OPERATING SYSTEM COURSE CODE CSE 305
BAHRA UNIVERSITY SHIMLA HILLS
SCHOOL OF COMPUTER SCIENCE AND ENGINEERING
Contents 1. Introduction to Window 7 operating system ............................................................................................... 2 2. Implementation of various aero features of window 7. ............................................................................... 3 3. Understanding window upgrade, window update and action center. ........................................................ 14 4. To create and setting up on . .................................................. 23 5. Commands for window power shell and MSCONFIG. ............................................................................ 32 6. To understand system restore, recovery tool option, various safe mode options and MMC console management. ................................................................................................................................................. 37 7. Introduction to window 7 upgrade advisor, windows defender and windows registry file. ...................... 45 Windows Registry ......................................................................................................................................... 45 8. Making a word file and how to protect it with . ......................................................................... 47 9. To create a blog. ........................................................................................................................................ 52 10. Implementation of disk defragmenter and disk cleanup maintenance tools. ........................................... 57 11. What is bitlocker and TPM. How a bitlocker encrypt a file. ................................................................... 60 12. Introduction to sky drive and windows live mesh. .................................................................................. 72 13. Implementation of FCFS (First Come First Serve) scheduling algorithm .............................................. 85 14. Implementation of SJF (Shortest Job First) scheduling algorithm. ......................................................... 88 15. Implementation of priority scheduling algorithm.................................................................................... 91 16. Implementation of Round Robin scheduling algorithm. ......................................................................... 95
1. Introduction to Window 7 operating system Windows 7 is an operating system produced by Microsoft for use on personal computers, including home and business desktops, laptops, netbooks, tablet PCs, and media center PCs. It was released to manufacturing on July 22, 2009 and became generally available for retail worldwide on October 22, 2009, less than three years after the release of its predecessor, Windows Vista. Windows 7's server counterpart, Windows Server 2008 R2, was released at the same time. Windows 7 is succeeded by Windows 8. Unlike Windows Vista's many new features, Windows 7 was an incremental upgrade designed to work with Vista-compatible applications and hardware. Presentations given by Microsoft in 2008 focused on multi-touch , an updated Windows shell with a new taskbar, referred to internally as the Superbar, a home networking system called HomeGroup, and performance improvements. Some standard applications that have been included with prior releases of Microsoft Windows, including Windows Calendar, Windows Mail,Windows Movie Maker, and Windows Photo Gallery, are not included in Windows 7; most are instead offered separately at no charge as part of the Windows Essentials suite. Minimum hardware requirements for Windows 7
If you are already a Vista then the improvements to Windows 7 are going to be more subtle. Vista s are likely already familiar with features like the Aero visual functions, the Start Menu organization and Search. However, if you are currently using XP, then you may require a bit of an adjustment period. Improvements for both Vista and XP s •
New Taskbar and System Tray
•
Quick Desktop View button
•
Improved Start Up, Sleep and Resume performance
•
Improved power management saves memory and battery life
•
Libraries to improve file access and organization
•
Action Center for system maintenance, back ups, troubleshooting and more
•
customization of notifications
•
Improved back up
•
New wallpapers and themes
•
Improved gadgets
•
New games include Chess Titans, Mahjong Titans and Inkball
•
Advanced Calculator functions including saving history
•
Improved networking via HomeGroups
•
key protection with networks
•
Device Stage for recognizing USB devices faster.
Changes and improvements from Windows XP only •
New Start Icon
•
Aero Snap, Shake and Peek
•
Desktop icons like “Computer” and “My Documents” are removed and accessed through the Start Menu
•
Larger icons and hidden icons in the Taskbar
•
Quick Launch toolbar has been replaced by pinning a program to the Taskbar
•
Jump Lists for easier access
• •
A Search Bar in the Start Up Menu The "Run" command is accessed through the Start Menu's Search Bar
•
Faster and smoother gaming components
•
s for monitoring computer use
•
Update feature that eliminates web surfing for patches
2. Implementation of various aero features of window 7. Aero Features Windows 7 uses a group of features called Windows Aero. Aero is a visual desktop experience that combines translucent windows, appealing color and graphics effects with convenient functionality. Aero includes Snap, Peek, Shake and Flip. Aero is an interface that makes your visual interactions with the desktop fun and easy. • Aero Peek makes your open windows transparent so you may see your desktop. It also allows you to peek at items in your taskbar for a thumbnail preview. • Aero Snap is a quick way to resize your windows to make them easier to read, organize
• •
and compare. Aero Flip allows you to preview all your open windows from a central window or 3D view that you can flip through. Aero Shake allows you to take your mouse and shake only the open window you want to focus on and the rest will disappear.
Snap Snap allows you to resize open windows to make reviewing and comparing easier.
Overlapping windows
Side-by-side Snap view
1. Place the mouse at the top of the window, drag to the left or right of the screen, wait for
the transparent window to appear and let go. 2. Your window should Snap into place. 3. To return to the full view, Snap the window to the top of the screen.
Peek You can view your open windows on the taskbar by using Peek. Simply scroll the mouse over the taskbar icons and a thumbnail preview of the open windows will appear.
Aero Peek However the mouse over the windows in Peek and the full window will appear on your screen. 1. Click on the Peek preview to open the window or click on the "X" to close the window from the Peek view.
Previewing a window with Aero Peek Shake When your desktop is cluttered with open windows, you can use Shake to select a single window and close the rest. 1. Click on the top of the window you want to focus on, Shake it and the rest of the windows will disappear. 2. Simply Shake the window again and the closed windows will reappear.
Cluttered screen
Shake to clear screen Flip Flip and Flip 3D are two more ways you can preview your open windows.
Aero Flip 1. Press and hold the Alt key and then press Tab to open the Flip view of your open
windows. 2. While still pressing the Alt key, you can Flip through the open windows by pressing the Tab key. 3. Stop on the window you want to open and it will appear on the full screen.
Aero Flip 3D 1. Press and hold the Windows key and then press Tab for a 3D version of Flip. 2. Use the Tab key or Arrow keys to Flip through your open windows. 3.Implementation of snipping tool, sticky notes and task bar features. Taskbar
Get immediateaccess with Jump Lists
The taskbar is now more convenient to use with larger views and easier access. •
Jump Lists allow you to right click on an icon in the taskbar and immediately access items like music, videos or web pages that you use on a regular basis.
• •
Pin allows you to place programs on the taskbar and rearrange the order of the icons as you wish. Action Center allows you to control the alerts and pop-ups you receive regarding maintenance and security.
Search
Find documentsfast with the new Search As soon as you start typing in theSearch bar of the Start Menu you will instantly see a list of relevant options grouped by categories with highlighted keywords and text. This allows you to easily scan for the documents, music, pictures and email you are looking for.
Libraries
Access your files in Libraries
Libraries allow you to organize your files in one place so they are easy to search and access. Windows 7 has four default Libraries for documents, music, pictures and videos, however you can customize and create you own Libraries based on your needs.
Gadgets
Desktop
gadgets
You can select or gadgets such as a slide show, calendar or weather update to add to your desktop. The live updates of some gadgets like weather, stocks and feed headlines are quite convenient.
Additional things you can do in Windows 7 •
•
• • •
Device Stage: When you plug a device into your computer such as a camera, mobile phone or flash drive, a window will open up with a menu of popular tasks, status information and options for your device. Windows Live Essentials: Windows Live Essentials is free software that enhances the Windows 7 experience. It replaces Windows Mail and allows you to email, instant message, edit photos, blog, etc. Home Group: Home Group allows you to connect two or more PCs on a home network in order to easily share and access files and printers. Windows Touch: You can use Windows Touch with a touch-screen PC to browse and flick through the screen using your fingers with multitouch technology. Remote Media Streaming: With Remote Media Streaming you can access your music, pictures
and videos stored on your home PC remotely using the Internet. Viewing open windows with Aero Peek •
If you wish, you can change the order of the icons by clicking and dragging the icon to whatever space you desire on the taskbar.
Pin a program to the taskbar You may Pin programs to the taskbar and access them with a single click of the mouse. •
To Pin a program, drag it to the taskbar and release.
Pinning a program to the taskbar •
To Unpin programs, simply right click on the icon and select Unpin.
Unpinning a program Access a Jump List A Jump List is like a "mini-menu" for a program. It allows quick access to recent files, frequently viewed items, performance tasks and more. For example, you may select
frequently used websites with a simple click from the Internet Explorer Jump List.
•
Right click on an icon to open the program's Jump List.
A Jump List for Internet Explorer More Taskbar Features Click the buttons in the interactive below to learn more about the additional taskbar icons.
Show Desktop To Peek at the desktop without closing windows: 1. Hover the mouse over the Show desktopbutton.
The Show desktopbutton 2. The windows will become transparent allowing you to see the desktop.
Viewing the desktop
3. Click on the Show desktop button to close the windows. 4. Click again and the windows will return.
3. Understanding window upgrade, window update and action center. Upgrading to Windows 7 Windows 7 Versions and Pricing The major upgrade versions of Windows 7 are Home , Professional, and Ultimate. Home is the most popular version of Windows 7 and will likely suit the needs of most s. The Professional version may appeal to small to medium business owners as it has extras like Windows XP mode and networking back up features. Ultimate is the most powerful version with added security features, such as Bitlocker and the flexibility of use in 35 languages.
Major upgrade versions To see which features each version of Windows 7 has, go to Microsoft's Compare Windows 7 page. • You may come across a Windows 7 Starter version. This version is made for smaller laptops (sometimes called netbooks) and will have limited performance and features compared to Home . • There is also a Windows 7 Home Family Pack ($149.99) for upgrading up to three PCs in the home. • Full versions of the above products are more expensive, but will only be required if you are not already running Windows XP or Vista. Windows 7 Requirements for Upgrade In order to run Windows 7, your PC must have the following: •
1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor
•
1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit)
•
16 GB available hard disk space (32-bit) or 20 GB (64-bit)
•
DirectX 9 graphics device with WDDM 1.0 or higher driver
Additional System Requirements may be needed to run certain features. Windows 7 Upgrade Advisor Microsoft is providing a tool called the Windows 7 Upgrade Advisor so customers can determine if their PC is able to run Windows 7. It is a good idea to the Windows 7 Upgrade Advisor before upgrading upgrading. It will analyze your computer's processor, memory, storage, graphics capabilities and any other compatibility issues. If possible, it will also provide guidance for resolving issues. You should plug in and connect all USB devices, printers, external hard drives, etc. when running the Upgrade Advisor. This will provide the best analysis of your system. Windows Experience Index It is another indicator of how well your computer will respond to window 7.the window experience indedx tests your system and rates it with a score between 1 and 7.9. The higher the score the better your computer’s performance. 1. To check your windows experience index, click on the start menu and select computer. The computer window will appear. 2. Select system properties in the button bar at the top of the screen. The system window displays your computer’s windows experience index rating. It also shows other system information, including whether your computer has a 32 bit or 64 bit processor.
