mass storage and CPU. The computer motherboard contains several devices, which can create numerous potential problems. Problems with the motherboard range from too little RAM to BIOS problems. Fixing the problems will depend on the specific problem and, in the worst-case scenario, purchasing a new motherboard will fix the problems.
B). How you troubleshoot the common hardware problems? can (Answer in 150-200 words)
PC overheating:
A heating PC slows down the whole system and leads to frequent crashes.Heat is the measure Reason for PC hardware problems. Ensure if its computer freeze or lockup. Generally, your computer temperature is controlled by the internal fan called the Heat Sink. Dust is another enemy of PC hardware as it sticks on motherboard and electrical components. You can control overheating by removing dust from around the internal fan.
Noisy Computer
It means that the computer system is making noise while running. The reason of Noisy Computer is Dirty Fan. The dust particles stick on the Fan including the Heat Sink and other parts such as Motherboard and other electrical parts of computer. This dust Blocks the smooth action of Fan and causing the fan to make noise. Clean your system completely by removing motherboard from its place and clean the Fan and Heat sink with a brush or soft cloth.
Answer the questions below:
List and explain the common methods for installing device drivers. Write in about 80-100 words.
Visit the part manufacturer’s website and download the latest Windows driver
You often find the manufacturer’s website stamped somewhere on the part’s box. If you can’t find it, search for the part manufacturer’s name on Google and locate its website. Look in the website’s Support, Downloads, or Customer Service area. There, you usually need to enter your part’s name, its model number, and your computer’s operating system (Windows 10) before the website coughs up the driver. No Windows 10 driver listed? Try downloading a Windows 8.1, 8, or 7 drivers, instead — they sometimes work just as well.
Run the driver’s installation program
Sometimes clicking your downloaded file makes its installation program jump into action, installing the driver for you. If so, you’re through. If not, head to Step 3.
If the downloaded file has a little zipper on the icon, right-click it and choose Extract All to unzip its contents into a new folder that contains the files. (Windows names that new folder after the file you’ve unzipped, making it easy to relocate.
Right-click the Start button and choose Device Manager from the pop-up menu
The Device Manager appears, listing an inventory of every part inside or attached to your computer. A yellow triangle with an embedded exclamation point icon appears next to the trouble making part.
Click your problematic device listed in the Device Manager window. Then click Action from the Device Manager’s menu bar and choose Add Legacy Hardware from the drop-down menu.
The Add Hardware Wizard guides you through the steps of installing your new hardware and, if necessary, installing your new driver. Beware, though: This last-ditch method of reviving problematic parts can frustrate even experienced techies.
Luckily, you need to install drivers only in either of these two cases:
You’ve just bought and installed a new piece of hardware, and it’s not working correctly. The drivers packaged with newly bought parts are usually old. Visit the manufacturer’s website, download the latest driver, and install it. Chances are good that the new driver fixes problems with the first set of drivers.
You’ve plugged in a new gadget that Windows doesn’t recognize. Tracking down and installing the latest driver can often fix the problems.
What do you understand by the term “configuring and managing the user profiles”? Write in about 150-200 words
ANS:
In a Windows environment, a user profile is a record of user-specific data that define the user’s working environment. The record can include display settings, application settings, and network connections. What the user sees on his or her computer screen, as well as what files, applications and directories they have access to, is determined by how the network administrator has set up the user’s profile. Roaming profiles are user profiles that are stored in the server. Each time the user logs on, their profile is requested and sent to whatever machine makes the request. This allows the user to move from machine to machine and still maintain a consistent personal working environment. Network administrators find roaming profiles to be especially beneficial in a work or learning environment when more than one user shares the same computer, or when a user moves from place-to-place during a workday.
5).  Explain each of the following terms in 100-150 words:
A). Local profiles
A client profile put away locally on a PC running Microsoft Windows NT. A nearby profile is made for a client the first run through the client effectively signs on to their PC. On the off chance that the client doesn’t have a reconfigured wandering client profile at the hour of the first logon, Windows NT duplicates the default client profile to the new local client profile organizer. local profiles are made for all clients who intuitively sign on to PCs running Windows NT with the goal that they can get to their very own settings on that machine. Every client who signs on to a machine in this manner has their own local profile put away on the machine. Nearby profiles are put away in the organizer System Root Profiles. Every client’s profile is put away in a sub organizer that is named after the username of the client and contains the client’s close to home settings. The individual settings incorporate both the presence of the work area and Start menu and the client’s system associations, (for example, mapped drives). Regardless of whether clients have a wandering profile that enables them to sign on from any machine in the system and get their own settings, each machine additionally stores a local duplicate of their profiles on the off chance that the system is down when they attempt to sign on
B) Roaming profiles
Roaming profiles are stored on a server and can be accessed by logging into any computer on the network.  In a roaming profile, when a user logs onto the network, his/her profile is copied from the server to the user’s desktop.  When the user logs off their computer, the profile (including any changes that the user might have made) is copied back to the server.  A major drawback of roaming profiles is that they can slow down the network.  Windows user profiles often become very large as the user profile data continues to grow.  If you have a large roaming profile, the login and logoff times may take a significant amount of time.A roaming user profile is a concept in the Windows NT family of operating systems that allows users with a computer joined to a Windows Server domain to log on to any computer on the same network and access their documents and have a consistent desktop experience, such as applications remembering toolbar position
C). Desktop settings
Desktop setting is the process of adjusting the look, feel and organization of a Windows end-user experience. In general, any adjustment to the user interface that deviates from the default installation settings may be a setting, but users typically personalize a desktop to improve the personal comfort of the user interface, enhance its visual behaviours or reflect personal interests.Desktop setting also involves selecting from a variety of available themes, which combine desktop backgrounds, window colour schemes, sounds and screen savers.  In the Windows 7 environment, any user can personalize a desktop for his user account. When users share a computer with multiple user accounts, each user can personalize the desktop for his own account. To access Windows 7 desktop personalization, right-click anywhere on the open desktop, and left-click the Personalize entry at the bottom of the drop-down menu. This opens a Personalization dialog box.
