Está en la página 1de 6

13.

b) Managing Windows 7 Services


A service is a program, routine, or process that performs a specifi c function w
ithin the Windows 7 operating system. You can manage services through the Servic
es window, which can be accessed in a variety of ways. If you go through the Com
puter Management utility, right - click Computer, select Manage, expand Services
And Applications, and then expand Services. You can also go through Administrat
ive Tools or set up Services as an MMC snap - in.
General Allows you to view and confi gure the following options:
The service display name
Display name
A description of the service
The path to the service executable
The startup type, which can be automatic, manual, or disabled
The current service status
Start parameters that can be applied when the service is started
In addition, the buttons across the lower part of the dialog box allow you chang
e the service status to start, stop, pause, or resume the service. Log On The Lo
g On tab allows you to confi gure the logon account that will be used to start t
he service. Choose the local system account or specify another logon account. Re
covery The Recovery tab allows you to designate what action will be taken if the
service fails to load. For the fi rst, second, and subsequent failures, you can
select from the following actions:
Take No Action
Restart The Service
Run A Program
Restart The Computer
If you choose Run A Program, specify it along with any command - line parameters
. If you choose Restart The Computer, you can configure a message that will be s
ent to users who are connected to the computer before it is restarted. You can a
lso specify how long until a
machine is restarted if an error occurs. Dependencies The Dependencies tab lists
any services that must be running in order for the specifi ed service to start.
If a service fails to start, you can use this information to examine the depend
encies and then make sure each one is running. In the bottom panel, you can veri
fy whether any other services depend on this service before you decide to stop i
t.
Configuring Services
1. Start Computer Management by clicking Start and then right - clicking Compute
r. Choose Manage.
2. In the Computer Management MMC, expand the Services And Applications section.
3. Click the Services link.
4. Scroll down the list and double - click Remote Desktop Confi guration.
5. Under the Startup Type, choose Automatic.
6. Under the Logon tab, click the This Account radio button.
7. Click the Browse button and choose the local administrator account. Click OK.
8. In the Password boxes, type and verify the Administrator password.
9. In the Recovery tab, make sure the following settings are confi gured.
Response
Action
First Failure
Restart The Service
Second Failure Restart The Service
Subsequent Failures
Take No Action
Reset Fail Count After 1 Day
Restart Service After
10 Minutes
10. Click the OK button.
11. Close the Computer M anagement MMC.

14. a) Installing Printer


Installing a Printer
1. Choose Start  Devices And Printers.
2. Choose Add Printers.
3. Select the Add A Local Printer option.
4. In the Add Printer window, choose the Use An Existing Port radio button and u
se the drop - down window to select LPT1: (Printer Port). Then click Next.
5. Select the manufacturer of your print device and the printer model you want t
o install.
If you don t fi nd your model in the list, it wasn
t included in the distributio
n fi les; you can click the Windows Update button to get more choices from Micro
soft. If you still don t have your model available and you have the original dis
k, you can choose Have Disk and browse to the driver fi les. OK, if you had the
disk, wouldn t you have just run the setup? Ah, you didn
t have the disk, you we
nt on to the internet and downloaded the drivers . . . use the Have Disk option
to browse to the folder with the .inf fi le for the printer drivers.
6. If there was a driver previously installed, you will be given the option to u
se the existing driver or replace it.
7. After choosing the appropriate device driver or using the existing driver and
clicking Next, you will choose the name of the printer. An intuitive name is al
ways a good choice here. Enter the name and click Next.
8. You can make the print device available on the network by sharing it. The nex
t page of the Add Printer Wizard gives you the opportunity to do so. For most of
the options within the wizard, you can change the values or function from the P
roperties dialog box (if, for example, you change your mind later). After making
your choice, click Next.
9. On the fi nal page of the Add Printer Wizard, select the Set As The Default P
rinter check box (to make this the default printer for any application on the ma
chine) and click Print A Test Page. Once the test page prints, click Finish. The
printer for the locally connected print device is installed on the local machin
e.
----b.
Adding an Accelerator to IE8
1. Open Windows Internet Explorer 8 and open a web page.
2. Select a word or phrase and choose the Accelerator icon.
3. Choose All Accelerators and then Find More Accelerators.
4. Review the available Accelerators and select the Defi ne With Bing Accelerato
r:
5. A confi rmation box appears asking if you re sure you want to add this Accele
rator and if you want to make it the default for this Accelerator category. Sele
ct the check box to make it the default and choose Add.
6. You can verify the installation of the Defi ne With Bing Accelerator by retur
ning to the web page (or going to any web page), highlighting a word or phrase,
and choosing the Accelerator icon. The Defi ne With Bing option will now be avai
lable.
Adding a Stock Quote Web Slice to IE8
1. Open Windows Internet Explorer 8 and browse to www.Bing.com
2. Enter msft into the search box in Bing and click the Search button.
3. Choose the drop - down arrow from the Web Slice icon on the IE8 Favorites too
lbar and select Microsoft Corp. Web Slice.
4. Select the Add To Favorites Bar button in the Internet Explorer confi rmation
window.
5. Verify that the Web Slice is available in the IE8 Favorites toolbar.
6. Click the down arrow of the Bing Microsoft Corp. Web Slice and you will be pr
esented with the current information from the Web Slice of the original page, wi
th updated information if it s available.

