Unit 3
Unit 3
1 Introduction
Booting
Booting is basically the process of starting the computer. When the CPU is first
switched on it has nothing inside the Memory. In order to start the Computer, load
the Operating System into the Main Memory and then Computer is ready to take
commands from the User. Learn the types of booting.
Booting
Boot Devices
Booting can be done either through hardware (pressing the start button) or by
giving software commands. Therefore, a boot device is a device that loads the
operating system. Moreover, it contains the instructions and files which start the
computer. Examples are the hard drive, floppy disk drive, CD drive, etc. Among
them, the hard drive is the most used one.
Browse more topics under Classification of Computers
Types of Booting
There are two types of booting:
Cold Booting
A cold boot is also called a hard boot. It is the process when we first start the
computer. In other words, when the computer is started from its initial state by
pressing the power button it is called cold boot. The instructions are read from
the ROM and the operating system is loaded in the main memory.
Warm Booting
Warm Boot is also called soft boot. It refers to when we restart the computer. Here,
the computer does not start from the initial state. When the system gets stuck
sometimes it is required to restart it while it is ON. Therefore, in this condition the
warm boot takes place. Restart button or CTRL+ALT+DELETE keys are used for
warm boot.
Steps of Booting
We can describe the boot process in six steps:
1. The Startup
It is the first step that involves switching the power ON. It supplies electricity to the
main components like BIOS and processor.
It is an initial test performed by the BIOS. Further, this test performs an initial
check on the input/output devices, computer’s main memory, disk drives, etc.
Moreover, if any error occurs, the system produces a beep sound.
3. Loading of OS
In this step, the operating system is loaded into the main memory. The operating
system starts working and executes all the initial files and instructions.
4. System Configuration
In this step, the drivers are loaded into the main memory. Drivers are programs that
help in the functioning of the peripheral devices.
System utilities are basic functioning programs, for example, volume control,
antivirus, etc. In this step, system utilities are loaded into the memory.
6. User Authentication
If any password has been set up in the computer system, the system checks for
user authentication. Once the user enters the login Id and password correctly the
system finally starts.
A1. The starting up of the computer is known as booting. It initiates all the devices
before starting any work on the computer. Moreover, the operating system is loaded
into the main memory.
A2. BIOS stands for Basic Input/Output System. It helps in the functioning of all
the input/output devices. Further, it also helps to start and initiate the working of all
devices during the boot process.
A3. Boot devices are the devices that have the operating system loaded inside them
during the boot process. Common devices are the hard drive, disk drive, floppy
drive, etc.
A5. We perform this so that the operating system along with the initial files and
instructions load into the main memory. And as a result, the computer starts.
1. The start-up
2. Power On Self Test
3. Loading OS
4. System Configuration
5. Loading system utilities
6. User authentication
Computer Management
Computer Management is a collection of Windows administrative tools that you
can use to manage a local or remote computer. The tools are organized into a
single console, which makes it easy to view administrative properties and to gain
access to the tools that are necessary to perform your computer-management tasks.
Or:
Tip
In Windows 8, you can type "diskmgmt.msc" directly on the Start
screen to access Disk Management.
or
Note
If you do not have admin rights to the computer, this is not
available.
3. Once in the Administrative Tools window, double-
click Computer Management and then click Disk
Management under the Storage section.
The System process can be viewed as a special kind of process that hosts threads that
only run in kernel mode. Its related file name is ntoskrnl.exe and it is located in
C:\Windows\System32\ folder. It is responsible for various system services such as
hardware abstraction, process and memory management, etc
System process (ntoskrnl.exe) High Disk or
CPU usage
There are different factors that can cause a change in the performance of
your Windows 10 device. This includes recent updates, changes in the
device driver versions, etc. You can try these solutions to fix the problem.
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Ses
sion Manager
Find the Memory Management folder.
Then, in the Edit DWORD Value screen that appears, change the value
of ClearPageFileAtShutDown from 0 to 1 and click on OK.
This will clear Page File at every shutdown and lower the high RAM usage in
Windows 10.
Click Show additional plans drop-down button, then change your Power
Plan. Don’t use a Power Saver plan – Use Balanced or High Performance.
