System-Administration-and-Maintenance.pptx

QueenieSalimbangon 48 views 178 slides Sep 16, 2025
Slide 1
Slide 1 of 186
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65
Slide 66
66
Slide 67
67
Slide 68
68
Slide 69
69
Slide 70
70
Slide 71
71
Slide 72
72
Slide 73
73
Slide 74
74
Slide 75
75
Slide 76
76
Slide 77
77
Slide 78
78
Slide 79
79
Slide 80
80
Slide 81
81
Slide 82
82
Slide 83
83
Slide 84
84
Slide 85
85
Slide 86
86
Slide 87
87
Slide 88
88
Slide 89
89
Slide 90
90
Slide 91
91
Slide 92
92
Slide 93
93
Slide 94
94
Slide 95
95
Slide 96
96
Slide 97
97
Slide 98
98
Slide 99
99
Slide 100
100
Slide 101
101
Slide 102
102
Slide 103
103
Slide 104
104
Slide 105
105
Slide 106
106
Slide 107
107
Slide 108
108
Slide 109
109
Slide 110
110
Slide 111
111
Slide 112
112
Slide 113
113
Slide 114
114
Slide 115
115
Slide 116
116
Slide 117
117
Slide 118
118
Slide 119
119
Slide 120
120
Slide 121
121
Slide 122
122
Slide 123
123
Slide 124
124
Slide 125
125
Slide 126
126
Slide 127
127
Slide 128
128
Slide 129
129
Slide 130
130
Slide 131
131
Slide 132
132
Slide 133
133
Slide 134
134
Slide 135
135
Slide 136
136
Slide 137
137
Slide 138
138
Slide 139
139
Slide 140
140
Slide 141
141
Slide 142
142
Slide 143
143
Slide 144
144
Slide 145
145
Slide 146
146
Slide 147
147
Slide 148
148
Slide 149
149
Slide 150
150
Slide 151
151
Slide 152
152
Slide 153
153
Slide 154
154
Slide 155
155
Slide 156
156
Slide 157
157
Slide 158
158
Slide 159
159
Slide 160
160
Slide 161
161
Slide 162
162
Slide 163
163
Slide 164
164
Slide 165
165
Slide 166
166
Slide 167
167
Slide 168
168
Slide 169
169
Slide 170
170
Slide 171
171
Slide 172
172
Slide 173
173
Slide 174
174
Slide 175
175
Slide 176
176
Slide 177
177
Slide 178
178
Slide 179
179
Slide 180
180
Slide 181
181
Slide 182
182
Slide 183
183
Slide 184
184
Slide 185
185
Slide 186
186

About This Presentation

system administrator and maintenance


Slide Content

System Administration and Maintenance IT 311

About the Course: The course focuses on system administrator concepts and how information technology services can be implemented and provided in the organization's IT infrastructure. https://en.wikiversity.org/wiki/System_administration#Typical_usage https://su.edu.ye/ce/wp-content/uploads/sites/3/2021/12/System-Administration-Maintenance.pdf

Introduction What is System Administration? User Account Management Hardware Management Data Backups Software Installation/Maintenance System Monitoring

What is System Administration? System administration is typically done by information technology experts for or within an organization. Their job is to ensure that all related computer systems and services keep working.

A system administrator, or sysadmin , is a person responsible to maintain and operate a computer system or network for a company or other organization. System administrators are often members of an information technology department.

The duties of a system administrator are wide-ranging, and vary from one organization to another. System administrators are usually charged with installing, supporting, and maintaining servers or other computer systems, and planning for and responding to service outages and other problems.

Other duties may include scripting or light programming , project management for systems-related projects, supervising or training computer operators , and being the equivalent of a handyman for computer problems beyond the knowledge of technical support staff.

It is common for systems administrators and systems analysts charged with developing and maintaining computer processes to identify operational and developmental systems.

Related Fields: Many organizations staff other jobs related to systems administration. In a larger company, these may all be separate positions within a computer support or Information Services (IS) department. In a smaller group they may be shared by a few sysadmins, or even a single person.

Related Fields: A database administrator (DBA) maintains a database system, and is responsible for the integrity of the data and the efficiency and performance of the system. A network administrator maintains network infrastructure such as switches and routers, and diagnoses problems with these or with the behavior of network-attached computers. A security administrator is a specialist in computer and network security , including the administration of security devices such as firewalls, as well as consulting on general security measures.

Related Fields: Technical support staff respond to individual users' difficulties with computer systems , provide instructions and sometimes training, and diagnose and solve common problems. A computer operator performs routine maintenance and upkeep, such as changing backup tapes.

Related Fields: A systems analyst documents , trouble shoots, and develops existing and new computer and work processes and systems. In some organizations, a person may begin as a member of technical support staff or a computer operator, then gain experience on the job to be promoted to a sysadmin position and afterwards an IT Manager.

Duties of a system administrator A system administrator's responsibilities typically include: Morning checks of systems/software. Performing backups of data. Applying operating system updates, and configuration changes. Installing and configuring new hardware/software.

Duties of a system administrator System performance tuning. Keeping the network up and running.