Using New Security and Safety Features of IE8


The new security and safety features of Windows Internet Explorer 8 are designed
to help protect end users from malicious attacks or attempts to get personal in
formation from the user without their knowledge. Users expect things to be as th
ey appear which is not always
the case. Because we all use the internet and our corporate intranets to provide
information every day, online crime has risen dramatically. The new type of cri
minal we face are known as cybercriminals, and they are using extremely deceptiv
e and sophisticated methods for getting information from end users. One method i
s the use of malware to steal private information through software pretending to
be an expected website. This malware could be a program running on your PC whic
h reads everything you type (including login information from a web browser) and
reports the info back to a cybercriminal. Phishing is another technique used by
cybercriminals to gain personal information from users. Phishing can be perpetr
ated by the cybercriminal pretending to be a legitimate website such as the user
s banking site or credit card site and
getting the end user to enter information into a fraudulent page. New features o
f IE8 helping to identify malware and phishing schemes will make it easier for e
nd users to quickly identify potential issues and allow the administrators to sp
end less time
fi xing
the network and user - compromised data. Domain Highlighti
ng, Cross Site Scripting Filter, Click - Jacking prevention, Smart Screen fi lte
rs, a -InPrivite Browsing, and InPrivate Filtering are new additions to Windows
Internet Explorer 8.
15. a) Using the User Accounts Option in Control Panel
The User Accounts Control (UAC) Control Panel option provides the ability to man
age user accounts in addition to confi guring parental controls. To access the U
ser Accounts Control Panel option, click Start -> Control Panel -> User Accounts
.
Configurable user account options in Control Panel
Option
Explanation
Change Your Password
This link allows you to change a user s password.
Remove Your Password
This link allows you to remove a password from a
user s account.
Change Your Picture
This link allows you to change the account pictu
re.
Change Your Account Name
This link allows you to rename the accou
nt.
Change Your Account Type
This link allows you to change your acco
unt type between the standard user and administrator account type.
Manage Another Account
This link allows you to configure other accounts
on the Windows 7 machine.
Change User Account Control Settings
This link allows you to set the level of
notification of when changes are made to your computer. These notifications can
prevent potentially hazardous programs from being loaded onto the operating sys
tem. Manage Your Credentials With this link,
you can set up credentials that allow you to easily connect to websites that req
uire usernames and passwords or computers that require certificates.
Create A Password Reset Disk
This link allows you to create a disk th
at users can use when they forget their password.
Link Online IDs
This link allows you to link an
online ID with your Windows account. This makes it easier to share files with ot
her computers.
Manage Your File Encryption Certificates
This link allows you to
manage your file encryption certificates.
Configure Advanced User Profile Properties
This link brings you directly to
the User s Profile dialog box in Control Panel -> System -> Advanced -> System Se
ttings.
Change My Environment Variables
This link allows you to access the Envir

onment Variables dialog box directly.