Now open Task Manager again to see if CPU usage returns to normal.
Next, switch to the Threads tab. Sort the list of modules loaded by the kernel by the rate of
CPU usage (CPU column). Note down the name of a component or a driver in the Start
Address column, causing high load, and terminate it.
Hopefully, this should help you troubleshoot.
PID
PID may refer to any of the following:
In this article
1. User mode
2. Kernel mode
3. Related topics
The processor switches between the two modes depending on what type of code is
running on the processor. Applications run in user mode, and core operating system
components run in kernel mode. While many drivers run in kernel mode, some
drivers may run in user mode.
User mode
When you start a user-mode application, Windows creates a process for the
application. The process provides the application with a private virtual address
space and a private handle table. Because an application's virtual address space is
private, one application cannot alter data that belongs to another application. Each
application runs in isolation, and if an application crashes, the crash is limited to that
one application. Other applications and the operating system are not affected by the
crash.
Kernel mode
All code that runs in kernel mode shares a single virtual address space. This means
that a kernel-mode driver is not isolated from other drivers and the operating system
itself. If a kernel-mode driver accidentally writes to the wrong virtual address, data
that belongs to the operating system or another driver could be compromised. If a
kernel-mode driver crashes, the entire operating system crashes.
The kernel mode can refer to The user mode is a standard and
any memory block in the typical viewing mode, which implies
system and can also direct the that information cannot be executed
Functionality CPU for the execution of an on its own or reference any memory
Criteria Kernel Mode User Mode
What Is a Startup?
The term startup refers to a company in the first stages of operations.
Startups are founded by one or more entrepreneurs who want to develop a
product or service for which they believe there is demand. These
companies generally start with high costs and limited revenue, which is
why they look for capital from a variety of sources such as venture
capitalists.
6 Types of Startups
• Scalable startups
• Small business startups
• Lifestyle startups
• Buyable startups
• Big business startups
• Social startups
In our modern world, where everyone strives to bring innovation, a good idea isn’t
enough to create a startup. To understand the features of different startups better,
you need to review the following six types.
Active Directory
Active Directory (AD) is a database and set of services that connect users with the
network resources they need to get their work done. The database (or directory)
contains critical information about your environment, including what users and computers
there are and who's allowed to do what.
Feature Description
Location Able to find user, group, networked service, or resource, data without the
transparency object address
Lightweight Directory Access Protocol (LDAP) is an application protocol for working with
various directory services. Directory services, such as Active Directory, store user and
account information, and security information like passwords.
Domain
Whats is my domain?
When you type a domain name in your search browser, the browser then communicates
with a name server in order to find the IP address that is matched to that name.
If you have not specified a domain extension, that request will go through a server that
sorts by the Domain Name System hierarchy, starting with top-level extensions and then
moving on down the line. Unsurprisingly, this made the worldwide web infinitely easier to
navigate, which encouraged more people to utilize its services.
Different tree data structures allow quicker and easier access to the data as
it is a non-linear data structure.
Tree Terminologies
Node
A node is an entity that contains a key or value and pointers to its child
nodes.
The last nodes of each path are called leaf nodes or external nodes that
do not contain a link/pointer to child nodes.
The node having at least a child node is called an internal node.
Edge
Height of a Node
The height of a node is the number of edges from the node to the deepest
leaf (ie. the longest path from the node to a leaf node).
Depth of a Node
The depth of a node is the number of edges from the root to the node.
Height of a Tree
The height of a Tree is the height of the root node or the depth of the
deepest node.
Forest
Creating forest
from a tree
You can create a forest by cutting the root of a tree.
Types of Tree
1. Binary Tree
2. Binary Search Tree
3. AVL Tree
4. B-Tree
Tree Traversal
In order to perform any operation on a tree, you need to reach to the
specific node. The tree traversal algorithm helps in visiting a required node
in the tree.
Tree Applications
• Binary Search Trees(BSTs) are used to quickly check whether an
element is present in a set or not.