In larger organizations, some tasks listed above may be divided among different system administrators or members of different organizational groups. For example, a dedicated individual may apply all system upgrades, a Quality Assurance (QA) team may perform testing and validation, and one or more technical writers may be responsible for all technical documentation written for a company.

In smaller organizations, a system administrator can also perform any number of duties elsewhere associated with other fields like: Technical support Database administration (DBA) Network administration/analyst and specialist Application analyst Security administration Programming

System administrators, in larger organizations, also tend not to be system architects, system engineers, or system designers, however, like many roles in this field, demarcations between systems administration and these other roles are often not well defined in smaller organizations. However, even in larger organizations, senior systems administrators often have skills in these other areas as a result of their working experience. In smaller organizations, IT/computing specialties are less often discerned in detail, and the term "system administrator" is used in a rather generic way — they are the people who know how the computer systems work and can respond when something fails.

Being an administrator The primary goal of being a system administrator is to be as lazy as possible. Not lazy in the sense that you do no work, but lazy in the sense that you get the computer to do the hard and repetitive jobs, and you do the thinking jobs. The primary goal of being a system administrator is to be as lazy as possible. Not lazy in the sense that you do no work, but lazy in the sense that you get the computer to do the hard and repetitive jobs, and you do the thinking jobs.

History of System Administrator A sysadmin emerged from the Unix-enabled explosion in mini-computer capabilities in the mid-to-late 1970s, peaked 1980 to 2005, and has been in decline as outsourcing of enterprise platforms took hold During its lifetime, the occupation matured and professionalized, as indicated by the SAGE-AU Body of Knowledge. it also splintered, with continual change in the focus of technology - from minis to micros, from star networks to LANs and WANs and VPNs, from terminals to workstations to PCs to handhelds, from uniprocessors to multi-processor configs

History of System Administrator The decline of the sysadmin has been hastened by reduction of the magic of a guild-member, via the luster of a profession, and the respectability of a trade, all the way down to the blind following of structured clerical recipes. Even more depressing is the way that IT costs have spiraled, as the savings that arise from paying low wages for dumbed-down jobs have been eaten up by the need for vastly greater numbers of people who see little of the whole, and understand less than they see.

User Account Management A large part of a sys admins job involves troubleshooting and problem solving. A user is anyone who holds an Identity Manager system account. Identity Manager stores a range of data for each user. Collectively, this information forms a user’s Identity Manager identity.

User Account Management Identity Manager categorizes user data in four areas: 1. Identity 2. Assignments 3. Security 4. Attributes

User Account Management Identity - The Identity area defines a user’s account ID , name , contact information , governing organization , and Identity Manager account password . It also identifies the resources to which the user has access, and the password policy governing each resource account.

The following figure illustrates the IDENTITY AREA of the Create User page.

User Account Management Assignments In Identity Manager terminology, a user who is assigned extended capabilities is an Identity Manager administrator. The Security area establishes these extended administrative capabilities for the user, through assignment of:

1. Admin roles — Combine a specific, unique set of capabilities and controlled organizations, facilitating coordinated assignment to administrative users. 2. Capabilities — Enable rights in the Identity Manager system. Each Identity Manager administrator is assigned one or more capabilities, frequently aligned with job responsibilities. 3. Controlled organizations — Assigns organizations that this user has rights to manage as an administrator. He can manage objects in the assigned organization and in any organizations below that organization in the hierarchy.

User Account Management Attributes - The Attributes area defines account attributes associated with assigned resources. Listed attributes are categorized by assigned resource, and differ depending on which resources are assigned.

Accounts Area The Identity Manager accounts area lets you manage Identity Manager users. To access this area, select Accounts from the Administrator Interface. The accounts list shows all Identity Manager user accounts. Accounts are grouped in organizations and virtual organizations, which are represented hierarchically in folders. You can sort the accounts list by full name (Name), user last name (Last Name), or user first name (First Name). https://docs.oracle.com/cd/E19944-01/819-4481/IDM_admin_users.html

Figure 4. Accounts List

ACTIONS LISTS IN THE ACCOUNTS AREA Use the actions lists (located at the top and bottom of the accounts area) to perform a range of actions. Actions list selections are divided among: 1. New Actions — Create users, organizations, and directory junctions. 2 . User Actions — Edit, view, and change status of users; change and reset passwords; delete, enable, disable, unlock, move, update, and rename users; and run a user audit report. 3. Organization Actions — Perform a range of organization and user actions.

Working with User Accounts From the Administrator Interface Accounts area, you can perform a range of actions on these system objects. Users — View, create, edit, move, rename, deprovision, enable, disable, update, unlock, delete, unassign, unlink, and audit Passwords — Change and reset Organizations — Create, edit, refresh, and delete Directory Junctions — Create

HARDWARE MANAGEMENT something of an umbrella term that describes any tangible, physical company technology asset, including those currently in use, those in storage, and support equipment.

HARDWARE MANAGEMENT With this definition in mind, hardware assets are generally grouped into four primary categories: End-user devices - End-user devices refer to any company hardware used directly by employees in their day-to-day work. This includes computers, tablets, smart phones, SIM cards, and more. Hardware assets also encompass personal devices used to perform business tasks within an organization.