3. Select windows experience index link to view the rating of individual computer components that are scored. The rating is determined by lowest subscore.
If you are currently using Windows Vista then your upgrade experience might be quite easy. If you have XP, then upgrading will likely be more complicated. Either way, it is probably best to and run the Windows Upgrade Advisor before proceeding. Based on the current version of your operating system, you will need to figure out if you have to perform a simple upgrade or a custom (clean) installation. You can visit Microsoft's Windows 7 page to determine what type of upgrade you need and what additional information should be considered before performing the upgrade. Even if you do not need to do the custom (clean) installation, it is a good idea to back up your files before upgrading. For more information, read Backing Up Your Computer in our Computer Basics tutorial. Microsoft provides instructions for doing a custom (clean) installation. However, you may want to consider using a computer service professional if you are not comfortable with this process. In this case, the score of 4.3 should be sufficient to experience most of the new windows features. If your system scores lower than a 3, you may miss out on some of the digital media and graphics features, including Window's Aero. What Kind of Upgrade do I Need?
Once you have determined which Windows 7 version you want and what kind of upgrade you need to perform, you may go to a retail outlet or the online Microsoft Store to purchase your upgrade. Conclusion Now that you know what it takes to upgrade, you have a better idea of whether Windows 7 is right for you. Depending on your circumstances, upgrading may be an easy or complicated process. As previously mentioned you should weigh any complications you may experience with your desire for the improvements and features that Windows 7 has to offer. Time and cost are also factors, especially if you are considering purchasing a new computer.
Personalize Font Settings You may adjust the Font Settings and ClearType on your desktop based on your preferences. To Change the Font:
1. From the Search bar in the Start Menu, type and select Fonts. 2. Select the Font you desire from the Fonts
To Change the Font Size: 1. Adjust the Font Size by selecting Change Font Size from the menu on the left of the Fonts
pane. 2. Select the desired font size and click Apply.
Changing the font size Please note that a larger font size may interfere with how some items are displayed on the screen. ClearType You may also adjust the ClearType for your screen. ClearType helps improve the readability of text on LCD monitors and screens. •
To adjust ClearType, select Adjust ClearType text from the menu on the left of the Fonts pane and following the steps for selecting the text that appears the best to you.
Action Center:
What is the Action Center? The Action Center is a centralized place to view Security and Maintenance messages, and it also makes it easy to find and fix problems with your computer. To Use the Action Center: If you have any important messages, the flag icon on the taskbar will display a red "X" symbol. 1. To open the Action Center, click on the small flag icon on the taskbar. 2. Review the messages. 3. Click Open Action Center to respond to messages.
Open the Action Center To Access the Action Center from the Control : 1. Click Start. 2. Go to the Control . 3. Click Review Your Computer's Status under System and Security.
Fixing problems using the Action Center: Your messages are displayed in the Action Center pane. Important messages will have a red bar, and less important ones will have a yellow bar. If a security or maintenance issue has a solution, there will be a button on the right side of the message. Some messages are just notifications and do not indicate a problem with your computer. Those messages will not include a solution button, but they may still have important information or instructions.
Respond to messages in the Action Center Changing Your Control Settings What is Control? Control warns you when a program or is trying to change your computer's settings. It puts a temporary lock on your computer until you confirm that you want to allow the changes. This helps to protect your computer frommalicious software. When it was introduced in Windows Vista, many s found that it generated too many disruptive pop -up warnings. Windows 7 now lets the decide how often they will receive those warnings.
To Change Your Control Settings: 1. Open the Action Center. 2. Click Change Control settings.
Change Control Settings Use the slider to choose the level of protection you want from Control. It is recommended that you use one of the top two settings. The other two should only be used in special circumstances. It may be best to choose the highest setting and if you end up getting too many popups, you can always lower it to the second setting. 4.
Adjust how you receive notification messages
Windows 7 Troubleshooting Not all computer problems will be shown in the Action Center. For example, you may be having trouble with aparticular program or device, or with connecting to the internet. For these types of problems, you will want to view the Troubleshooting options. To get there, click Troubleshooting at the bottom of the Action Center pane.
Access Troubleshooting In the Troubleshooting pane you will see a number of programs called troubleshooters, which help you identify and fix problems with your software and hardware. Click the buttons in the interactive below to see information about some useful troubleshooters. Note that your computer may have a slightly different list of troubleshooters.
4. To create and setting up on . To create a new : 1. From the Manage s pane, click Create a new . 2. Type an name.
Creating an 3. Select Standard or .
4. Click Create .
Changing an 's Settings Once you've created a new , you may want to add a or make other changes to the 'ssettings. To Create a : 1. From the Manage s pane, click the name or picture.
2. Click Create a .
Create a 3. Type a in the New field and retype it in the Confirm new
field.
Type a and hint 4. If you want, you can type a hint to help you your . 5. Click Create . 6. To go back to the Manage s pane, click Manage another .
s are case sensitive, which means that capital and lowercase letters are treated as different characters. For example, aBc1 is not the same as abc1. To Change Your Picture: You can also change the picture for any . This picture appears next to the name and helps you easily identify the . 1. From the Manage s pane, click the name or picture. 2. Click Change the picture.
Change the picture 3. Select a picture, or click Browse for more pictures to select one of your own.
pictures 4. Click Change Picture.
Standard vs. s Before you start making new s, it's important to understand the two types of s:
Standard: Standard s are the basic s you use for normal, everyday tasks. As a Standard , you can do just about anything you would need to do, such as running software or personalizing your desktop. Also, s can be placed on Standard s. : s are special s used for making certain changes to system settings or managing other people's s. They have full access to every setting on the computer. Every computer will have at least one .
So as you can see, s are more powerful. But for the same reason, Standard s are safer, so they are generally better for everyday use. In fact, you can make -level changes while logged into a Standard ; you will just need to provide an when making the changes. To Go to Your s: 1. Go to your Control from the Start Menu. 2. Click Add or remove s.
3. The Manage s pane will appear. You will see all of the s here, and you can add more s or manage existing ones.
The Manage s pane Using s Windows 7 offers various s to help you control the types of content that your children can access. You can place s on any Standard , and each can have different settings. If you have more than one child, each child can have access to different types of content, and you can always change the s settings as your child gets older. Learn more about s in this video. Before You Set Up s You'll need to create an for your child, if you haven't already. It should be a Standard ; you can't apply s to an . When you're setting up s, it doesn't matter which you're logged into, but if you're logged into a Standard , then you'll need to provide an before making any changes. Make sure that your child does not know your , as it would allow them to change or disable s for any . To Set up s: 1. Go to your Control from the Start Menu. 2. Click Set up s for any .
Getting to s 3. Click on any Standard .
Choose an 4. Click On to turn s on.
s main page 5. Now you can click Time limits, Games or Allow and block specific programs to set the
s. We'll explore each of these on the next page. Changing Your s Settings Time Limits The Time limits settings allow you to control when your child can use the computer. Click and drag from any box to allow or block a section of time. If you want, you can set different time limits on different days. For example, you may want to allow more computer use on weekends.
Time limits
Games The Games settings allow you to select which game ratings to allow, and you can also allow or block specific games. First you'll have to click Yes to allow your child to play games, then you can change your Games settings.
Games settings Here we have selected "Everyone" as the highest rating allowed. That means thechild can play games rated "Everyone" OR "Early Childhood."
Game ratings
To Allow or Block Specific Programs: Allow and block specific programs controls which non-game programs your child can use. By default, your child can use all non-game programs. But there may be some programs you don't
want your child to use like a financial or email program. Here's how to block specific programs:
1. Click Will Jr can only use the programs I allow. 2. Click Check All. 3. Uncheck the programs you want to block.
Non-game programs
5. Commands for window power shell and MSCONFIG. How to use MSCONFIG in Windows 7 Here is how to use MSCONFIG in Windows 7 to disable some of the unnecessary programs that automatically load on start-up. Disabling these programs will help your computer boot faster. 1. Click on the Windows 7 start icon in the bottom left corner of your screen.
2. Type MSCONFIG in the search box and then either press enter on your keyboard or double-click on the MSCONFIG program that appears in the search results. 3. Windows 7 will launch Microsoft's System Configuration Utility. Click on the Startup tab.
4. This takes you to a page with a list of "startup items." Startup items are programs that are automatically loaded every time you turn on your computer. Some startup programs are absolutely necessary, others are simply a waste of RAM.
In Windows 7, allmost all of Windows' essential programs are loaded through something called "Windows Services." This means that most of the startup items you see in Windows 7 are completely optional and can be turned off. However, a good rule of thumb is to disable only those programs that you recognize and don't need to have running all the time. When in doubt, leave it on. Or, better still, check out Paul "PacMan" Collins'
huge
"Startup
Applications"
list
at
http://www.pacs-
portal.co.uk/startup_search.php. This list of over 25,000 startup items you may encounter in MSCONFIG tells you which items are absolutely necessary, which items are optional, and which items you should definitely uncheck. Commands for window power shell: 1: Get-Help The first PowerShell cmdlet every should learn is Get-Help. You can use this command to get help with any other command. For example, if you want to know how the Get-Process command works, you can type: Get-Help -Name Get-Process You can also use Get-Help with individual nouns and verbs. For example, to find out all the commands you can use with the Get verb, type: Get-Help -Name Get-* 2: Set-ExecutionPolicy Although you can create and execute PowerShell scripts, Microsoft has disabled scripting by default in an effort to prevent malicious code from executing in a PowerShell environment. You can use the SetExecutionPolicy command to control the
level of security surrounding PowerShell scripts. Four levels of security are available to you: •
• •
•
Restricted -- Restricted is the default execution policy and locks PowerShell down so that commands can be entered only interactively. PowerShell scripts are not allowed to run. All Signed -- If the execution policy is set to All Signed then scripts will be allowed to run, but only if they are signed by a trusted publisher. Remote Signed -- If the execution policy is set to Remote Signed, any PowerShell scripts that have been locally created will be allowed to run. Scripts created remotely are allowed to run only if they are signed by a trusted publisher. Unrestricted -- As the name implies, Unrestricted removes all restrictions from the execution policy.
