You are on page 1of 21

16 bit mode

Legace... can address 2 bytes at a time; cobol and older applications

32 bit mode

can address 4 bytes at a time;

64 bit mode

can address 8 bytes at a time; duo-core CPU's can operate 64 bit mode... should run faster than 32 bits
any software package which automatically plays, displays, or downloads advertisements to a computer after the software is installed on it or while the application is being used

adware

adware

reports on browsing habits and reports and sometimes pop up ads and distasteful websites

application management

registry... edit the registry with regedit.exe ... or reg virtual memory; hard drives; temporary files; services; startup; application stand for whta kind of file it is

Areas to optimize an OS

ATTRIB

Batch Files

A group of commands; extension (.bat); contain DOS (command line) can have .bat extensions tom.bat; control c (cancel stops batch file from running)

Be aware of how memory affected the OS in our lab

Virtual PC's ran slower... mouse was slower... b/c we didn't have enough RAM to support (default for vista was 512 and vista wants 2 or 3 gig)

CD

change director (cd\)

CLS

clear screen

Command driven interfaces

start/run/CMD/enter..... DOS

Command Line; how do you get to a command line

start/run/cmd

computer virus

a computer program that can copy istelf and infect a computer without the permission or knowledge of the user.

cookies

small file that contains some id tags

COPY

copy a bunch of files

CPU operation modes

16 bit and 32 bit and 64 bit

Creating and deleting folders

naming conventions, typically folders do not have extentions,

describe differences/similarities in vista and windows xp

describe what batch files are for

DID (defense in depth)

provide multiple layers of defense for the computer, back it up!, use strong passwords
higher resolution/pixels, sidebar, a lot of multi-media enhancements, vista business has no games

Difference between windows XP and vista

differences in worm/virus

worm scans for ports and doesn't need a host to replicated whereas a virus does

DIR

listing of files (directory)

Disaster prevention/planning

hard drives fail in 3-5 years; back everything up

Disk management tools; chkDSK

checks hard drive for errors (once a month)


goes out and finds files that are broken up into chunks and puts them together which speeds it up; when it defrags it slows the computer down

Disk management tools: defrag

disk management; format

gives you a chance to get a hard drive ready to accept a new system

EDIT

used to create a batch file

Hard Disk Drives Maintenance and hazards; how can you extend the hard drives functional life span

don't like smoke; hot/cold; droppage; water or high humidity areas or dust chkdsk; defrag; good clean power; backups

How long does it take to install virtual PC

1 hour

icon driven interfaces

unknown :)

IPCONFIG/ALL

tells you about your network configuration

KNOW how files, directories, and files structures are created and maintained

1) start/run/CMD 2) tree|more (hierchial file structure, organizational chart) Ubuntu, Mandrake, Red Hat

Linux

List 3 FREE anti virus software products

microsoft, McAffee commercial, Avira, Avast

List disk management tools

chkdsk; defrag; ms config; format

List microsoft OS's (5)

Windows 9x; windows xp; windows vista; windows server; future windows products is windows 7

Make sure your firewall is on to protect yourself!! Name two

cisco, microsoft

malware

a portmanteau from the words malicious and software, is software designed to infiltrate or damage a computer system without the owner's informed consent

MD

make directory

Menu driven interfaces

typically applications... small devices like cell phones... ALT F4 or ALT and the letter.... accessibility option- will end any application in menu)

menu interface

Methods of modifying the registry

regEdit; pretty much anything you do in windows XP will modify the registry
A way to see what our/how it is configured at set up; shows how the OS is configured at start up and allows temporary modifications; start/run/msConfig

MS Config; what is it and how is it used?

Name 3 companies that sell virus protection software

Computer Associates (CA), symantic, AVG

Name other OS's (4)

Unix, Linus, Windows Mobile and Other mobile OS's, Macintosh

Name the three types of user interfaces

GUI, Text based, menu based (INTERFACES)

Name two types of virtualization

Virtual PC; VM ware

Operational modes

16, 32, 64; Windows XP is in 32 bit limited to 3GB of ram; can run a 64 b/c you can add more ram and run faster; more ram can support more applications and run faster;

PAUSE

a type of batch files

PING

if directory is there

Preventative maintenance/ what precautions to reduce problems(3)

Periodically defrag, run check disk, delete temporary internet files

preventative maintenances

updates; backup

Products to protect against a virus

products to protect against adware

protected mode

good because it protects memory from other applications

RD

remove directory

Real Mode

provides the application with real access to all memory... this is not good b/c you can get memory interference causing a crash

Run windows update automatically or at least how many times a month?