2. Network/telecom hardware Network and telecom hardware is support equipment that helps facilitate digital and analog communication. This includes routers, load balancers, switches, and telephone- and video-conferencing systems.

3. Data-center equipment Data-center equipment describes all hardware that allows data centers to function effectively, including servers, utilities, and security devices.

4. Peripherals Peripherals are the significant support equipment found throughout the modern-office environment. Peripherals may include scanners, printers, monitors, keyboards, headsets, projectors, and even cables and adaptors.

DATA BACK-UPS Data backup is the practice of copying data from a primary to a secondary location, to protect it in case of a disaster, accident or malicious action. Data is the lifeblood of modern organizations, and losing data can cause massive damage and disrupt business operations. This is why backing up your data is critical for all businesses, large and small.

Data Backup Options Removable Media Removable media is portable, and can be stored in a safe deposit box or off-site location, providing an extra layer of security in case of a disaster. such as CDs, DVDs, and flash drives, has long been a popular method of data protection

Data Backup Options Redundancy Redundancy is a vital aspect of data backup, as it involves creating multiple copies of your data to ensure its safety and accessibility.

Data Backup Options External Hard Drive External hard drives are portable, allowing you to easily move and store your data off-site for added security.

Data Backup Options Hardware Appliances - Hardware appliances can provide a comprehensive, all-in-one backup solution for businesses and may include features such as data deduplication, encryption, and automated backup scheduling.

Data Backup Options Backup Software Backup software is an essential component of any data backup strategy, as it helps automate and streamline the backup process. Cloud Backup Services, Encryption, compression, multiple back-up destinations

Software Installation/Maintenance The computer system can be divided roughly into four components: Hardware Operating System Application Software Users

Operating System provides basic programming instructions to the computer hardware. The operating system is program code that makes it possible for you to start the basic functions of a computer, view text on the computer’s display, store information, access and modify information, log on to a network, connect to the Internet, and run software applications.

OS main functions: FUNCTION 1. PROVIDE A USER INTERFACE Performing housekeeping procedures requested by the user, often concerning secondary storage devices, such as reorganizing a hard drive, deleting files, copying files, and changing the system date FUNCTION 2. MANAGE FILES Managing files on hard drives, DVD drives, CD drives, floppy drives, and other drives Creating, storing, retrieving, deleting, and moving files

OS main functions: FUNCTION 3. MANAGE HARDWARE Managing the BIOS (programs permanently stored on hardware devices) Managing memory, which is a temporary place to store data and instructions as they are being processed Diagnosing problems with software and hardware

OS main functions: FUNCTION 4. MANAGE APPLICATIONS Installing and uninstalling applications Running applications and managing the interface to the hardware on behalf of an application

An operating system contains the following basic components: The application programming interface (API), software that resides between the application software and the operating system kernel, which is the main program code in the operating system. The basic input/output system (BIOS) , a program that verifies hardware and establishes basic communications with components such as the monitor and disk drives. The BIOS usually loads other operating system components on startup and houses a real-time clock for the date and time.

An operating system contains the following basic components: The operating system kernel , the core of the operating system that coordinates operating system functions, such as control of memory and storage. The kernel communicates with the BIOS, device drivers, and the API to perform these functions. It also interfaces with the resource managers. Resource managers , programs that manage computer memory and central processor use. Device driver, programs that take requests from the API via the kernel and translate them into commands to manipulate specific hardware devices, such as keyboards, monitors, disk drives, and printers. The OS also includes optional specialized drivers for other functions and devices, such as sound.

System Requirements Every operating system requires its own set of system requirements depending on the particular functionalities of the operating system. In most cases contemporary operating systems require greater system requirements compared to their predecessors. For example,

Windows 8 Processor : 1 gigahertz (GHz) or faster with support for PAE, NX, and SSE2 RAM : 1 gigabyte (GB) (32-bit) or 2 GB (64-bit) Hard disk space : 16 GB (32-bit) or 20 GB (64-bit) Graphics card : Microsoft DirectX 9 graphics device with WDDM driver

Windows Vista Home Basic - 1 GHz 32-bit (x86) or 64-bit (x64) processor - 512 MB of system memory - 20 GB hard drive with at least 15 GB of available space - Support for DirectX 9 graphics and 32 MB of graphics memory - DVD-ROM drive -Audio Output

What does NTFS and FAT stand for? NTFS is a high-performance and self-healing file system proprietary to Windows XP Vista 2008 2003 2000 NT & Windows 7, Windows 8, which supports file-level security, compression and auditing. It also supports large volumes and powerful storage solution such as RAID. The most important features of NTFS are data integrity and the ability to encrypt files and folders to protect your sensitive data

What does NTFS and FAT stand for? FAT- File Allocation Table (FAT) file system is a simple file system originally designed for small disks and simple folder structures. The FAT file system is named for its method of organization, the file allocation table, which resides at the beginning of the volume. To protect the volume, two copies of the table are kept, in case one becomes damaged.