D). Screen Management/display properties
The display properties window is accessible from the Windows Control Panel, or by simply right-clicking your desktop. The display properties window allows access top several settings, such as the Windows colour scheme and background themes, resolution and monitor system drivers Accessing the Display Properties. Your desktop is the on-screen window area on which folders, files, icons, shortcuts may appear. It is customized through the property’s menu selection. Properties are settings that give information, status, and options for almost every element of the Windows system.
E). Shortcuts
A shortcut is a link that points to a program on the computer. Shortcuts allow you to create links to programs in any folder, Start bar, Task bar, desktop or other locations on the computer. A shortcut in Windows has a small arrow in the bottom left corner of the icon. Shortcut files end with a file extension of. link. The picture shows an example of a Windows shortcut that links to the game Sim-city. A shortcut is useful for accessing software programs or files more easily. Having a shortcut on the Windows desktop eliminates the need for users to look through the Start menu Programs list to find a specific software program. A shortcut also makes it much quicker to open a file and not have to dig through folders on the computer to find a file.
5).  List and define the standard organisational help desk procedures. (Write in about 150-200 word)
Supported-Products Policy: A successful IT help desk defines the hardware and software products it supports. No organization can support every device and every application. Defining the universe of supported products and providing users with this information sets reasonable expectations for help desk services. Hardware procurement policies that trigger the replacement of machines as they reach their useful life span, determine the devices the help desk must support. A software support policy specifies that service technicians only provide users with help on legally licensed, company-approved software. To avoid misunderstandings, a policy may also state that the help desk cannot support users’ personal equipment.
Service-Level Policy: An effective IT support policy includes information about the level of service that the help desk provides. The policy sets standards for the length of time technicians take to perform such tasks as resolving routine user issues, setting up new systems and ending network outages. It may take anywhere from 15 minutes to several business days to solve a problem, depending on the size of the organization and the complexity of the problem. A service-level policy also establishes communication protocols for problems so severe that they can’t be resolved within the specified time. For example, the help desk policy may designate a single point of contact who communicates with the user about progress made toward fixing a problem.
Service Procedures: Documenting the IT help desk’s procedures gives technicians a template for providing users with consistent service. A written procedure walks the technician through the process of collecting information about the user, the user’s system and the reason for the help desk call. Next, the technician assesses the severity of the problem, creates a “ticket” or report for the incident, and uses resources such as a support database to resolve the issue or escalate it to someone who can resolve it.
Service Desk Evaluation Procedures: Help desk service providers use several procedures to measure the quality of their performance. Service calls are often recorded and reviewed by supervisors who check a technician’s compliance with policies and procedures and evaluate the interaction with the user. In addition, many companies use a ticket-tracking system that provides objective feedback about how long it takes technicians to resolve different kinds of incidents. Surveying customers about their satisfaction with their help desk experience is another way to gather useful information and assess the help desk’s value to an organization.
7).  Explain “process scheduler” and its characteristics in your own (200-250 words)
The Process Scheduler is an agent that initiates batch and report processes on a server. Although this element of People-soft infrastructure is only of limited direct interest to the DBA, there are some aspects of the Process Scheduler of which you should be aware. describe the architecture and configuration of the Process Scheduler, and the data that is set up when a process is scheduled to be run by an operator in the PIA. I also discuss some configuration options and administrative tasks that can prevent the overhead of the Process Schedulers and batch programs from affecting the performance of the whole system. When a process is scheduled to run, several request records are inserted into various tables in the database. Process Schedulers regularly poll these tables looking for work. The polling frequency is configured in the Server Definition Several Process Scheduler definitions for different operating systems are delivered with People Tools. Most installations configure Process Schedulers to use these delivered definitions before creating further definitions. It is usual to configure schedulers for the same People-soft database on at least two separate physical servers in order to avoid a single point of failure, and sometimes more if demand requires. Sometimes, it is also necessary to configure more than one Process Scheduler on the same server. A process may be scheduled to run on a specific scheduler or on any scheduler that is available. From People Tools 8.4, process requests can be load balanced across schedulers. A process may be scheduled to run at a time in the future and to recur on a regular.
The Tuxedo domain is collectively called the Process Scheduler, but the Process Scheduler itself is just the PSPRCSRV server process. Processes are initiated by the PSPRCSRV process.
The Distribution Agent, another Tuxedo server process called PSDSTSRV, transfers report, log, and other output files to the Report Repository. The Report Repository is a shared file system accessible to the web servers. The Distribution Agent is usually configured to post files via HTTP to the Report Repository servlets that write to the shared file system. The Distribution Agent can also transfer files via FTP or XCOPY directly to the shared file system.
The Master Process Scheduler, PSMSTSRV, is an optional server process. It balances the load between the various Process Schedulers on a system by assigning queued requests to different Process Schedulers.
Application Engine can run either as a Tuxedo server processes or as a stand-alone processes initiated by the Process Schedule.

YOU MAY ALSO READ ...  Risk Communication Program
Order from Academic Writers Bay
Best Custom Essay Writing Services

QUALITY: 100% ORIGINAL PAPERNO PLAGIARISM – CUSTOM PAPER