SlideShare a Scribd company logo
IT Essentials PC Hardware
  and Software 4.1

  Instructional Resource
  Chapter 12: Advanced
  Operating Systems




Presentation_ID               © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   1
Chapter 12: Objectives
            Select the appropriate operating system based on customer needs.
            Install, configure, and optimize an operating system.
            Describe how to upgrade operating systems.
            Describe preventive maintenance procedures for operating systems.
            Troubleshoot operating systems.




Presentation_ID                                       © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   2
Chapter 12: Critical Concepts
            What is this chapter about and why is it important?
            This chapter dives into the more intricate operations and functions of the operating
             system. On the new certification, Windows 2000 Professional, Windows XP, and
             Windows Vista are covered. Another challenge is that Windows 7 is being deployed
             in the corporate environment. Computer boot problems, determining which operating
             system is the best to install based on the customer’s needs, reloading the operating
             system, customizing the operating system, and tweaking the operating system for
             optimum performance are all part of teaching advanced operating systems.




Presentation_ID                                      © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   3
Chapter 12: Activities
            What activities are associated with this chapter?
              12.2.2 Lab: Advanced Installation of Windows XP
              12.2.2 Optional Lab: Advanced Installation of Windows Vista
              12.2.3 Lab: Create a Partition in Windows XP
              12.2.3 Optional Lab: Create a Partition in Windows Vista
              12.2.4 Lab: Customize Settings in Windows XP
              12.2.4 Optional Lab: Customize Settings in Windows Vista
              12.2.5 Optional Lab: Install an Alternate Browser
              12.4.1Lab: Schedule Task Using GUI and “at” Command in Windows XP
              12.4.1 Optional Lab: Schedule Task Using GUI and “at” Command in Windows
               Vista




Presentation_ID                                  © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   4
Chapter 12: Activities (continued)
            What activities are associated with this chapter?
              12.4.2 Lab: Restore Points in Windows XP
              12.4.2 Optional Lab: Restore Points in Windows Vista
              12.5.3 Lab: Fix Operating System Problem
              12.5.3 Lab: Remote Technician: Fix an Operating System Problem
              12.5.3 Lab: Troubleshooting Operating System Problems in Windows XP
              12.5.3 Optional Lab: Troubleshooting Operating System Problems in Windows
               Vista
              Chapter 12 Quiz




Presentation_ID                                   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   5
Chapter 12: New Terms
            What terms are introduced in this chapter?


                  American Standard Code for Information Interchange (ASCII )                                 12.2.6

                  answer file                                                                                 12.2.2

                  C: drive                                                                                    12.2.3

                  CHKDSK                                                                                      12.2.4

                  cookie                                                                                      12.2.5

                  default installation                                                                        12.2.2

                  disk management                                                                             12.2.3

                  Disk Operating System (DOS)                                                                 12.5.2

                  drive letter                                                                                12.2.3

                  format                                                                                      12.2.9




Presentation_ID                                                            © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   6
Chapter 12: New Terms
            What terms are introduced in this chapter?


                  icon                                                                              12.2.4

                  installation CD                                                                   12.2

                  Master Boot Record (MBR)                                                          12.5.2

                  MSCONFIG                                                                          12.2.9

                  Multipurpose Internet Mail Extensions (MIME)                                      12.2.6

                  Network Operating System (NOS )                                                   12.1.2

                  network server                                                                    12.1.2

                  NT Loader (NTLDR)                                                                 12.5.2

                  primary partition                                                                 12.2.3

                  registry                                                                          12.4.2




Presentation_ID                                                  © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   7
Chapter 12: New Terms
            What terms are introduced in this chapter?


                  Remote Installation Services (RIS)                                        12.2.2

                  resolution                                                                12.2.7

                  restore point                                                             12.4.2

                  Simple Mail Transfer Protocol (SMTP)                                      12.2.6

                  System Restore                                                            12.2.4

                  Task Manager                                                              12.2.4

                  unattended installation                                                   12.2.2

                  virtual memory                                                            12.2.4




Presentation_ID                                          © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   8
Chapter 12: Changes
            What has changed from the previous version (4.0) of ITEPC?
                  Page 12.1.3 Windows OS directory structures
                  • User file locations
                  • System file locations
                  • Fonts
                  • Temporary Files
                  • Program Files
                  • Offline fFles and Folders




Presentation_ID                                      © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   9
Chapter 12: Changes (continued)
            What has changed from the previous version (4.0) of ITEPC?
              Page 12.2.3 Create, view, and manage disks, directories, and files
              • Disk Structure
                    •Active, primary, extended, and logical partitions
                    •Mount points
                    •Mounting a drive
              • FAT32 and NTFS
              • Drive Status
                    •Foreign
                    •Healthy
                    •Initializing
                    •Missing
                    •Not Initialized
                    •Online
                    •Online (Errors)
                    •Offline
                    •Unreadable

Presentation_ID                                     © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   10
Chapter 12: Changes (continued)
            What has changed from the previous version (4.0) of ITEPC?
              Page 12.2.4 Identify procedures and utilities that are used to optimize the
                performance of operating systems
              • Hard drive management tools
                    •Disk Error-Checking Tool
                    •Disk Defragmenter
              • System Information
              • Remote Desktop
                    •Remote Assistance
              • Administrative tools
                    •Event Viewer
                    •Computer Management
                    •Services
                    •Performance Monitor