1.3 Disc start up What is a startup disk? A boot disk (sometimes called a startup disk ) is a type of removable media, such as a floppy disk or a CD that contains startup files that your computer can use to start Windows. The startup files are also stored on your computer's hard disk, but if those startup files become damaged, you can use the files on a boot disk to start Windows. https://www.studocu.com/row/document/mount-kenya-university/software-engineering/bit2103-hardware-and-software-installation-and-support/11952362

BOOT MEDIA USED FOR THE INSTALLATION The boot device most likely will be the DVD or CD drive. You can use an external drive that connects to the PC by way of a USB port. To enter BIOS setup, you press a key, such as F2 or Del

Computer hardware refers to the physical components of a computer such as the monitor, Keyboard, Mouse, system unit etc. Hardware units (Devices) of a computer can be categorized into five units; Input unit Out p u t Ce n t r a l processing unit (CPU) or processor Main Memory Secondary storage/Backing Storage

POWER REQUIREMENTS The power supply converts the alternating current (AC) line from your socket to the direct current (DC) needed by the personal computer. Power supplies, often referred to as "switching power supplies", use switcher technology to convert the AC input to lower DC voltages. The typical voltages supplied are: 3.3 volts 5 volts 12 volts The main specification of a power supply is in watts.

Signs of Power Supply Failure Computer turns on for some time then it suddenly turns off. Random black & blue screen crashes Random Computer Crashes and Restarts. Display Issues Strange noises from the PC case PC won’t start, but the case fans spin.

Types of connectors and Ports VGA Cable - Also known as D-sub cable, analog video cable (Visual Display Analog) Connect one end to: computer monitor, television (PC input port) Connect other end to: VGA port on computer VGA cable is a lead used for transmitting video signals, and it is most commonly used to link computers with monitors.

Types of connectors and Ports DVI Cable - DVI cables are used with DVI-enabled graphics cards to utilize the Digital Visual Interface, (sometimes called Digital Video Interface), in order to maximize the benefit of flat panel digital displays. The traditional Video Graphics Array (VGA) interface was designed for use with analog CRT (cathode ray tube) monitors.

Types of connectors and Ports HDMI Cable - Connect other end to: HDMI port on computer HDMI® (High-Definition Multimedia Interface) is an interface standard used for audiovisual equipment, such as high-definition television and home theater systems.

Types of connectors and Ports PS/2 Cable - Connect one end to: PS/2 keyboard, PS/2 mouse A PS/2 connector is a plug and socket system used for connecting keyboards and mice to PC computers.

Types of connectors and Ports Ethernet Cable - Also known as RJ-45 cable Connect one end to: router, network switch Connect other end to: Ethernet port on computer. Types of Ethernet Cable: Straight-Through Wired Cables Cross-Over Wired Cables

Types of connectors and Ports 3.5mm Audio Cable - Also known as phone connector (since 3.5mm jacks are often found on mobile phones too) Green audio port: computer speakers or headphones Pink audio port: microphone Blue audio port: MP3 player, CD player, DVD player, turntable, electric guitar etc (line-in port to play and record sounds from the above devices)

Types of connectors and Ports USB Cable - For USB computer cable connections, there are 2 formats that are in popular use: USB 2.0 and the newer USB 3.0. Storage devices: USB flash drive, external hard drive, external optical drive Input devices: USB keyboard (wired and wireless), USB mouse (wired and wireless), webcam, scanner, gamepad Output devices: printer, all-in-one office machine, USB speaker Wireless adapters: network (Wi-Fi) adapter, bluetooth adapter, 3G adapter Data (and charging) cable for mobile devices such as mobile phone, tablet, MP3 player

Types of connectors and Ports Computer Power Cord- Connect other end to: power supply unit (see image below), computer monitor

Devices driver A driver is a small piece of software that tells the operating system and other software how to communicate with a piece of hardware. For example, all printers come accompanied with drivers to install that tell the operating system exactly how to print information on the page. Sound card drivers tell your software exactly how to translate data into audio signals that the card can output to a set of speakers. The same applies to video cards, keyboards, monitors, etc.

Disk Partitioning A partition is a segment of the hard disk, created by dividing the disk logically into discrete units. You create partitions for a number of reasons: say, to organize your applications and operating system on drive C while storing your data on drive D. You might also partition a disk for more technical reasons, such as to run multiple OSes on the same machine.

Formatting Reasons why you might want to format a hard drive: Clean installation of windows Get rid of the virus or malware Formatting is the process of deleting all the data on the hard drive.

Disk space Alternatively referred to as disk capacity, disk space is the total amount of bytes that a disk drive or disc is capable of holding. Typically, the storage device is the computer's hard drive, but it can also be a USB thumb drive, a CD or DVD, a memory stick/card, or a Floppy disk. Disk space is usually measured in kilobytes (KB), megabytes (MB), gigabytes (GB), or terabytes (TB). For example, a hard drive that is 500GB is capable of holding 500 Gigabytes of information

Memory Capacity RAM is an acronym for RANDOM ACCESS MEMORY , a type of computer memory that can be accessed randomly; that is, any byte of memory can be accessed without touching the preceding bytes.