You can set an execution policy by entering the Set-ExecutionPolicy command followed by the name of the policy. For example, if you wanted to allow scripts to run in an unrestricted manner you could type: Set-ExecutionPolicy Unrestricted 3: Get-ExecutionPolicy If you're working on an unfamiliar server, you'll need to know what execution policy is in use before you attempt to run a script. You can find out by using the GetExecutionPolicy command. 4: Get-Service The Get-Service command provides a list of all of the services that are installed on the system. If you are interested in a specific service you can append the -Name switch and the name of the service (wildcards are permitted) When you do, Windows will show you the service's state. 5: Convert To-HTML PowerShell can provide a wealth of information about the system, but sometimes you need to do more than just view the information onscreen. Sometimes, it's helpful to create a report you can send to someone. One way of accomplishing this is by using the ConvertTo-HTML command. To use this command, simply pipe the output from another command into the ConvertTo-HTML command. You will have to use the -Property switch to control which output properties are included in the HTML file and you will have to provide a filename.
To see how this command might be used, think back to the previous section, where we typed Get-Service to create a list of every service that's installed on the system. Now imagine that you want to create an HTML report that lists the name of each service along with its status (regardless of whether the service is running). To do so, you could use the following command: Get-Service | ConvertTo-HTML -Property Name, Status > C:\services.htm 6: Export-CSV Just as you can create an HTML report based on PowerShell data, you can also export data from PowerShell into a CSV file that you can open using Microsoft Excel. The syntax is similar to that of converting a command's output to HTML. At a minimum, you must provide an output filename. For example, to export the list of system services to a CSV file, you could use the following command: Get-Service | Export-CSV c:\service.csv 7: Select-Object If you tried using the command above, you know that there were numerous properties included in the CSV file. It's often helpful to narrow things down by including only the properties you are really interested in. This is where the Select-Object command comes into play. The Select-Object command allows you to specify specific properties for inclusion. For example, to create a CSV file containing the name of each system service and its status, you could use the following command: Get-Service | Select-Object Name, Status | Export-CSV c:\service.csv 8: Get-EventLog You can actually use PowerShell to parse your computer's event logs. There are several parameters available, but you can try out the command by simply providing the -Log switch followed by the name of the log file. For example, to see the Application log, you could use the following command: Get-EventLog -Log "Application" Of course, you would rarely use this command in the real world. You're more likely to use other commands to filter the output and dump it to a CSV or an HTML file. 9: Get-Process
Just as you can use the Get-Service command to display a list of all of the system services, you can use the Get-Process command to display a list of all of the processes that are currently running on the system. 10: Stop-Process Sometimes, a process will freeze up. When this happens, you can use the Get-Process command to get the name or the process ID for the process that has stopped responding. You can then terminate the process by using the Stop-Process command. You can terminate a process based on its name or on its process ID. For example, you could terminate Notepad by using one of the following commands: Stop-Process -Name notepad Stop-Process -ID 2668 Keep in mind that the process ID may change from session to session. 11. Get-Date 12. Clear-Host
Get current date and time clear/cls Clear the screen
6. To understand system restore, recovery tool option, various safe mode options and MMC console management. Recovering Your Settings with System Restore What is System Restore? Programs that you install can make changes to your system settings, and occasionally this can cause problems with your computer. System Restore is often the easiest way to fix these problems. System Restore allows you to "rewind" your system settings to an earlier point in time, called a restore point. Keep in mind, this will not erase your recent documents, and it cannot be used to recover lost documents or other files. However, it may uninstall recent programs and drivers. To Run System Restore: 1. Click Recovery at the bottom of the Action Center.
Opening System Restore 2. Click Open System Restore. 3. Follow the instructions on the screen. 4. You will be asked to select a restore point. If you've just installed a program that seems
to be causing problems, you will probably want to restore your system to the point just before that program was installed.
Choose a system restore point Microsoft Management Console 3.0 Microsoft has based most of its management applications on the Microsoft Management Console, or the MMC. The MMC provides a framework for building management consoles. This
framework has been used by Microsoft and many third-party application vendors for creating their management consoles. In fact, many of configuration tools available in Windows 7 are really MMC consoles with pre-added snap-ins. The consoles are then saved in such a way that they cannot be directly altered by s. The MMC contains snap-ins that are used for system and application management. As seen in Figure 5.22, Windows 7comes with many built-in MMC snap-ins that can be used to manage the system. These snap-ins can
Figure 5.22: Windows 7 MMC Snap-ins be used to manage settings, Windows applications, security, and many other vital aspects of the system. Windows 7 contains the following built-in MMC snap-ins: •
ActiveX Control – This snap-in allows you to add individual ActiveX controls to view and configure. ActiveX controls are Internet Explorer plug-ins that are used to add functionality to the browser.
•
Authorization Manager – This snap-in allows you to set permissions for Authorization Managerenabled applications.
•
Certificates – This snap-in allows you to configure the different certificate stores available on the system. Certificates help provide a secure operating environment for your system. You can use them for identification, securing data, and securing communications. There are certificate stores in place for s, applications, and the system itself.
•
Component Services – This snap-in is used to manage the system's COM+, or Component Services configuration. You can also configure Distributed Computer Object Model (DCOM) and Distributed Transaction Coordinator (DTC) settings using this snap-in. These are especially important when programs need to communicate between multiple computers.
•
Computer Management – This snap-in is actually a collection of snap-ins used for task scheduling, disk management, performance monitoring, and many other configuration and management tasks.
These snap-ins are grouped together under Computer Management for ease of use. •
Device Manager – This snap-in is used for viewing and configuration of hardware devices installed on the system. You disable devices, update drivers, and troubleshoot potential issues with your hardware devices.
•
Disk Management – This snap-in is used for disk and volume management. You can create volumes, format disks, and enable fault tolerance.
•
Event Viewer – This snap-in is used to view the system event logs. These logs can help you determine if your system or applications are having problems. The Security log can also be used to determine if there is unauthorized access to your system.
•
Folder – This snap-in is used to add a folder than can be used for organizing your snap-ins. This can come in very handy if you have added many snap-ins to a single MMC console.
OS Lab manual
Group Policy Object Editor – This snap-in is used for configuring the Group Policy Objects on the system. Group policies are used to provide a centralized way for managing your systems. IP Security Monitor – This snap-in is used to monitor the status of your IP Security(IPsec) configuration. IPsec is used to secure communications between computers. This snap-in can help you determine which IPsec policies are being applied to your systems. IP Security Policy Management – This snap-in is used to understand and configure the settings in your IPsec policy. Link to Web Address – This snap-in allows you to add a Web page to the MMC. This can be useful for applications and systems with Webbased management. Local s and Groups – This snap-in allows you to configure s and groups on the local system. You can add s, delete s, and configure various properties. NAP Client Configuration – This snap-in allows you to configure Network Access Protection (NAP) client configuration settings. NAP is a security feature that is used to limit who can gain access to your network. Performance Monitor – This snap-in allows you to monitor your system performance, including memory, hard disks, processors, and many other components. Print Management – This snap-in is used to manage print servers and printers connected to the system. Resultant Set of Policy – This snap-in is used to show what settings will be applied to the system after all policies have been applied. This helps when you want to test out your Group Policy settings without actually applying them to the system. Security Configuration and Analysis – This snap-in provides configuration and analysis of security templates being applied to the system. Security Templates – This snap-in allows you to edit the security templates that can be applied to the system. Services – This snap-in allows to you view and configure the properties for services running on the system. You can disable, start, stop, or restart services. You can also configure authentication and fault tolerance for services.
OS Lab manual
Shared Folders – This snap-in allow you to view properties and status information for file shares that exist on the system. You can see what folders are beings shared and who is accessing them. Task Scheduler – This snap-in allows you to sche dule tasks to be automatically run at specified times and/or at specified intervals. TPM Management – This snap-in allows you to configure the Trusted Platform Module, if one exists in the system. Trusted Platform Modules are used to generate keys for cryptographic operations. Windows Firewall with Advanced Security – This snap-in allows you to configure Windows Firewall settings on the system. You can control what processes, applications, and systems can access your system or generate network traffic from your system.
•
WMI Control – This snap-in allows you to configure and manage the Windows Management Instrumentation (WMI) service. WMI is used for management and monitoring of Windows systems. To add snap-ins to an MMC console, do the following: 1. Run the command MMC.exe from a command prompt or from the Windows 7 Search bar. 2. If prompted by UAC to allow the MMC to make changes to the computer, click Yes. This
should bring up a blank MMC console. 3. From the File menu, select Add/Remove Snap-in. 4. From the Add or Remove Snap-ins window, choose the snap-in you want to add.
ClickAdd. Depending on the snap-in you add, you may be prompted for additional information. 5. After you have added all your snap-ins, click OK. You snap-ins should now appear in the
MMC. The MMC can be very flexible. You can add whatever snap-ins you want to a blank MMC console. You can also modify one of the predefined management tools that use the MMC. After you have modified an MMC console, you have the option to save your changes. Simply select File | Save or File | Save As, whichever is appropriate. There are also other options available for controlling what can and cannot be done inside an MMC console. If you choose File | Options, you will be presented with the MMC Options window, as seen in Figure 5.23. Here, you can change the icon used for console, or set the console mode. The console mode determines what s can and cannot see within the console and what changes they can make. The following are the four basic console modes available for the MMC:
OS Lab manual •
Author mode – This mode gives you full access to do anything in the MMC. You can add and remove snap-ins, create views, and open new windows.