b) Safeguarding Your Computer and Recovering from Disaster
One of the worst events you will experience is a computer that won
t boot. An ev
en worse experience is discovering that there is no recent backup for that compu
ter. The fi rst step in preparing for disaster recovery is to expect that a disa
ster will happen
at some point and take proactive measures to plan your recovery before the failu
re occurs.
Here are some of the preparations you can make:
Keep your computer up - to - date with Windows Update
Perform regular system backups.
Use current software to scan for malware (such as viruses, spyware, and adware)
and make sure you have the most recent updates.
Perform regular administrative functions, such as monitoring the logs in the Eve
nt Viewer utility.
If you can t start Windows 7, there are several options and utilities that can b
e used to identify and resolve Windows errors. The following is a broad list of
troubleshooting options:
If you have recently made a change to your computer
s configuration by installin
g a new device driver or application and Windows 7 will not load properly, you c
an use the Last Known Good Configuration, roll back the driver, or use System Re
store to restore a previous system configuration.
Windows 7 Recovery Techniques
Recovery Technique When to Use
Event Viewer - If the Windows 7 operating system can be loaded through Normal or
Safe mode, one of the first places to look for hints about the problem is Event
Viewer. Event Viewer displays System, Security, and Application logs.
Safe mode - This is generally your starting point for system recovery. Safe mode
loads the absolute minimum of services and drivers that are needed to boot Wind
ows 7. If you can load Safe mode, you may be able to troubleshoot devices or ser
vices that keep Windows 7 from loading normally.
Last Known Good Configuration - This option can help if you made changes to your
computer and are now having problems. Last Known Good Configuration is an Advan
ced Boot Options menu item that you can select during startup. It loads the conf
iguration that was used the last time the computer booted successfully. This opt
ion will not help if you have hardware errors.
Startup Repair tool - This tool can restore system files from the Windows 7 medi
a. This option will not help if you have hardware errors. Backup and Restore Cen
ter You should use this utility to safeguard your computer. Through the Backup u
tility, you can back up and restore personal files on your computer. You can als
o create and restore images of your entire computer.
System Restore - System Restore is used to create known checkpoints of your syst
em s configuration. In the event that your system becomes misconfigured, you can r
estore the system configuration to an earlier checkpoint.
If you can boot your computer to Safe mode, and you suspect that you have a syst
em conflict, you can temporarily disable an application or processes, troublesho
ot services, or uninstall software.
If your computer will not boot to Safe mode, you can use the Startup Repair tool
to replace corrupted system files.
If necessary, you can use the Backup and Restore Center utility to restore perso
nal files from backup media and to restore a complete image of your computer.
You can also use Driver Rollback. If you install a driver that causes issues on
your system, you can use the Driver Rollback utility to return the driver to its
previous version.
set 2
Part A
1. HCL refers Hardware Compatibility List

2.
3.
4.
5.

MMC: Microsoft Management Console


Windows Aero is the user interface component of Windows 7
Hardware today follows a Plug and Play standard
Backup and Restore Center utility

Part B
6. a) Microsoft Deployment Toolkit (MDT)
It is used to automate desktop and server
deployment. The MDT allows an administrator to have some of the following benefi
ts:
Administrative tools that allow for the deployment of desktops and servers throu
gh the use of a common console
Quicker deployments and the capabilities of having standardized desktop and serv
er images and security
Zero touch deployments of Windows 7, Windows Server 2008, Windows Vista, Windows
Server 2003, and Windows XP
6. b) Windows Deployment Services (WDS) is an updated version of Remote Installa
tion Services (RIS). WDS is a suite of components that allows you to remotely in
stall Windows 7 on client computers. A WDS server installs Windows 7 on the clie
nt computers. The WDS server must be confi gured with the Preboot Execution Envi
ronment (PXE) boot fi les, the images to be deployed to the client computers, an
d the answer fi le. WDS client computers must be PXE capable. PXE is a technolog
y that is used to boot to the network when no operating system or network confi
guration has been installed and confi gured on a client computer. The WDS client
s access the network with the help of a Dynamic Host Confi guration Protocol (DH
CP) server. This allows the WDS client to remotely install the operating system
from the WDS server. The network environment must be confi gured with a DHCP ser
ver, a Domain Name System (DNS) server, and Active Directory to connect to the W
DS server. No other client software is required to connect to the WDS server. Re
mote installation is a good choice for automatic deployment when you need to dep
loy to large numbers of computers and the client computers are PXE compliant.
7. A) FAT32: FAT32 is an updated version of File Allocation Table (FAT). The FAT
32 version was first shipped with Windows 95 OSR2 (Operating System Release 2) a
nd can be used by Windows 7. One of the main advantages of FAT32 is its support
for smaller cluster sizes, which
results in more effi cient space allocation than was possible with FAT16. Files
stored on a FAT32 partition can use 20 to 30 percent less disk space than fi les
stored on a FAT16 partition. FAT32 supports drive sizes from 512 MB up to 2 TB,
although if you create and format a FAT32 partition through Windows 7, the FAT3
2 partition can only be up to 32 GB. Because of the smaller cluster sizes, FAT32
can also load programs up to 50 percent faster than programs loaded from FAT16
partitions. The main disadvantages of FAT32 compared to NTFS are that it does no
t provide as much support for larger hard drives and it does not provide very ro
bust security options. It also offers no native support for disk compression. No
w that you understand FAT32, let s take a look at NTFS.
NTFS: NTFS , which was fi rst used with the NT operating system, offers the high
est level of service and features for Windows 7 computers. NTFS partitions can b
e up to 16 TB with 4 KB clusters or 256 TB with 64 KB clusters. NTFS offers comp
rehensive folder - and fi le - level security. This allows you to set an additio
nal level of security for users who access the fi les and folders locally or thr
ough the network. For example, two users who share the same Windows 7 computer c
an be assigned different NTFS permissions so that one user has access to a folde
r but the other user is denied access to that folder.
B) RAID Models
There are many different models of RAID but Microsoft Windows 7 uses three main
models: RAID - 0, RAID - 1, and RAID - 5. Let
s take a look at each.
RAID - 0 (Stripped Volume) RAID-0 has no data recoverability but it is used for