Software customization Task bar - The Taskbar contains two major items: the Start menu and the System Tray ( systray ). The Start menu is on the left side of the Taskbar and is easily identifiable: it is a button that has the word Start on it. The System Tray is located on the right side of the Taskbar and contains only a clock by default, but other Windows utilities (for example, screensavers or virus-protection utilities)

Antivirus A computer virus is a small, deviously ingenious program that replicates itself to other computers, generally causing those computers to behave abnormally. Generally speaking, a virus’s main function is to reproduce. The process of running an antivirus program on a computer is known as inoculating the computer against a virus.

Resolving hardware conflicts The following behaviour of your PC: It runs noticeably slower It spontaneously reboots Other hardware stops working properly or at all It fails to Shutdown It will not boot, or It crashes.

Resolving hardware conflicts possible solutions for these issues: Update the drivers for the new hardware Move the card to a different slot in your PC Disable On board Devices Update the BIOS on your motherboard Try the card in a different PC and check if it works correctly there.

UNIT II: Desktop, Servers, and Services Desktop management is the process of systematically managing all computers in an organization, including desktop, laptop, tablet, and other end-user computing devices. Desktop management is part of the larger field of systems management, which includes all of the IT systems and services utilized by an organization.

UNIT II: Desktop, Servers, and Services Because information is becoming such a valuable resource of the digital firm, the infrastructure used to care for the resource takes on added importance. With the proliferation of computing devices such as laptop computers, smartphones, and tablet computers, people want the ability to access information wherever they are whenever they want it. Data centers help give them those opportunities.

Storage, Input, and Output Technology Secondary Storage Technology Besides the primary storage areas of ROM and RAM, other storage devices include the hard disk drives in almost every computer, removable disks, and magnetic tape storage. These are referred to as secondary storage. The kind of storage necessary is dictated by the computer’s size and how it’s used. As with most other components, the cost is dropping significantly while the technology is improving all the time.

Storage, Input, and Output Technology Solid state drives (SSDs) are used in smaller PCs, smartphones, and tablets. They are smaller in physical size while allowing storage of much more data.

Storage, Input, and Output Technology USB flash drives are a convenient way to store data but more importantly, give you a way to take it with you wherever you go. Flash drives come in a variety of storage sizes and you simply plug them into a USB port on any computing device to access the contents.

Storage, Input, and Output Technology Optical disks have become one of the most preferred methods of storing data. Although CDs are still used, DVDs are quickly replacing them.

Contemporary Hardware Trends The network is the computer. Louis Gertsner , former CEO of IBM, uttered this phrase as far back as the mid-1990s. It’s even truer now than it was back then. We’re no longer content to view data in a plain-text format on paper. We want to enhance our communications with graphics, video, and audio. We don’t want four or five different computing devices but everything all rolled into one package. And, we want all of it accessible wherever we are whenever we want it.

Contemporary Hardware Trends The Mobile Digital Platform One of the most dynamic hardware trends to appear for personal and business use is the increased use of cellphones and smartphones for computing tasks. People are no longer tied to a desktop PC or laptop computer to transmit data, surf the Web, send email and instant messages, or access data on corporate systems. Netbooks, tablet computers, and digital e-book readers, such as the Amazon Kindle, are also taking on computing tasks that used to require a full-size computer.

Contemporary Hardware Trends Consumerization of IT and BYOD The consumerization of IT explains the technology along with BYOD , bring your own device. But, along with bringing their own devices, employees are bringing a new set of problems to the doorstep of their organization’s IT department. The most prevalent problem is securing the business’s core information systems from threats posed by malware and data theft. Access to the corporate network must continue to be protected while still giving employees fairly easy access to data, information, and applications.

Nanotechnology and Quantum Computing One way chip makers are overcoming size barriers is to use nanotechnology to create computer chips that are thousands of times smaller than their predecessors. That enables manufacturers to make more powerful, smaller chips for cell phones, iPod-like devices, and PDAs while increasing computing capacity.

Virtualization Virtualization. It’s the process of running multiple operating systems and application programs on one machine and increasing the overall utilization rates of the device. Instead of having ten servers running ten different applications, virtualization consolidates the programs onto one or two servers.

Cloud Computing Cloud Computing is the delivery of computing services—including servers, storage, databases, networking, software, analytics, and intelligence—over the internet (“the cloud”) to offer faster innovation, flexible resources, and economies of scale.

Cloud Computing Platform Three Types Of Services: Cloud infrastructure as a service: allows customers to process and store data, and use networking and other resources available from the cloud. Cloud platform as a service: the service provider offers infrastructure and programming tools to customers so they can develop and test applications.

Cloud Computing Platform Cloud software as a service: the vendor provides software programs on a subscription fee basis. Google apps is a great example of cloud software as a service because they provide easy access to common business applications through Web browsers.

What is network configuration? Network configuration is the process of assigning network settings, policies, flows, and controls. In a virtual network, it’s easier to make network configuration changes because physical network devices appliances are replaced by software, removing the need for extensive manual configuration.

What is network configuration? Network configuration can also be automated and managed via a centralized configuration manager network configuration manager, further reducing manual IT workload and making it easier to: Maintain a network Make configuration changes Relaunch devices Track and report data

What are network topologies? Network topology can be physical (referring to where physical devices are placed in relation to each other) or logical (referring to how data is transmitted through the network, including any virtual or cloud resources). When choosing a network topology, an organization must consider the size of its network, its performance requirements and the flow of its traffic, among other factors.