•
mode – full access – This mode give you full access to the tree within the MMC. But, you cannot add or remove snap-ins.
•
mode – limited access, multiple window – This mode prevents you from being able to view contents of the tree that are not visible in the console window.
•
mode – limited access, single window – This mode opens the console with just a single window.
s cannot view items that do not appear in that window. The Options window allows you to specify if changes to the console can be saved. There is also an option for whether or not to allow the to customize the console views.
MMC Options Window Computer Management Console •
System Tools – Task Scheduler, Event Viewer, Shared Folders, Local s and Groups, Performance, Device Manager
•
Storage – Disk Management
•
Services and Applications – Services, WMI Control
Figure 5.24: Computer Management Console These snap-ins are used to manage the system. Again, these snap-ins can be used individually. The Computer Management console just puts them all together to make management easier. If you need to, you can create a custom MMC console with these snap-ins in addition to others.
OS Lab manual
Local Group Policy Editor Setting individual settings can be quite cumbersome. To help Windows uses the concept of group policies. Group policies can be used to easily set multiple settings. Windows 7 comes with an MMC snap-in called Group Policy Object Editor. You can add this snap-in to the MMC and choose Local Computer when asked which Group Policy Object to edit. Now, you can edit the computer's local group policy. As seen in Figure 5.25, the local computer policy is divided into two main sections:Computer Configuration and Configuration.
Figure 5.25: Local Computer Policy Snap-in Computer Configuration The Computer Configuration section is used for computer-wide settings. Many of these settings are applied when the system first boots up. These settings will apply to any who logs into the system. The Computer Configuration section contains three subfolders: •
Software Settings – By default, there is nothing to be configured here.
•
Windows Settings – These are general Windows settings that can be configured for all s. There are subnodes for Name Resolution Policy, Scripts(Startup/Shutdown), Deployed Printers, Security Settings, and Policy-based QoS.
•
istrative Templates – These are registry-based settings that can be set for the system. There are subnodes for Control , Network, Printers, System, andWindows Components.
Configuration The Configuration section is used for -specific settings. Most of these settings are not applied until a logs into a system. These settings will apply no matter what system a logs into. The Configuration section contains three subfolders: •
Software Settings – By default, there is nothing to be configured here.
•
Windows Settings – These are general Windows settings that can be configured for all s. There are subnodes for Scripts(Logon/Logoff), Security Settings, Policy-based QoS, Deployed Printers, and Internet Explorer Maintenance.
OS Lab manual •
istrative Templates – These are registry-based settings that can be set for the system. There are subnodes for Control , Desktop, Network, Shared Folders, Start Menu, and Taskbar, System, and Windows Components.
7. Introduction to window 7 upgrade advisor, windows defender and windows registry file. Windows Registry The registry has long been the central configuration store for Windows systems. The registry is divided in categories called hives. These hives are where the actual configuration settings are stored. There are five main hives in the registry are as follows: • HKEY_CLASSES_ROOT – This maintains file type associations. •
HKEY_CURRENT_ – This maintains settings for the currently logged into the system.
•
HKEY_LOCAL_MACHINE – This maintain system-wide settings.
•
HKEY_S – This maintains settings for all s.
•
HKEY_CURRENT_CONFIG – This maintains information about the current hardware configuration.
The registry can be modified directly or indirectly. You must be careful when modifying the registry directly. Any misconfigurations or typos can severely affect the functioning of your system. Regedt32 is the primary tool provided with Windows 7 for modifying the registry. You can use Regedt32 to configure registry settings and to set registry permissions. Simplified Configuration and Management of Desktops Microsoft developers included an undocumented method for simplifying istration by combining shortcuts. It is a simple and single container with multiple shortcuts to Windows 7 options that are available through other methods as seen in Figure 5.26. This may be helpful for s and power s alike to configure and manage single Windows 7 desktops.
OS Lab manual
Combined Shortcut Window Windows Task Scheduler 1. Open Task Scheduler by clicking the Start button , clicking Control , clicking System and Security, clickingistrative Tools, and then double-clicking Task Scheduler. If you're prompted for an or confirmation, type the or provide confirmation. 2. Click the Action menu, and then click Create Basic Task. 3. Type a name for the task and an optional description, and then click Next. 4. Do one of the following: • To select a schedule based on the calendar, click Daily, Weekly, Monthly, or One time, click Next; specify the schedule you want to use, and then click Next. • To select a schedule based on common recurring events, click When the computer starts or When I log on, and then click Next. • To select a schedule based on specific events, click When a specific event is logged, click Next; specify the event log and other information using the drop-down lists, and then click Next. 5. To schedule a program to start automatically, click Start a program, and then click Next. 6. Click Browse to find the program you want to start, and then click Next. 7. Click Finish. To schedule a task to run automatically when the computer starts If you want a task to run when the computer starts, whether a is logged on or not, follow these steps. 1. Open Task Scheduler by clicking the Start button , clicking Control , clicking System and Security, clickingistrative Tools, and then double-clicking Task Scheduler. If you're prompted for an or confirmation, type the or provide confirmation.
OS Lab manual
2. Click the Action menu, and then click Create Basic Task. 3. Type a name for the task and an optional description, and then click Next. 4. Click When the computer starts, and then click Next. 5. To schedule a program to start automatically, click Start a program, and then click Next. 6. Click Browse to find the program you want to start, and then click Next. 7. Select the Open the Properties dialog for this task when I click Finish check box and click Finish. 8. In the Properties dialog box, select Run whether is logged on or not, and then click OK.
8. Making a word file and how to protect it with . The following part shows you a simply instruction of protecting Microsoft Excel 2013 files. •
Open the Microsoft Excel 2013 spreadsheet that you want to protects. And click on the "FILE" on the left tip of the interface.
•
Select the "Info" option from the left-side of the File menu. Select "Protect Workbook" and then the "Encrypt with " on the drop down menu.
OS Lab manual
•
Type your in the Encrypt Document dialog window. that the should be strong and unforgettable. Note: A strong needs to contain special character such as @#$%^& and must be at least 8 characters long.
•
Re-enter your in the Conform window and click "OK".
OS Lab manual
How to Protect Excel 2013 Read Only Option? Microsoft Excel 2013 also let s to secure their documents from changing by using edit restriction options. Thus others can only read but cannot change your Excel 2013 files. Here is how: •
1. Click on the "FILE"-> "Info" option -> "Protect Workbook" -> Restrict Editing
•
2. Set the formatting as well as editing restrictions on the document.
•
3. Check the "Allow only this type of editing document" within the Editing Restrictions and choose the No change (Read only) option in the dropdown list and then select "Everyone" in groups.
OS Lab manual
•
4. Enter your in the "Start Enforcing Protection" box and click "OK".
Protecting an Excel 2013 workbook is easy with the steps above. In addition, a number of Excel 2013 s complain that they often encounter the dilemma of forgetting Excel 2013 . With that in mind, I will introduce a simple way for you to find your lost Excel 2013 below. How to Recover -protected Excel 2013 File? •
and install an Excel 2013 recovery tool on your computer. Launch the software after installation.
OS Lab manual
SmartKey Excel Recovery:
Size: 31.15MB
Secure •
Select an attack type to recover your forgotten MS Excel . (Normally choose from Brute-Force with Mask, Brute-Force Attack, and Dictionary).
•
Your lost will be appearing in the File Opening box of the pop-up dialogue window after a few seconds.
Now following the tips we offered you can easily protect workbook in Excel 2013 whenever you need to. And if unfortunately forgot MS Excel 2013 , don't worry; the powerful Microsoft Excel 2013 recovery tool will recover your effectively and professionally.
OS Lab manual
9. To create a blog. How To Create a Blog for Free in 4 Easy Steps Step 1: Choose a free blogging software. Step 2: for an and create your blog These articles from About.com Web Logs provide step-by-step instructions to help you start a blog with either of the two most popular free blogging softwares - Blogger.com and Wordpress.com. Step 3: Select Your Domain, Theme and Other Options. During the registration process for your new blog , you'll need to choose a domain name and blog theme. You also might want to take a few minutes before you actually start blogging to customize some of the other preferences for your blog that your blogging software allows you to modify such as the author name, comment moderation process, and so on. However, you're not required to do any customization before you start publishing blog posts. Step 4: Start blogging. Once you've completed steps 1-3, you're ready to the blogosphere and start publishing content on your blog. There are many more ways you can customize your blog with plug-ins, feeds, blogrolls, and more, but these four easy steps are all you need to follow in order to start a simple blog.
How to enable a pen drive to use on a system if it is disabled? Right click on My computer; You will see manage. Click on Manage, You will get the Computer management Local on the left and you will see device manager; Click on device manager; You will see Universal Serial Bus Controllers on the right; Click on USB Controllers you will see storage, right click on it, you will see the enable menu, just click it .
Remote Desktop Connection Remote Desktop Connection is a technology that allows you to sit at a computer (sometimes called the client computer) and connect to a remote computer (sometimes called the host computer) in a different location. For example, you can connect to your work computer from your home computer
OS Lab manual
and have access to all of your programs, files, and network resources as though you were in front of your computer at work. You can leave programs running at work and then, when you get home, you can see your work computer's desktop displayed on your home computer, with the same programs running.
A Remote Desktop connection between two computers You cannot use Remote Desktop Connection to connect to remote (host) computers running the following editions ofWindows Vista: •
Windows Vista Starter
•
Windows Vista Home Basic
•
Windows Vista Home Basic N
•
Windows Vista Home
However, any edition of Windows Vista can be running on your computer (the one you want to connect from). You cannot use Remote Desktop Connection to connect to remote computers running Windows XP. You don't need to install it. In this version of Windows, Remote Desktop Connection is installed by default. •
Open Remote Desktop Connection by clicking the Start button , clicking All Programs, clicking Accessories, and then clicking Remote Desktop Connection.
To allow remote connections on the computer you want to connect to, follow these steps: 1. Open System by clicking the Start button
and Maintenance, and then clicking System.