• Most popular databases use B-Trees and T-Trees, which are variants
of the tree structure we learned above to store their data
Note. You can assign an email attribute to the security group (by converting it to a
mail-enable security group) and use it in mailing lists (but it is not recommended).
Procedure
To configure Windows Task Scheduler to automatically run a ruleset:
1. From the Start menu, select Administrative Tools > Task Scheduler.
2. Under Task Scheduler (Local), select Task Scheduler Library and choose New
Folder from the Actions panel.
3. Enter Datacap and click OK.
For example,
enter C:\Datacap\NENU\Batches\NENU_NENU\Settings.xml
However, the reason to configure the page file size hasn't changed. It has always
been about supporting a system crash dump, if it's necessary, or extending the
system commit limit, if it's necessary. For example, when a lot of physical memory is
installed, a page file might not be required to back the system commit charge during
peak usage. The available physical memory alone might be large enough to do this.
However, a page file or a dedicated dump file might still be required to back a
system crash dump.
The system commit memory limit is the sum of physical memory and all page files
combined. It represents the maximum system-committed memory (also known as
the "system commit charge") that the system can support.
The system commit charge is the total committed or "promised" memory of all
committed virtual memory in the system. If the system commit charge reaches the
system commit limit, the system and processes might not get committed memory.
This condition can cause freezing, crashing, and other malfunctions. Therefore, make
sure that you set the system commit limit high enough to support the system
commit charge during peak usage.
The system committed charge and system committed limit can be measured on
the Performance tab in Task Manager or by using the "\Memory\Committed Bytes"
and "\Memory\Commit Limit" performance counters. The \Memory% Committed
Bytes In Use counter is a ratio of \Memory\Committed Bytes to \Memory\Commit
Limit values.
Task Manager
Task Manager
shown. Hard Disk Drive and Removable media type(s) are now
Developer(s) Microsoft
Written in C++
manager
Performance Monitor
Note
Microsoft Defender
From Wikipedia, the free encyclopedia
Microsoft Defender
Other names Windows Defender
Developer(s) Microsoft
Firewall
Windows Firewall
From Wikipedia, the free encyclopedia
Windows Firewall
Windows Defender Firewall in Windows 10 Fall Creators Update,
Developer(s) Microsoft
Group Policy
By
• Brien Posey
• Ben Rubenstein, Senior Manager, Social Media and Online Community
Group Policy is a hierarchical infrastructure that allows a network administrator in
charge of Microsoft's Active Directory to implement specific configurations for users
and computers. Group Policy is primarily a security tool, and can be used to apply
security settings to users and computers. Group Policy allows administrators to
define security policies for users and for computers. These policies, which are
collectively referred to as Group Policy Objects (GPOs), are based on a collection of
individual Group Policy settings. Group Policy objects are administered from a
central interface called the Group Policy Management Console. Group Policy can
also be managed with command line interface tools such as gpresult and gpupdate.
Administrative templates consist of two components. An ADMX file is the XML file
containing all of the Group Policy settings that are associated with the template. A
corresponding ADML file acts as a language file that allows the Group Policy settings
to be displayed in the administrator’s language of choice.
Many organizations use a combination of local and Active Directory Group Policy
objects. The local policy settings provide security when the user is not logged into a
domain, while Active Directory Group Policy objects apply once the user has logged
in.
Here’s a look at what Windows Services are, how it works, examples of Windows
Services, and options for developers for configuring applications to run as a Service.
Unlike regular software that is launched by the end user and only runs when the user
is logged on, Windows Services can start without user intervention and may continue
to run long after the user has logged off. The services run in the background and will
usually kick in when the machine is booted. Developers can create Services by
creating applications that are installed as a Service, an option ideal for use on
servers when long-running functionality is needed without interference with other
users on the same system.
Windows Services broadly fall into three categories depending on the actions and
applications they control: Local Services, Network Services and System. Third party
applications such as antivirus software may also install their own services.
Services can be deleted by a user with administrative privileges, but as doing so can
render the operating system unstable, it should be done only when necessary and
with caution.