What are network topologies? Common network topologies include: Bus: Every node in the network is connected along a linear path. This simple topology is used most often for small networks. Ring : Nodes are connected in a loop, and traffic may flow in one direction or in both directions. Ring networks tend to be cost-effective, but not as scalable or stable as other network topologies.

What are network topologies? Star: A central node connects to all other nodes in the network. This is a common and stable topology that’s often used for local area networks (LANs). Mesh: Nodes are linked in such a way that multiple paths between nodes are possible. This type of network topology increases the resiliency of the network, but also increases cost. A network may be fully meshed (all nodes connecting to all other nodes) or partially meshed (only some nodes having multiple connections to other nodes).

How can you check your network configuration? In a command-line environment, the commands ipconfig (for Windows network configuration) and ifconfig (for Linux network configuration, as well as Mac OSX and other Linux-like environments) allow you to view information about your network configuration and to configure your networks interface.

Remote Administration Remote administration can be broadly defined as any method of controlling, monitoring a networked device from a remote location. Software that allows remote administration is known as Remote Administration Tools . So RAT gives someone access to remotely access your device as you are doing it physically but from any other location. With these tools, another person can access your files, camera, and can even turn off your device.

Who uses Remote Administration Tools? Sometimes when our system has a fault then a technical guy accesses our computer remotely through the internet and removes the fault. It is used by hackers to get access to your computer and steal important information from it and harm your data. Usually, hackers attach a malicious code with some kind of game or movie which when downloaded by you comes in your system, and then hackers can easily access your system.

Installation of RAT Manually : You can install legitimate RAT manually to your system, or someone who knows how to install it. Whereas hackers have their own techniques to install RAT on your system. Stealthy: Hackers attach these programs with a file on the internet like movie or game. When you download it the malicious software also gets installed to your System and can be accessed.

Common tasks for which remote administration is used SHUTDOWN Shutting down rebooting another computer over a network. ACCESSING PERIPHERALS Using a network device, like printer Retrieving streaming data, much like a CCTV system.

Common tasks for which remote administration is used MODIFYING Editing another computer's Registry settings modifying system services, and Installing software on another machine. VIEWING Remotely assisting others Supervising computer or internet usage

Common tasks for which remote administration is used HACKING Computers infected with malware such as Trojans sometimes open back doors into computer systems which allows malicious users to hack into and control the computer. Such users may then add, delete, modify or execute files on the computer to their own ends.

Tips on How to Avoid RAT Be careful when you are using the internet and downloading files online. Always Enable your Anti-Viruses. Don’t allow any malicious file to your system. Update your anti-virus from time to time.

UNIT III: System Start-up and Shutdown System startup refers to the procedure for starting the computer software, namely the operating system, and other programs. System startup does not refer to installing the system for the first time. System startup involves several steps: resetting the system placing system files on the system disk, if the files do not already reside there starting the system using an autoboot or interactive sequence

UNIT III: System Start-up and Shutdown Shut down is closing all programs in preparation to turn off a computer's power. The operating system is the last program to be closed as part of a computer's shut down process.

What is a bootstrap program? A bootstrap program is the first code that is executed when the computer system is started. The entire operating system depends on the bootstrap program to work correctly as it loads the operating system. A figure that demonstrates the use of the bootstrap program is as follows −

In the above image, the bootstrap program is a part of ROM which is the non-volatile memory. The operating system is loaded into the RAM by the bootstrap program after the start of the computer system. Then the operating system starts the device drivers.

The bootstrapping process does not require any outside input to start. Any software can be loaded as required by the operating system rather than loading all the software automatically. The bootstrapping process is performed as a chain i.e. at each stage, it is the responsibility of the simpler and smaller program to load and execute the much more complicated and larger program. This means that the computer system improves in increments by itself. Bootstrapping Process

Without bootstrapping, the computer user would have to download all the software components, including the ones not frequently required. With bootstrapping, only those software components need to be downloaded that are legitimately required and all extraneous components are not required. This process frees up a lot of space in the memory and consequently saves a lot of time. Benefits of Bootstrapping

Without bootstrapping, the computer user would have to download all the software components, including the ones not frequently required. With bootstrapping, only those software components need to be downloaded that are legitimately required and all extraneous components are not required. This process frees up a lot of space in the memory and consequently saves a lot of time. Benefits of Bootstrapping

The program that starts the “chain reaction” which ends with the entire operating system being loaded is known as the boot loader (or bootstrap loader). The term creatively came from early designers imagining that before a computer “runs” it must have it’s “ boots strapped ”. The boot loader’s only job is to load other software for the operating system to start. Often, multiple-stage boot loaders are used, in which several small programs of increasing complexity sequentially summon one after the other, until the last of them loads the operating system. Boot Loader

The boot device is the device from which the operating system is loaded. Typically, the BIOS will allow the user to configure a boot order. If the boot order is set to: 1. CD Drive 2.Hard Disk Drive 3. Network Boot Devices

Restarting (or rebooting) puts the computer through a process that shuts it down and then starts it back up again. Restarting

The hard drive is an important part of computer parts, a storage device that provides always saving data even after the power supply interrupted. A partition is an area of a hard disk that can be formatted and assigned a drive letter, (The terms volume and partition are often used interchangeably). Your system partition is typically labeled with the letter C. Letters A and B are reserved for removable drives or floppy disk drives. UNIT III: What is a partition or volume?

 unallocated disk space (unformatted space that is not part of an existing partition or volume) or  free space within an extended partition on the hard disk. How to create partitions?