, clicking Control , clicking System
OS Lab manual 2. Click Remote settings on the left. 3. In the System Properties dialog box, under Remote Desktop, select the one of the three
options, and then click Select s. If you are prompted for an or confirmation, type the or provide confirmation. If you are an on the computer, your current will automatically be added to the list of remote s and you can skip the next two steps. 4. In the Remote Desktop s dialog box, click Add. 5. In the Select s or Groups dialog box, do the following: •
To specify the search location, click Locations, and then select the location you want to search.
•
In Enter the object names to select, type the name of the that you want to add, and then click OK. The name will be displayed in the list of s in the Remote Desktop s dialog box.
Note •
You can’t connect to a computer that is sleeping or hibernating, so make sure the settings for sleep and hibernation on the remote computer are set to Never. (Hibernation is not available on all computers.) For information about making those changes, see Change, create, or delete a power plan (scheme).
How do I change Remote Desktop Connection settings? 1. Open Remote Desktop Connection by clicking the Start button , clicking All Programs, clicking Accessories, and then clicking Remote Desktop Connection. 2. Before connecting, click Options, and then make the changes you want on the Display,
Local Resources, Programs,Experience, and Advanced tabs. 1. Note
To save these settings for future connections, on the General tab, click Save. 2. Click Connect.
How can I disconnect from a Remote Desktop session? To disconnect without ending your Remote Desktop session •
You can temporarily disconnect from a session by clicking the Close button on the connection bar (the horizontal bar at the top of your screen). This leaves your programs running so that, next time you connect, you can continue where you left off.
OS Lab manual
To end your Remote Desktop session and disconnect •
In the Remote Desktop Connection window, click the Start button next to the Lock button , and then click Log Off.
, click the arrow
How can I reconnect after temporarily disconnecting from a Remote Desktop session? Connect to the remote computer as you normally would. The next time you connect to the same remote computer, Remote Desktop Connection automatically reconnects to the session that was in progress (if the remote computer is set up to allow reconnecting of disconnected sessions).
Can I use keyboard shortcuts with Remote Desktop Connection? Yes. There are two ways to do this. You can set up the remote computer to recognize Windows keyboard shortcuts that you type (for example, ALT+TAB), or you can use Terminal Server keyboard shortcuts. To use Windows keyboard shortcuts, follow these steps: 1. Open Remote Desktop Connection by clicking the Start button
, clicking All Programs, clicking Accessories, and then clicking Remote Desktop Connection.
2. Click Options, and then click Local Resources. 3. Under Keyboard, select On the remote computer to make the remote computer
recognize the Windows keyboard shortcuts that you type. (You can also choose In full screen mode only to get the same result as long as you use Remote Desktop Connection in full-screen mode. This is the default setting.)
What is Windows Remote Assistance? Applies to Windows 7 Sometimes the best way to fix a problem is to have someone show you how. Windows Remote Assistance is a convenient way for someone you trust, such as a friend or technical person, to connect to your computer and walk you through a solution—even if that person isn't nearby. To help ensure that only people you invite can connect to your computer usingWindows Remote Assistance, all sessions are encrypted and protected.
OS Lab manual
Remote Assistance connection between two computers By following a few steps, you can invite someone to connect to your computer. After he or she is connected, that person can view your computer screen and chat with you about what you both see. With your permission, your helper can even use his or her own mouse and keyboard to control your computer and show you how to fix a problem. You can also help someone else the same way. For more information, see Get help with your computer using Windows Remote Assistance and Help someone with a computer problem using Windows Remote Assistance.
Sending a Remote Assistance Invitation 1. Open Help and Center by clicking Start, and then clicking Help and . 2. Under Ask for Assistance click Invite a friend to connect to your computer with
Remote Assistance. 3. The Remote Assistance page is displayed. Click Invite someone to help you. 4. There are three available options for sending the Remote Assistance invitation: Windows Messenger, email, or saving the invitation as a file. Choose one of the three options, and then follow the directions. With the email or Save as Invitation methods, the Novice will be given the opportunity to protect the session with a . The Novice must also select a time period when the invitation will automatically expire. The Novice can expire any invitation at any time by clicking the View invitation status link on the Remote Assistance page that is referred to in Step 3. 5. When the Expert receives the invitation, the Expert is prompted for the which the Novice set. After supplying this , the Expert can initiate the Remote Assistance session. 6. After the Expert initiates the session, the Novice's computer verifies the that the Expert entered. 7. The Novice's computer also checks to make sure that the invitation that the Expert used is a valid invitation and that the invitation is still open.
OS Lab manual 8. If the invitation is open and the is correct, the Novice receives a notification
stating that the Expert wants to start the session now and the Novice is prompted to start the Remote Assistance session. 9. If the Novice chooses to start the session, the Remote Assistance Novice chat dialog box will open on the Novice's computer and the Remote Assistance Expert console opens on the Expert's computer. At this point, the Expert can see everything on the Novice computer, in real time. 10. The Expert can request to take control of the Novices computer at this point by clicking the Take Control button on the Expert console. This sends a message to the Novice's computer notifying the Novice that the Expert is requesting to take control of the computer. The message provides the following three methods by which the Novice can stop the Experts control of their computer: Press the ESC key. Hold down the CTRL key, and then press the C key. Click the Stop Control button next to the Novice's chat window. 11. If the Novice chooses to give control of the computer to the Expert, the Novice and the
Expert share control of the keyboard and the mouse. It is best if the Novice does not move the mouse or type when the Expert has control because the session responds to both s inputs, which causes the mouse to behave erratically. If the Novice stops control, the Remote Assistance session continues and the Expert can still see the Novice's desktop.
10. Implementation of disk defragmenter and disk cleanup maintenance tools. What is disk defragmentation? Applies to Windows Vista Disk defragmentation describes the process of consolidating fragmented files on your computer's hard disk. Fragmentation happens to a hard disk over time as you save, change, or delete files. The changes that you save to a file are often stored at a location on the hard disk that's different from the original file. Additional changes are saved to even more locations. Over time, both the file and the hard disk itself become fragmented, and your computer slows down as it has to look in many different places to open a file. Disk Defragmenter is a tool that rearranges the data on your hard disk and reunites fragmented files so your computer can run more efficiently. In this version of Windows, Disk Defragmenter runs on a schedule so you don't have to to run it, although you can still run it manually or change the schedule it uses. To start Disk Defragmenter MMC, use one of the methods that is described in this article. Method 1: Use the Properties of Your Local Disk 1. Open My Computer.
OS Lab manual 2. Right-click the local disk volume that you want to defragment, and then click
Properties. 3. On the Tools tab, click Defragment Now. 4. Click Defragment. Method 2: Use Computer Management MMC 1. Start Computer Management MMC (Compmgmt.msc). 2. Click Disk Defragmenter. 3. Click the volume that you want to defragment, and then click Defragment.
Method 3: Use Disk Defragmenter MMC. 1. Start Disk Defragmenter MMC (Dfrg.msc). 2. Click the volume that you want to defragment, and then click Defragment.
The version of Disk Defragmenter MMC that is included with Windows XP has the following limitations: • • • •
It can defragment only local volumes. It can defragment only one volume at a time. It cannot defragment one volume while it is scanning another. It cannot be scheduled. If you need to schedule disk defragmentation, use the Defrag.exe command line tool. For additional information ing the command line Defrag.exe tool, click the following article number to view the article in the Microsoft Knowledge Base: 283080 Description of the New Command Line Defrag.exe Included with
Windows XP
It can run only one MMC snap-in at a time.
How to Defragment a Hard Drive on a Windows 7 PC By Dan Gookin from Troubleshooting Your PC For Dummies, 3rd Edition Defragmenting is commonly called defragging. No matter what you call it, defragging or defragmenting your hard drive will speed up disk performance. If you haven’t defragmented your PC’s hard drive in a while (or ever), you’re in for a treat. A freshly defragmented hard drive makes your computer seem brand new. Your PC’s main hard drive is automatically defragmented on a regular schedule when you use Windows 7. Even so, you can manually defragment your hard drive or removable storage media. In Windows 7, follow these steps to pull a manual defrag of the PC’s main hard drive: 1. Open the Computer window. 2. Right-click the media you want to defragment, such as the main hard drive, C. 3. In the drive’s Properties dialog box, click the Tools tab. 1. Click the Defragment Now button.
OS Lab manual
The Disk Defragmenter window appears. Rather than plow ahead and potentially waste time defragmenting a drive that doesn’t need it, check the media’s current fragmentation. 2. Click the Analyze Disk button. 3. Wait while Windows checks the defragmentation on the media.
Check the Percent Fragmented value by the disk in the Disk Defragmenter window. If it’s zero, there’s no point in continuing: Skip to Step 8. Even when the drive shows 0 percent fragmented files, you can still proceed with defragmentation. No media can be fully defragmented, so the Windows Defragmenter will always find something to do. 4. Click the Defragment Disk button.
Windows defragments the media. Sit back and watch, or do something else, though you shouldn’t do anything on your computer while the media is being defragmented. 5. Click the Close button, and close up any other windows you opened.
You may not notice any drastic improvement in disk performance, especially when the hard drive is frequently defragmented. But if you just defragmented your PC’s hard drive for the first time, prepare to be stunned. • •
•
You cannot defragment a network drive. Do not defragment a media card or flash drive. These drives have a limited number of “writes” available to them. That is, the media can data being written to it a finite number of times. This number can be huge, but it’s a real number; after reaching the number, the media becomes useless. By not defragmenting a media card or flash drive, you avoid accelerating the deadline. Optical drives cannot be defragmented. Even after running the Defragmentation utility, file fragments remain on the hard drive. That’s just the nature of disk storage. Please don’t obsess and run the defragmentation utilities over and over, trying to get a perfectly defragmented hard drive.
How to Use Disk Cleanup in Windows 7 and Vista A handy way to remove lots of files you don’t need on a hard drive is to employ the aptly named Disk Cleanup tool. What Disk Cleanup does is locate files that can easily be removed to free up some disk space, especially files that may not be obvious to you, such as temporary files used by Windows or when browsing the Internet. To run Disk Cleanup in Windows 7 and Windows Vista, follow these steps: 1. From the Start button menu, choose All Programs→Accessories→System Tools→Disk
Cleanup. 2. In Windows Vista, choose the option My Files Only.