ONCE a month... 2nd tuesday of teh month MS releases updates


reports what you are doing and sometimes much worse... records passwords and sends them out to people
computer software that is installed surreptitiously on a personal computer to intercept or take partial control over the user's interaction with the computer, without the users informed consent
1) use an antivirus 2) download windows updates at least monthly 3) use a specific anti spyware program like adaware 4) have a back up 5) use secured sites by if it has https:// means shared with a protocol 6) use strong passwords and don't download a bunch of stuff

spyware

spyware

Steps in protecting your computer! (6)

system management tools

device manager, task manager, windows management console, MSConfig.exe, regedit, event viewer 8 bits in a bite! HIgher end OS can read/understand things faster (exponential in increase)

there are

There are four resources to see how devices are managed

DMA, IQ, IRQ, memory

three user interfaces

GUI; txt interface; menu interface

TOOLS: Device Manager; What system resources are used to manage devices and how do they work

Look up what the drivers are and what resources are assigned to your hardware devices; device manager is where all your devices get managed;

Tracert

where things are happening

troubleshooting

recovery of operating systems; advanced options menu; recognize and resolve common operational problems; recognize and resolve common error messages and codes; use diagnostic utilities and tools to resolve operational problems

txt interface

dir/s

UNIX

solaris; AIX(IBM), HPIX (HP)


after primary (RAM) is full it is memory space on your hard drive; HDDs and temporary files used, how does it work? 1000 times slower!

virtual memory

What are two major products that support virtualization

microsoft virtual PC, VMware, Citrix

What do OS do?

tell the computer how to work

What does a yellow ! mean

there's a problem!

What does an OS do

manage hardware; provide a user-interface; allow you to install and use applications; manage/save/retrieve files

what does backslash represent? \

the root

What functions are provided by an operating system

manages hardware, manages applications, provides an interface for users, manage and save files

What happens when you run out of RAM

virtual memory gets used... VM is memory on the hard drive which is MUCH (1000 x's) slower than RAM
structure capable to contain data, means there is an end of file and digital format. Usually have a 3 character extension. MS office 2007 uses 4 (.docx) characters in its extension

What is a file

What is a folder

a special file that contains other files

What is proprietary?

not shared (copy write)

What is the difference between real and protected mode

Real means they have access to everything (memor) causes crashes and problems while protected mode OS protects the one note memory space

what is the host key in vista

right ALT

What is the windows XP registry

everything in windows XP is stored here. A big database and everything you do/change/install/configure all happens in the registry the ability to load multiple operating systems on one PC (physical device) and not destroy a different one

What is virtualization

what is virtualization

what is virtualization2

the ability to install an OS w/ out damaging the current (host operating systems); allows companies to install multiple servers on each server computer; saves money

What products are out there for virtualization

IMware; virtual pc (what we used);

What RAM settings must be changed before installing virtual PC What software doesn't like virtual PC is attempting to do? and how do you fix it? what software protects from malware

1024

symantec software; start/all programs/symantec; from the centralized exceptions select change settings and add; after selecting security risk exceptions navigate to the following to locate the virtual pc executable file; completed!

What was the software used to do virtualization in class

virtualPC

Which OS allows you to have the code

LINUX... open operating system; provides you the access to the code others do not

why do we use virtual PC to install, configure, and to install an application learn on our computers

Why virtualization

It can save businesses thousands of dollars.

why worry about 16 bits?

it's still in use!

Why would an antivirus application have any problem with using virtual OS applications Why would you want to know about virtualization Will an anti-virus protect you from all adware/spyware?

antivirus protects us from unautorized access and antivirus thought virtual PC was a virus
cheaper for businesses, let's you install a new OS without destroying present one; if you must support older applications can use VM to support older ones

NO

Windows and Nonwindows OS

1)close to a dozen OS 2) microsoft->way too slow and bulky 3)apple 4)linux 5)Unix(proprietary)no access to code 6)cell phones have an OS 7)DVR or personal assistant, PDA (uses MAC OS)

worm

does not need to infect any computer to replicate. it can replicate by itself. scans for open ports.

You might also like