A system partition is a primary partition that contains the hardware-related files and the Boot folder (the boot loader, a piece of software responsible for booting the OS.), these tell the computer where to look to start Windows. How to create partitions?

Primary Extended Logical. The total data storage space of a PC HDD can contain at most four primary partitions, or alternatively three primary partitions and an extended partition. Types of partitioning

Primary and Extended are the basic divisions (partitions) of the hard disk, later this extended can be divided into any number of logical partitions. Types of partitioning

1. Primary Partition: The primary partition contains the used operating system (such as Windows) in addition to any files or other data (such as My documents, Program files ), a primary partition is in which an Operating System can be installed, hard disk may contain a maximum of 4primary partitions, primary partition must be formatted with appropriate file system before install the operating system, only primary partition can be set as active. Types of partitioning

2. Extended Partition: Extended partition cannot be used directly unless partition it to multiple logical drives. We can consider the extended section as the container that contains several logical partitions, and cannot use the extended section for data storing, but it must be divided into a number of logical partitions that are used for data storing. Types of partitioning

3. Logical Partition: Logical partitions cannot exist unless within the extended partition, and logical partitions can contain ordinary files and data, logical drive cannot be set as active. You can use several programs to partition your hard drive, such as the Fdisk . Types of partitioning

You can repartition your hard disk by using the Shrink feature in Disk Management . You can shrink an existing partition or volume to create unallocated disk space, from which you can create a new partition or volume . Repartitioning hard disk

A volume is the part of the disk that the user uses and/or can interact with easily. So, it is clear that despite partition, volume is not raw and without format. It is highly important to understand volume is formatted and has a specific file system. Not only does disk volume contain a file system, but also it has named a size specifically. In computer sciences, a formatted storage device is called a volume which can be divided into several logical partitions. What Is a Disk Volume?

Partition vs Volume: What's the Difference?

A volume is a single accessible storage area with a single file system. A partition is a logical division of a hard disk. Both are the units of data storage, but a volume is not the same thing as a partition. Partition vs Volume: What's the Difference?

Printing is a process for mass reproducing text and images using a master form or template. Printing

The Printing Architecture is one of the major components from Windows architecture. It consists of a print spooler and a set of printer drivers . The applications can create print jobs and send them to the printers by calling device-independent Win32 printing and GDI functions. Printer drivers include a user interface component that allows users to control a printer's selectable options (Paper Size, Number of copies, Coloration, Pages per sheet, etc.). Printing Architecture

The printing process is divided into three groups of steps: 1. Client processes 2. Spooler processes 3. Printer processes Printing Process

Each process performs some operations and passes the print job to another process. For example, user fires a print document from an application, the client process starts the creation of print job by calling the GDI, and after completing the creation of print job, it sends to the spooler. The spooler will perform some operations on that print job and sends to the printer process. The printer processes receive the print job from the spooler process and translate the print language into a bitmap, and then it prints. Printing Process

A user sends a print job from an application. The application calls the Graphics Device Interface (GDI). If print output is produced in RAW format, the GDI is not used. The GDI calls the printer driver for information, which the GDI uses to create a job in printer language. The GDI delivers the job to the spooler. Client Processes

The Graphics Device Interface (GDI) is a legacy component of Microsoft Windows responsible for representing graphical objects and transmitting them to output devices such as monitors and printers. GDI interacts with device drivers on behalf of applications and enables applications to use graphics and formatted text on both the video display and the printer. Client Processes

Print Spooler is software built into the Windows operating system that temporarily stores print jobs in the computer's memory until the printer is ready to print them. It is a special process that manages access to printers by multiple users. For most users, the function of the Spooler is transparent. They generate a job for a printer and go to the printer to pick up the output. The Spooler permits users to continue working without waiting for a print job to finish printing. Spooler Processes

The Spooler has two roles: 1. It spools print jobs by directing the output from a user's process to a print file. It creates an entry in the print queue for the job. It despools print jobs by emptying the print queue, one job at a time per printer, as the assigned printer becomes available. Spooler Processes

Operational Spooler parameters include the following: Up to 600 print files can be maintained on the queue. 60 files can be generated simultaneously per user process. Up to 1500 form queues can be assigned across the system. 125 copies can be generated by a single print request. Up to 1000 printers are supported. Spooler Processes

Most commands also accept the parenthetical ( P option to send the output of a command to the printer. A print job is actually a request for the Spooler to handle the output from the process. The Spooler collects the output intended for the printer and places it in a temporary print file. The Spooler maintains a queue to handle all requests on a first-come, first- served basis. Each entry in the print queue identifies the print file and its destination. Basic Operation of the Spooler

For each entry in the queue the Spooler determines if the assigned printer is available to handle the job. If the printer is available, the job is printed immediately. If the printer is unavailable, this means that either the printer is currently printing a job or the printer is off- line. In both cases, the Spooler holds the print job in the queue until the printer is ready to take the job. Basic Operation of the Spooler