OS Lab manual
Start with your own files first. If that doesn’t remove enough files, repeat these steps and choose the option Files from All s on This Computer. 3. If prompted, choose the mass storage device that you want to clean up.
The prompt appears only when you have multiple storage media on your PC. You probably want to choose drive C, the main storage device. 4. In the Disk Cleanup dialog box, place check marks by all the items you want to
remove. It’s okay to place check marks by all items. Those things wouldn’t be listed if they were crucial to the computer’s operation. There’s one exception to placing check marks by all the items, however: Hibernation File Cleaner. Do not remove that item if you use hibernation on your computer. 5. Click OK.
You’re not quite there yet. 6. Click the Delete Files button to begin the cleanup process.
Wait while the disk is being cleaned. When the process is complete, the window goes away. In Windows 7, you can click the Clean Up System Files button to remove unneeded bits and pieces of various Windows updates that may be littering the hard drive. Click the button before Step 4, and then after the system files are cleaned up, you can proceed with removing other disk detritus. You can also access the Disk Cleanup utility from a disk drive’s Properties dialog box by clicking the Disk Cleanup button on the General tab.
11. What is bitlocker and TPM. How a bitlocker encrypt a file. What is BitLocker? What does it do? What does it not do? BitLocker lets you encrypt the hard drive(s) on your Windows 7 and Vista Enterprise, Windows 7 and Vista Ultimate or Windows Server 2008 and R2. BitLocker will not encrypt hard drives for Windows XP, Windows 2000 or Windows 2003. Only Windows 7, Vista and Server 2008 include BitLocker. BitLocker drives can be encrypted with 128 bit or 256 bit encryption, this is plenty strong to protect your data in the event the computer is lost or stolen. BitLocker protects your hard drive from offline attack. This is the type of attack where a malicious will take the hard drive from your mobile machine and connect it to another
OS Lab manual
machine so they can harvest your data. BitLocker also protects your data if a malicious boots from an alternate Operating System. With either attack method, BitLocker encrypts the hard drive so that when someone has physical access to the drive, the drive is unreadable. Now if you are a network and you need to harvest data from a hard drive when a machine fails, our tools include the functionality to prompt the for the recovery key so the hard drive can be accessed. We've done a good job at ensuring the data does not end up in the wrong hands, while making it easy for authorized s to access the data in the event of a failure. What does BitLocker do? Again, BitLocker encrypts the hard drive(s) to protect the Operating System from offline attacks. Server 2008, 2008 R2, Windows 7 Enterprise, Windows 7 Ultimate, Windows Vista Enterprise, and Windows Vista Ultimate all include BitLocker functionality. Windows 7 Professional and Windows Vista Business Edition and the Home Editions do not include BitLocker. The RTM versions of Vista only allow BitLocker encryption of the C: drive. SP1 for Vista, and Windows 7 include the ability to encrypt all of the hard drives belonging to the Vista and Windows 7 machine. Server 2008 (and R2) include the ability to encrypt all of its attached hard drives as well. BitLocker on a Server 2008 (and R2) server might not make sense for your servers in the Data Center, but using BitLocker on servers in remote offices makes a lot of sense. How many remote offices have their servers in secure Data Centers? They don't! If you're lucky, your server sits in a locked closet. If you're unlucky, it sits under someone's desk. Deploying BitLocker to these machines makes perfect sense because if those machines are stolen, their data is encrypted and protected from the types of attacks that they would be exposed to. Another piece to protect these remote servers is the Read Only Domain Controller functionality. I won't go into it here, but it gives you the ability to provide fast logon experiences for your remote s while ensuring that all of the domain credentials are not stored on these remote office servers. Windows 7 extends BitLocker functionality to removable drives, we call that functionality BitLocker to Go. BitLocker to Go gives you the ability to encrypt your thumb drives and even USB hard drives. You even have the ability to enforce BitLocker to Go via Group Policy, this Group Policy can ensure that s can only store corporate data on encrypted drives. What does BitLocker not do? BitLocker does not protect the computers contents while Windows is running. Again, BitLocker is built foroffline attacks, once the operating system is up and running. Windows 7 and Vista will protect your data from unauthorized access. When 7 (and Vista) is up and running, unauthorized access can come in the form of: 1. A malicious trying to log onto the local computer. Windows 7 (and Vista) can
protect itself by enforcing strict policy and complexity. Please ensure that if your data is important enough to encrypt, that you also require complex s
OS Lab manual
and/or two factor authentication. Two factor authentication takes the simple s or easy to guess s out of the equation so that they are no longer a risk. 2. A malicious connecting to the computer over the network to harvest data from the local computer. If the has access to your physical network, the malicious can try to connect to your machine over the network. Again, strict permissions on the local machine and on your network as a whole, will prevent malicious s from accessing your network. How To Use BitLocker on Drives without TPM BitLocker is an encryption feature available in Ultimate and Enterprise versions of Windows 7 and Vista, but requires a Trusted Platform Module (TPM) on the system. Not all systems include TPM and today we take a look at how to by it so you can use BitLocker. Enable BitLocker You can use BitLocker to encrypt an entire fixed drive, such as the local drive Windows is installed on or an internal data drive. For removable flash or external USB drives you can use its younger brother, BitLocker To Go. First let’s take a look at how to enable BitLocker on a local hard drive. To encrypt an entire drive, simply right-click on the drive and select Turn on BitLocker from the context menu.
Next you’ll need to choose a secure that will be used to access the drive.
OS Lab manual
You’re prompted to store the recovery key which is used in the event you lose your or smartcard. If you store it as a file make sure that it’s not on the same drive that you’re encrypting.
OS Lab manual
Confirm you want the drive to be encrypted then wait until the process is complete. The amount of time it takes will vary based on the size and amount of data on the drive.
To access the encrypted drive you’ll need to enter in the to unlock it.
OS Lab manual
The drive icon will change to show it’s encrypted with BitLocker, where the gold lock indicates it’s locked up and the gray lock is displayed after you have unlocked it.
Use BitLocker on a Drive Without TPM What happens if you get this goofy error…and what is a TPM anyway? TPM stands for Trusted Platform Module which is a microchip in a computer that s advanced security features. It’s where BitLocker stores the encryption key. If you have a drive that doesn’t have a compatible TMP then you’ll need to use the following steps and have a flash drive.
OS Lab manual
Enter in gpedit.msc in the search box of the Start menu and hit Enter.
Under Local Computer Policy navigate to Computer Configuration \ istrative Templates \ Windows Components \ Bit Locker Drive Encryption \ Operating System Drives and double click on Require additional authentication at startup.
Enable the feature and check the box next to Allow BitLocker without a compatible TPM,click Apply and Ok, and close out of Local Group Policy Editor.
OS Lab manual
Go back to the hard drive you want to encrypt and turn on BitLocker. A restart will be required to prepare the disk, and at this point make sure the flash drive is plugged in.
After the restart you’re prompted to use the startup key on the flash drive every time you start the computer.
OS Lab manual
Select the drive you want to use to store the key.
After that the process is as we showed above. This method may not be as convenient but at least you don’t have to go out and buy a new system that includes a TPM. If you don’t want to deal with this process, read about how to encrypt your driving using TrueCrypt. Also, you might want to check out our article on using BitLocker To Go for encrypting flash drives.
OS Lab manual
Microsoft Enterprise Desktop Virtualization (MED-V)
Microsoft Enterprise Desktop Virtualization (MED-V) removes the barriers to Windows 7 upgrades by resolving application incompatibility. MED-V delivers applications in a Virtual PC workspace running Windows XP. It does this in a way that is completely seamless for the ; applications appear and function as though they were installed locally. MED-V enables IT teams to simplify management and delivery by accelerating deployment of critical operating system upgrades. Benefits of Using MED-V As previously stated, you can use MED-V to run Internet Explorer 7 or Internet Explorer 6 in a virtual environment with a previous operating system version, seamlessly integrated into the Windows 7 desktop. The following list addresses some of the benefits of using MED-V: •
MED-V is easy to provision and deploy. MED-V provides a way to automate the first-time setup of virtual machines at the endpoint, including assignment of a unique computer name, performing initial network setup, and ing the virtual machine to a corporate domain. With MED-V, you can customize images in heterogeneous desktop environments, and you can adjust the Virtual PC memory allocation based on available RAM on the host computer. Application and website provisioning is based on Active Directory s/groups. You can assign a virtual image and define which applications are available to the and which web sites should be redirected to Internet Explorer 6 or Internet Explorer 7.
•
MED-V is centrally managed. You can centrally define usage permissions and virtual machine settings and centrally monitor endpoint clients. There are also helpdesk tools to diagnose and troubleshoot virtual machines.
•
With MED-V, you can maintain a minimal inventory. While you do have additional operating systems, you are generally not burdened with many extra images to manage. While language packs or Internet Explorer 7 may require more images, many customers find that they need only a single additional image. MED-V provides an console for virtual image management and a central image repository for image storage, versioning, and delivery (which can be based on Internet Information Services [IIS] web servers, System Center Configuration Manager, or alternative deployment technologies). Integration with makes it possible to provision virtual images based on group hip or identity.
•
You can use standard image maintenance. With MED-V, you can continue using Windows Server® Update Services (WSUS) to deploy the latest Microsoft product updates or System Center
OS Lab manual
Configuration Manager. The MED-V workspace is managed as any other desktop in the enterprise. For more information, see the Microsoft Enterprise Desktop Virtualization Evaluation Guide. Also, see the Links for Further Information later in this document. Limitations of MED-V MED-V utilizes client machine resources, and this may be an issue for under-powered hardware. Starting the virtual machine on the client side can take a few minutes; it therefore might be beneficial to set the MED-V preference to leave the virtual machine running for the best experience. MED-V requires that you manage an extra operating system, which means extra inventory, patching, antivirus software, and so on. However, MED-V can be managed with the same tools that you are managing the MED-V host with, as an example you can patch the MED-V workspace with Windows Server Update Services (WSUS), as described in Appendix 5: Updating Using Windows Server Update Services. MED-V does not work on a virtualized operating system through virtualized desktop infrastructure (VDI). VDI clients are already virtual, so they cannot host a virtual instance. This means that if you are using VDI for desktops, you cannot host MED-V. How to Deploy and Configure MED-V Instructions for deploying and configuring MED-V can be found at MED-V Deployment and Configuration on TechNet. Following is a summary of the high-level steps: 1. Install and configure the MED-V Server component. 2. Configure the Image Web Distribution Server. 3. Install MED-V Client and MED-V Management Console. 4. Create Virtual PC Image for MED-V. 5. Create MED-V Workspace. 6. Test, pack, and Virtual PC Image. 7. Create and configure MED-V policy. 8. Test Internet Explorer access from client workstation.