better performance. With RAID-0 you can have a minimum of two hard disks, and th
ese two disks work together as a single volume. Because the two disks work toget
her, the disks both use their own read/write heads, giving you better performanc
e. The downside to RAID - 0 is that if you lose either disk, you lose the entire
stripped volume. RAID - 0 is good for temp files or noncritical data since RAID
- 0 is not recoverable in the event of a hard disk failure.
RAID - 1 (Mirroring) RAID-1, also known as mirroring, allows you to set up two v
olumes or disks that mirror each other. The advantage to mirroring is that if yo
u lose one disk or volume, you can boot to the second disk or volume (the mirror
) and recover your data. The downside to mirroring is that it is more expensive
than other RAID options.
RAID - 5 Volume A RAID - 5 volume, which many years ago was known as a stripe se
t with parity, uses a minimum of 3 disks (maximum of 32 disks) that work togethe
r as one volume. The advantage to a RAID - 5 volume is that the volume uses a pa
rity bit, which allows you to recover your data in the event of a single hard di
sk failure.
15. B) Special groups can be used by the system or by administrators. Membership
in these groups is automatic if certain criteria are met. You cannot manage spe
cial groups through the Local Users And Groups utility, but an administrator can
add these special groups to
resources.
Group
Description
Creator Owner - This is the account that created or took ownership of an object.
This is typically a user account. Each object (files, folders, printers, and pr
int jobs) has an owner. Members of the Creator Owner group have special permissi
ons to resources. For example, if you are a regular user who has submitted 12 pr
int jobs to a printer, you can manipulate your print jobs as Creator Owner, but
you can t manage any print jobs submitted by other users.
Everyone - This group includes anyone who could possibly access the computer. Th
e Everyone group includes all users who have been defined on the computer (inclu
ding Guest), plus (if your computer is a part of a domain) all users within the
domain. If the domain has trust relationships with other domains, all users in t
he trusted domains are part of the Everyone group as well. The exception to auto
matic group membership with the Everyone group is that members of the Anonymous
Logon group are not included as a part of the Everyone group.
Interactive - This group includes all users who use the computer s resources local
ly. Local users belong to the Interactive group.
Network - This group includes users who access the computer s resources over a net
work connection. Network users belong to the Network group.
Authenticated Users - This group includes users who access the Windows 7 operati
ng system through a valid username and password. Users who can log on belong to
the Authenticated Users group.
Anonymous Logon - This group includes users who access the computer through anon
ymous logons. When users gain access through special accounts created for anonym
ous access to Windows 7 services, they become members of the Anonymous Logon gro
up.
Batch - This group includes users who log on as a user account that is used
only to run a batch job. Batch job accounts are members of the Batch group.
Dial-up - This group includes users who log on to the network from a dial-up con
nection. Dial-up users are members of the Dialup group.
Service - This group includes users who log on as a user account that is used on
ly to run a service. You can configure the use of user accounts for logon throug
h the Services program, and these accounts become members of the Service group.
System When the system accesses specific functions as a user, that process becom
es a member of the System group.
Terminal Server User - This group includes users who log on through Terminal Ser
vices. These users become members of the Terminal Server User group.

También podría gustarte