The printer receives the print job from the print spooler. The printer translates the print language into a bitmap, which it then prints. Printer Processes

Print providers are responsible for directing print jobs to local or remote print devices. They are also responsible for print queue management operations, such as starting, stopping, and enumerating a server's print queues. Print providers define a high-level, machine-independent, Operating System-independent view of a print server. All print providers implement a common set of print provider capabilities. Introduction to Print Providers

Print Queue Management : Adding, deleting, opening, closing, enumerating, and setting parameters for print queues. Also, providing notification of changes to a print queue's state. Printer Driver Management : Adding, deleting, enumerating, and specifying a directory for printer drivers. Print Job Creation : Starting and ending a document, starting and ending a document page, writing the job's data stream to a port, reading printer status information. Print Provider Capabilities

Forms Management: Adding, deleting, enumerating, and setting parameters for print forms. Print Processor Management : Adding, deleting, enumerating, specifying a directory for and the data types supported by print processors. Print Monitor Management : Adding, deleting, and enumerating print monitors. Port Management : Adding, deleting, configuring, enumerating, and setting parameters for printer ports. Print Provider Capabilities

Forms Management: Adding, deleting, enumerating, and setting parameters for print forms. Print Processor Management : Adding, deleting, enumerating, specifying a directory for and the data types supported by print processors. Print Monitor Management : Adding, deleting, and enumerating print monitors. Port Management : Adding, deleting, configuring, enumerating, and setting parameters for printer ports. Registry Management : Creating, deleting, and enumerating registry keys and values associated with a print provider. Print Provider Capabilities

Forms Management: Adding, deleting, enumerating, and setting parameters for print forms. Print Processor Management : Adding, deleting, enumerating, specifying a directory for and the data types supported by print processors. Print Monitor Management : Adding, deleting, and enumerating print monitors. Port Management : Adding, deleting, configuring, enumerating, and setting parameters for printer ports. Registry Management : Creating, deleting, and enumerating registry keys and values associated with a print provider. Print Provider Capabilities

Laser Printers Solid Ink Printers LED Printers Business Inkjet Printers Home Inkjet Printers Multifunction Printers Dot Matrix Printers 3D Printers TYPES OF PRINTERS

Laser Printers The laser printer was developed by Xerox in the 1960s when the idea of using a laser to draw images onto a copier drum was first considered. Laser printers are still widely used in large offices as they are traditionally more efficient than inkjet printers. Office Printers

Solid Ink Printers Solid ink printers utilize a unique form of ink technology, designed to save space and money on packaging. The printers melt solid ink sticks during the printing process – a method that can help produce more vibrant tones. Advantages: ● Environmentally-friendly ● Produces vibrant tones ● Made from non-toxic vegetable oils ● Compact design ● Consumables require less storage Office Printers

LED Printers LED printers are similar to laser printers but use a light emitting diode rather than a laser to create images on the print drum or belt. Due to their fewer moving parts – LED printers are often considered more efficient and reliable than laser printers. Our most popular LED printers are produced by OKI. Advantages: ● Reliable and efficient ● Cheaper to manufacture than laser printers ● Often include free warranty extensions Office Printers

Business Inkjet Printers Utilizing inkjet technology on a large scale to accommodate the needs of a busy office with heavy reliance on printed output, inkjet printers are enduringly popular due to their reliability and robust nature. Office Printers

Inkjet Inkjet printers are one of the most common types of printers used in both professional and domestic settings. Developed in the 1950s, inkjet printing technology is still hugely popular today due to its numerous advantages and minimal drawbacks. Home Office Printers

Inkjet Inkjet printers are one of the most common types of printers used in both professional and domestic settings. Developed in the 1950s, inkjet printing technology is still hugely popular today due to its numerous advantages and minimal drawbacks. Home Office Printers

Low-Cost Inkjet Printers Combining the high-quality print capabilities of inkjet technology with lower cost-per page functionality: low cost inkjet printers are well-suited to professional and domestic users working on a budget. Home Office Printers

Low-Cost Inkjet Printers Combining the high-quality print capabilities of inkjet technology with lower cost-per page functionality: low cost inkjet printers are well-suited to professional and domestic users working on a budget. Home Office Printers

Multifunction Sometimes known as all-in-one printers , multifunction printers are often capable of performing printing, copying, scanning, and faxing tasks. This can simplify the completion of multiple tasks within an office or domestic environment, with no need for more than one unit. Home Office Printers

All-in-One Inkjets Combining the technology of inkjet printing with the functionality of a multifunction printer: all-in-one inkjet printers are capable of providing full service to a busy office environment whilst retaining the high-quality prints that inkjet is known for. Home Office Printers

Dot matrix printers It is the oldest established type of printers still available on the market. Images and text are drawn out in tiny dots when a print head strikes an ink-soaked cloth against the paper in the required pattern or formation. Home Office Printers

3D One of the most exciting developments in printing technology history, 3D printing is becoming more affordable for professional and domestic users. Modern 3D printers are capable of producing 3D objects and items using high quality resin. Home Office Printers