Also see the MED-V Quick Start Guide and the Microsoft Enterprise Desktop Virtualization (MED-V) istration Video Series. How to Define Internet Explorer 6 or Internet Explorer 7 URL Redirection with MED-V A core function of MED-V is to redirect a URL from Internet Explorer 8 on a MED-V host to Internet Explorer 6 or Internet Explorer 7 on the guest, allowing companies to move to Windows® 7. This is done by configuring a policy in the MED-V Management Console where it is then applied to MED-V s throughout the company. MED-V policy dictates the who, what, and how of applications – who will receive the policy, what applications or websites they will see or be redirected to, and how those will be seen by the . In the case of redirecting websites, an defines which sites should be redirected to the guest and what happens when the types or selects a different site in the guest. The simply interacts
OS Lab manual
with the browser they are presented with, and the MED-V policy defined by the manages the s’ experience. The following screen shot shows a sample MED-V policy configuration in the MED-V Management Console, which can be used to publish Internet Explorer 6 to the host operating system. A workspace is defined and assigned to s (see the left pane for Workspaces in the following screenshot), and then the can define what applications can be seen on the MED-V host from the MED-V workspace. This is done by selecting the applications tab and identifying the shortcuts that will be created on the MEDV host. In the published applications section, a shortcut to Internet Explorer 6 has been created, which allows the to seamlessly launch Internet Explorer6 from the MED-V host. Publishing this shortcut is optional for automatic redirection but it demonstrates how any applications from the guest can be published to the host.
Figure 2. Applications tab. The following screen shot shows a sample MED-V policy configuration, which redirects all guest browser requests for http://site1 to the MED-V Internet Explorer instance. An can define a domain name or an IP address that will be redirected automatically from the MED-V host to the guest. Other features include the ability to force all other URLs browsed in the guest to be automatically redirected to the MED-V host as well as any “mailto” links. MED-V identifies the correct browser to deliver the content based on the MED-V policy.
OS Lab manual
Web tab.
12. Introduction to sky drive and windows live mesh. Windows Live Mesh
Windows Live Mesh
OS Lab manual
Windows Live Mesh
Developer(s)
Microsoft
Stable 2011 (15.4.3555.0308 Win, release 15.4.5726.23 Mac) / March 22, 2012; 16 months ago
Operating system Windows (XP and later) andMac OS X (Intel Only)
Type
Website
File sharing
explore.live.com/windowmesh s-live-
Windows Live Mesh Windows Live Mesh (formerly known as Live Mesh, Windows Live Sync, and Windows Live FolderShare) was a free-to-use Internet-based file synchronization application byMicrosoft designed to allow files and folders between two or more computers be in sync with each other on Windows (Vista and later) and Mac OS X (v. 10.5 Leopard and later, Intel processors only) computers or the Web via SkyDrive.[1] Windows Live Mesh also enabled remote desktop access via the Internet. Access files in your Mesh online storage
OS Lab manual
Windows Live Mesh was retired on February 13, 2013, and remote desktop and peer-to-peer syncing have stopped working. If you still have Mesh installed on a computer, you might see the message, "Sorry, there is a problem with the Windows Live Mesh servers." If you still have files in your Mesh online storage (called “Mesh synced storage” or “SkyDrive synced storage”) make sure you have copies of them on your computer. On August 13, 2013, all files in Mesh online storage will be permanently deleted. Save copies of the files in your Mesh online storage The latest versions of your files should already be on your computer. But if you stopped syncing them on your computer before Mesh was retired, or if you uninstalledMesh, follow these steps to access your files: 1. Go to the temporary Synced folders page. (You need to use this special link because the
address has changed and other links won’t work.) 2. Click View all synced folders. 3. Click a folder to view its contents. 4. Click each file to it.
Skydrive SkyDrive (officially Microsoft SkyDrive, previously Windows Live SkyDriveand Windows Live Folders) is a file hosting service that allows s to and sync files to a cloud storage and then access them from a Web browser or their local device. It is part of the Windows Live range of online services and allows s to keep the files private, share them with s, or make the files public. Publicly shared files do not require a Microsoft to access How to Use SkyDrive Edited by Codes for us, Aramanda, Kanhu, HaldirofLorien and 4 others 3 Article EditDiscuss Cloud computing means using off-site computer infrastructures that can be leased or freely used to provide for computer requirements of individuals and organisation. That infrastructure includes all resources of an in-site computer facility; that is, processors, physical memories (RAMs) and storages known as drives.
OS Lab manual
It helps, as is believed, to reduce costs of maintenance and upgrading of in-site facility lower on the idea of use it when you need and use it more when you need more. Moreover, you are not attached to your fixed IT fascilities and can have access to required resources on the go: on a variety mobile devices operating systems, and smartphones. One part of those resources, drives, comes to be more handy for individual s. Microsoft SkyDrive is among the most important ones. Steps 1. 1 Sign using your Microsoft . o If you do not have an ID, one free will be offered to you to sign up and . Just go to windows.live.com Windows Live
2. 2 Select your desired ID. In the next stage you have the option to choose your ID. o That could be at the "live dot", "outlook dot" or "hotmail dot" followed by your country URL extension. In the US it follows by "com" only.
OS Lab manual
3. 3 Follow simple procedure to finish getting your ID. o Now you are in your personal "outlook" page.
o Small dialogue shows finishing update. At any time you can launch SkyDrive by Clicking on "Open your SkyDrive folder." 4. 4
OS Lab manual
Look at the range of services available. Go to top left corner "Outlook" From the drop down menu select "Skydrive"
6. Observe that it immediately creates your sky drive on the cloud. You have place holder for your personal documents, pictures and public items. At the top there are options for creating on-line (that is, on-cloud) Office documents for productivity. Please also refer to Backup Your Important Files Using Hotmail SkyDrive. Click on the "Get SkyDrive apps"
OS Lab manual
7. Look at the different flavours of SkyDrive available for different devices. That helps you to have access to your cloud storage on the SkyDrive from different pieces of device you might use at any place. In the next stage click on " the desktop app."
8.
OS Lab manual
Look at the bottom of your Browser. Allow the install to "Run."
Installation proceeds.
9. Click on "Get Started" button. Fill the form according to your acquired Microsoft .
OS Lab manual
10. Note that the "cloud hard disk" has been installed on your computer. There is no need to change its location on a safer place in your computer. No failure on your computer will touch that drive; except that you delete its content.
OS Lab manual
11. Click on "Next" button Update your other device pieces in sharing SkyDrive.
12. Click on "Done" button.
OS Lab manual
Your SkyDrive is on your device.
13. Click on the small caret on the quick launch. It shows the hidden icons; among them SkyDrive icon. Moving green line means SkyDrive being updated.
14. Utilize your SkyDrive for share and team work. Among your documents you have a place for "Public" files. Put some files there. Open the "Public" to see them. In the Demo picture, there are two files.
OS Lab manual
One is actually SkyDive executable file that you can and run to install SkyDrive. In the demo it is shown to the reader that it is even possible to exe files in the SkyDrive. It is important for the team works to have such a capacity for beta testing and other purposes. Other file is just a notepad. It is a draft of this article to back it up. Select this one by ticking the box in front of its name. If you like to embed it in your Blog or other Internet pages click on "Embed" on the right side pane to get the embedding HTML code. If you like to share it, then click on "Share" in the right side .
15. Look at the widget that opens. It has different options. You can send an email as a link to this file. o You can post it to Facebook or Tweeter or LinkedIn. o Sharing link could allow people only "View" your file without being able to modify it. o Sharing link could allow both "View" and "Edit" of the file. Besides, being a "Public" file allows people to search it and if found through the Internet search engines to be viewed by the public. You can put your file in nonpublic folders if you want it to be of access of you-only or you and your teamonly.
OS Lab manual
o For any reason, you can shorten the link address to be more digestable, by clicking on the "Shorten" button. You can put that address in your browser right now and find out a draft of this article.
Hotfix A hotfix or Quick Fix Engineering update (QFE update) is a single, cumulative package that includes information (often in the form of one or more files) that is used to address a problem in a software product (i.e. a software bug).[1] Typically, hotfixes are made to address a specific customer situation and may not be distributed outside the customer organization. The term hotfix was originally applied to software patches that were applied to live (i.e. still running) systems. Similar use of the can be seen in hot swappabledisk drives. The more recent usage of the term is likely due to software vendors making a distinction between a hotfix and a patch. How to Install Microsoft Hotfixes & Updates Installing Windows updates are an important part of keeping your computer safe. Windows updates allow you to pick and choose updates you want to install on your computer. These updates
OS Lab manual
can include fixes to software vulnerabilities, new Windows and program features, and hardware updates. Windows XP uses the Windows Update website, while Windows Vista and Windows 7 utilize a built-in updating feature. Whether you have XP, Vista or Windows 7, you must keep your system updated using Windows Update if you want to keep your computer safe from malware and other attacks. steps: Windows Vista/Windows 7 Click the “Start” menu button at the bottom of the screen. Click “Control .” Select “Check for updates” under “Security.” View your high-priority and optional updates. Click the “View available updates” link to view the high-priority and optional updates available for . Click the boxes next to each update you want to install. This allows Windows to know which ones you want to proceed with installing. Click “Install” at the bottom of the window to begin the and installation process. Follow any onscreen instructions that may appear.
13. Implementation of FCFS (First Come First Serve) scheduling algorithm Scheduling Algorithms: Scheduling: - U scheduling is defined as the process of moving the processes from job pool to the main memory. Scheduling Criteria: -
1. U-utilization: - Keep the U and other resources as busy as possible. 2. Throughput: - No. of processes that complete their execution per unit time. 3. Turnaround time: - It is defined as the amount of time to execute a particular process from its entry time.