Differences between Windows Services and Regular Applications
• Launch Mechanism – A regular application is manually launched by the end
user from the desktop or Start Menu. Examples include web browsers, document
editing software and PDF readers. Windows Services start when the machine is
switched on. Note however that regular applications can be added to the Startup
folder in the Start Menu in which case they would start automatically once the
operating system startup is complete.
• User Interface – Unlike regular applications, Windows Services do not have a
user interface; they run in the background and the user does not directly interact
with them. A Windows Service does not stop when a user logs off the computer;
a regular application will.
• Multiple Instances – Only one instance of a Windows Service runs on a device.
Regular applications can allow multiple copies if several users are logged into
the same machine.
• Administrator Rights – Windows Services usually run under administrative
privileges even when a non-administrator user is logged in and using the
computer. The average Windows Service has more control over the machine
compared to a regular application.
Developers often use Services for functions that are necessary to run in the
background, such as the ability to monitor performance data and react to specified
thresholds. Services can also be created as Microsoft Visual Studio projects,
developing code that specifies what commands can be sent to the service as well as
what actions are taken on receipt of those commands. For more specifics on using
Visual Studio projects to create Services, check out our recent post on how to create
.NET Core Windows Services with Visual Studio 2017.
After creating and building an application, you can install it as a service by running
the command-line utility InstallUtil.exe, then passing the path to the Service’s
executable file. Then, use the Services Control Manager to configure the Service.
Alternatively, services can be configured using the Services node in Server Explorer
or with the ServiceController class. Check out our sample Windows Services project
on GitHub for examples of timer-based events, queue processing, and job
scheduling – some of the more popular uses for Windows Services.
3.5 Maintenance
Windows Server Update Services (WSUS)
Practical applications
Note
Upgrade from any version of Windows Server that supports WSUS 3.2 to Windows
Server 2012 R2 requires that you first uninstall WSUS 3.2.
In Windows Server 2012, upgrading from any version of Windows Server with WSUS
3.2 installed is blocked during the installation process if WSUS 3.2 is detected. In that
case, you will be prompted to first uninstall Windows Server Update Services prior to
upgrading your server.
However, because of changes in this release of Windows Server and Windows Server
2012 R2, when upgrading from any version of Windows Server and WSUS 3.2, the
installation is not blocked. Failure to uninstall WSUS 3.2 prior to performing a
Windows Server 2012 R2 upgrade will cause the post installation tasks for WSUS in
Windows Server 2012 R2 to fail. In this case, the only known corrective measure is to
format the hard drive and reinstall Windows Server.
Windows Server Update Services is a built-in server role that includes the following
enhancements:
For system administrators to automate their operations, they need coverage through
command-line automation. The main goal is to facilitate WSUS administration by
allowing system administrators to automate their day-to-day operations.
In earlier versions of the Windows Server operating system, there were no Windows
PowerShell cmdlets, and update management automation was challenging. The
Windows PowerShell cmdlets for WSUS operations add flexibility and agility for the
system administrator.
A proper backup copy is stored in a separate system or medium, such as tape, from
the primary data to protect against the possibility of data loss due to primary
hardware or software failure.
Storing the copy of the data on separate medium is critical to protect against primary
data loss or corruption. This additional medium can be as simple as an external drive
or USB stick, or something more substantial, such as a disk storage system, cloud
storage container, or tape drive. The alternate medium can be in the same location
as the primary data or at a remote location. The possibility of weather-related events
may justify having copies of data at remote locations.
For best results, backup copies are made on a consistent, regular basis to minimize
the amount data lost between backups. The more time passes between backup
copies, the more potential for data loss when recovering from a backup. Retaining
multiple copies of data provides the insurance and flexibility to restore to a point in
time not affected by data corruption or malicious attacks.
In this article
1. In this Section
2. Related topics
The error reporting feature enables users to notify Microsoft of application faults,
kernel faults, unresponsive applications, and other application specific problems.
Microsoft can use the error reporting feature to provide customers with
troubleshooting information, solutions, or updates for their specific problems.
Developers can use this infrastructure to receive information that can be used to
improve their applications.
Users can enable error reporting through the Windows user interface. They can
choose to report errors for specific applications. Administrators can override these
settings using Group Policy.