4. Waiting time: - It is defined as the amount of time a process has been waiting in the ready queue.
5. Response time: - It is defined as the amount of time it takes from when a request was submitted until the first response is produced but not output is known as the ‘response time’. Different scheduling algorithms: -
OS Lab manual
Scheduling algorithms are mainly divided into two main types: -
1. Non-preemptive scheduling algorithms: - Once the U is given to a process it cannot be preempted until it completes its U-burst.
2. Preemptive scheduling algorithms: - If a new U process arrives with U burst length less than the remaining time of current executing processes preempt.
First come first serve (FCFS) scheduling algorithm: - With this scheme the process that requests the U first is allocated the U first. The implementation of the FCFS policy is easily managed with the FIFO queue. When a process enters the ready queue, its PCB is linked onto the tail of the queue. When the U is free, it is allocated to the process at the head of the queue. The running process is then removed from the queue. The code for FCFS is simple to write and understand.
Example: Process
Burst Time
P1
24
P2
3
P3
3
Now ganntt chart for this is as: P1 0 Waiting time of process P1 = 0. Waiting time of process P2 = 24. Waiting time of process P3 = 27.
P2 24
P3 27
30
OS Lab manual
Now Average Waiting time of all the processes = (0+24+27)/3 = 17 ms. ________________________________________________________________ Write a program in C++ to implement FCFS scheduling algorithm. #include
#include
void main() { clrscr(); int bu[20],n,i; float twt=0.0,awt,wt[10]; cout<<"Enter the number of processes:"<<endl; cin>>n; cout<<"Enter the burst time of each process:"<<endl; for(i=1;i<=n;i++) { cin>>bu[i]; } for(i=1;i<=n;i++) { cout<<"The burst time of process P"<<<" ="<
<<endl; } cout<<endl; wt[1]=0; cout<<"The waiting time of process P1 ="<<wt[1]<<endl; for(i=2;i<=n;i++) { wt[i]=bu[i-1]+wt[i-1]; cout<<"The waiting time of process P"<<<" ="<<wt[i]<<endl; twt=twt+wt[i]; } cout<<endl; cout<<"The total waiting time of the processes is ="<
<<endl; awt=twt/n; cout<<"The average time of process is ="<
<<endl; getch(); } _________________________________________________________________ Output of the above program: -
OS Lab manual
________________________________________________________________
14. Implementation of SJF (Shortest Job First) scheduling algorithm. Shortest Job first (SJF) scheduling: - It associates with each process the length of the process’s next U burst. When U is available, it is assigned to the process that has the smallest next U burst. If the next U burst of the two processes are the same, FCFS scheduling is used to break the tie. A more appropriate term for this scheduling method would be the shortest-nextU-burst algorithm, because scheduling depends on the length of the next U burst of a process rather than its total length. Example: Process
Burst time
OS Lab manual
P1
6
P2
8
P3
7
P4
3
Now gantt chart is as: P4 P1 0
3
P3 9
P2 16
24
Waiting time of process P1 = 3 Waiting time of process P2 = 16 Waiting time of process P3 = 9 Waiting time of process P4 = 0
Now average waiting time = (3+16+9+0)/4 = 10.25 ms. __________________________________________________________________ Write a program in C++ to implement shortest-job-first scheduling. #include
#include
void main() { clrscr(); int bu[10],n,i,j; char c[10]; float twt=0.0,awt,wt[10]; cout<<"\tEnter the number of processes:"<<endl<<"\t"; cin>>n; cout<<endl; cout<<"\tEnter the name of the processes:"<<endl<<"\t"; for(i=1;i<=n;i++) { cin>>c[i]; cout<<"\t"; } for(i=1;i<=n;i++) { cout<<"Enter the burst time for process "<
<<" =\t"; cin>>bu[i]; cout<<endl; cout<<"\t"; } int temp,b[10],temp1; cout<<endl; for(i=1;i<=n;i++) { b[i]=bu[i];
OS Lab manual
cout<<"\tThe burst time for process "<
<<" =\t"<
<<endl; } cout<<endl; for(i=1;i<=n;i++) { j=i; whi le(b [j1]> b[j] && j>1) { temp=b[j]; b[j]=b[j-1]; b[j-1]=temp; temp1=c[j]; c[j]=c[j-1]; c[j-1]=temp1; j--; } } cout<<"\tNow the processes in the sotred order is as:"<<endl; for(i=1;i<=n;i++) { cout<<"\t"<
<<" =\t"<
OS Lab manual
__________________________________________________________________
15. Implementation of priority scheduling algorithm. Priority Scheduling: - SJF is a special case of the general priority scheduling algorithm. A priority is associated with each process and the U is allocated to the process with the highest priority. Equal priority processes are scheduled in FCFS order. The larger the U burst the lower the priority and vice versa. Example: Process
Burst time
Priority
P1
10
3
P2
1
1
P3
2
4
OS Lab manual
P4
1
5
P5
5
2
The ganntt chart is as: P2 P5 0
1
P1
6
P3 16
P4 18
19
Waiting time for process P2 = 0. Waiting time for process P5 = 1. Waiting time for process P1 = 6. Waiting time for process P3 = 16. Waiting time for process P4 = 18. Now average waiting time (0+1+6+16+18)/5 = 8.2 ms. __________________________________________________________________ Write a program in C++ to implement priority scheduling algorithm. #include
#include
void main() { clrscr(); textmode(C4350); int bu[10],n,i,j,p[10]; char c[10]; float wt[10],twt=0.0,awt,temp,temp1,temp2; textbackground(4); cout<<"\t"; rintf("\n********** Program for Priority scheduling Algorithm ********** "); textbackground(4); cout<<endl; cout<<"\tEnter the number of processes"<<endl; cout<<"\tÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ = "; cin>>n; cout<<"\tEnter the name of the processes:"<<endl; for(i=1;i<=n;i++) { cout<<"\t"; cin>>c[i]; } for(i=1;i<=n;i++) { cout<<"\tEnter the burst time of "<
<<" = "; cin>>bu[i]; } cout<<endl; for(i=1;i<=n;i++)
OS Lab manual
{ cout<<"\t"; cout<<"Enter the priority of "<
<<" = "; cin>>p[i]; } cout<<endl; cout<<"\tProcess Data is as:"<<endl; cout<<endl; cout<<"\t"<<"Name"<<"\t"<<"Burst Time"<<"\t"<<"Priority"<<endl; for(i=1;i<=n;i++) { cout<<"\t"<
<<"\t"<
<<" \t"<
p[j] && j>1) { temp=p[j]; p[j]=p[j-1]; p[j-1]=temp; temp1=c[j]; c[j]=c[j-1]; c[j-1]=temp1; temp2=bu[j]; bu[j]=bu[j-1]; bu[j-1]=temp2; j--; }} cout<<endl; cout<<"\tNow the processes in the sotred order of their priorities is as:"<<endl; cout<<endl; cout<<"\t"<<"Name"<<"\t"<<"Burst Time"<<"\t"<<"Priority"<<endl; for(i=1;i<=n;i++) { cout<<" \t"<
<<" \t"<
<<" \t"<
OS Lab manual
__________________________________________________________________ Round Robin scheduling algorithm: - It is for time sharing systems. It is similar to FCFS but preemption is added to enable the system to switch between the processes. A small unit of time, called a time quantum or time slice is defined. The ready queue is treated as a circular queue. The U scheduler goes around the ready queue allocating the U to each process for a time interval of upto 1 time quantum. Example: - Given time quantum is = 4 ms. Process P1
24
P2
3
P3
3
Now ganntt chart is as: P1 P2 0
Burst Time
4
7
P3
P1 10
Waiting time of process P1 = (10-4) = 6 ms.
P1 14
P1 18
P1 22
P1 26
30
OS Lab manual
Waiting time of process P2 = 4 ms. Waiting time of process P3 = 7 ms.
Now average waiting time is (6+4+7)/3 = 5.66 ms.
16. Implementation of Round Robin scheduling algorithm. Write a program in C++ to implement Round Robin scheduling. #include
#include
void main() { clrscr(); textmode(C4350); textbackground(4); cout<<"\t"; rintf("\n***** Program for Round Robin scheduling Algorithm ***** "); textbackground(4); int i,j,tq,k,B[10],Rrobin[10][10],count[10]; int n,Bu[20]; float Twt,Awt,A[10],Wt[10],w; int max=0; int m; Twt=0.0; cout<<endl; cout<<endl; textbackground(4); cout<<"\t"; rintf("Enter the no of processes:"); cin>>n; for(i=1;i<=n;i++) { cout<<"\tEnter The BurstTime for Process P"<<<"= "; cout<<"\t"; cin>>Bu[i]; } for(i=1;i<=n;i++) { B[i]=Bu[i]; textbackground(4); cout<<"\tBurst time for process P"<<<"= "; cout<
>tq; cout<<endl; m=max/tq+1; cout<<endl;
OS Lab manual
for(i=1;i<=n;i++) { for(j=1;j<=m;j++) { Rrobin[i][j]=0; } } i=1; while(i<=n) { j=1; while(B[i]>0) { if(B[i]>=tq) { B[i]=B[i]-tq; Rrobin[i][j]=tq; j++; } else { Rrobin[i][j]=B[i]; B[i]=0; j++; } } count[i]=j-1; i++; } textbackground(4); cout<<"\t"; rintf("Display"); cout<<endl; for(i=1;i<=n;i++) { for(j=1;j<=m;j++) { cout<<"Rr["<<<","<<j<<"]="<
OS Lab manual
{ Wt[z]=Wt[z]+Rrobin[i][k]; } i++; } } x++; } cout<<endl; for(i=1;i<=n;i++) { textbackground(4); cout<<"\t"; rintf("Weighting Time for process P"); cout<<<"="<<Wt[i]<<endl; cout<<endl; } for(i=1;i<=n;i++) { Twt=Twt+Wt[i]; } Awt=Twt/n; textbackground(4); cout<<"\t"; rintf("Total Weighting Time="); cout<
OS Lab manual