Presentation_ID                                      © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   11
Chapter 12: Changes (continued)
            What has changed from the previous version (4.0) of ITEPC?
                  Page 12.2.4 Identify procedures and utilities that are used to optimize the
                    performance of operating systems (continued)
                  • Device Manager
                        •Enable
                        •Disable
                        •Warnings
                        •Indicators
                  • Task Manager
                       •Process list
                       •Resource usage
                       •Process priority
                       •Termination
                  • System Monitor
                  • Regional and Language Options



Presentation_ID                                         © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   12
Chapter 12: Changes (continued)
            What has changed from the previous version (4.0) of ITEPC?
              Page 12.2.9 Windows CLI commands
              • MSCONFIG
              • DIR
              • CHKDSK
              • EDIT
              • COPY
              • XCOPY
              • FORMAT
              • HELP
              • SFC
              • MD / CD / RD

                  Page 12.4.1 Schedule automatic tasks and updates
                  • CLI Scheduled Tasks
                  • Windows Automatic Updates


Presentation_ID                                      © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   13
Chapter 12: Changes (continued)
            What has changed from the previous version (4.0) of ITEPC?
              Page 12.4.2 Set restore points
              • System Restore utility


                  Page 12.5.1 Review the troubleshooting process
                  • Identify the Problem
                  • Establish a Theory of Probable Causes
                  • Determine an Exact Cause
                  • Implement a Solution
                  • Verify Solution and Full System Functionality
                  • Document Findings




Presentation_ID                                         © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   14
Chapter 12: Changes (continued)
            What has changed from the previous version (4.0) of ITEPC?
                  Page 12.5.2 Identify common problems and solutions
                  • Boot Error Messages and Conditions
                           •The computer displays an Invalid Boot Disk error
                           •The computer displays an Inaccessible Boot Device error
                           •The computer displays a Missing NTLDR error
                  • Operational problems
                      •A service fails to start
                      •A device fails to start
                      •The computer continually restarts
                      •The computer displays a BSOD error
                      •The computer locks up
                      •An application fails to install, start, or load




Presentation_ID                                            © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   15
Chapter 12: Changes (continued)
            What has changed from the previous version (4.0) of ITEPC?
                  Page 12.5.2 Identify common problems and solutions.
                  • Error Messages and Conditions
                      •System Performance and Optimization
                           •Aero does not run
                           •The search feature takes a long time
                           •The UAC no longer works
                           •The sidebar is empty
                           •The computer is running slowly




Presentation_ID                                       © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   16
Chapter 12: Classroom Management
           Provide the students with as much hands-on experience as possible with the
            computers so that they become familiar with the operating system tools, boot
            menus, control panels, and command-line tools.
           If a lab demonstrates a GUI tool, have the students research and bring up the same
            tool using a command from a prompt.




Presentation_ID                                     © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   17
Chapter 12: Teaching Analogies
            All parts of the computer must work together for efficient production. A desk is like
             RAM. The person at the desk is like the CPU. The filing cabinet is like the hard
             drive. When working at a desk, a person uses the papers and information on the
             desk to do the task at hand. When more information is needed, the person looks
             inside the filing cabinet to retrieve information and bring it to the desk where it is
             used. Upgrading your RAM is like making the desk space bigger, and upgrading the
             hard drive is similar to getting a bigger filing cabinet.
            A computer with a dual operating system is like having two cars to drive. However,
             you can only use one at a time.




Presentation_ID                                       © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   18
Chapter 12: Suggested Class Discussions
                 Why are command-line utilities important for technicians to use with deployments
                  and troubleshooting?
                 What are the situations in which a dual-boot operating system would most likely
                  be used?
                 What are some methods for deploying a corporate operating system and
                  applications image?
                 What are some methods for deploying corporate updates?




Presentation_ID                                        © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   19
Chapter 12: Best Practices
            Have the students create at least one partition as FAT or FAT32 and save a file to
             the partition. Students should use the convert.exe command from a prompt to
             convert the partition with the file intact.
            On a flat panel monitor, demonstrate different resolutions and how the concept of
             native resolution is important on laptops and flat panel monitors.




Presentation_ID                                      © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   20
Chapter 12: Outside Reading
                  Microsoft Windows
                   http://www.microsoft.com/windows/default.aspx


                  Apple OS X
                   http://www.apple.com/macosx/


                  Linux
                   http://www.linux.com/




Presentation_ID                                      © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   21
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   22
Presentation_ID   © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential   23

More Related Content

PDF
Product Number: 0
PDF
Better email response time using Microsoft Exchange 2013 with the Dell PowerE...
PDF
VDI performance comparison: Dell PowerEdge FX2 and FC430 servers with VMware ...
PDF
Dell PowerEdge M520 server solution: Energy efficiency and database performance
PDF
Dell Acceleration Appliance for Databases 2.0 and Microsoft SQL Server 2014: ...
PDF
SysInfoTools DBX Recovery
PDF
Product Number: 0
PDF
Consolidating database servers with Lenovo ThinkServer RD630
Product Number: 0
Better email response time using Microsoft Exchange 2013 with the Dell PowerE...
VDI performance comparison: Dell PowerEdge FX2 and FC430 servers with VMware ...
Dell PowerEdge M520 server solution: Energy efficiency and database performance
Dell Acceleration Appliance for Databases 2.0 and Microsoft SQL Server 2014: ...
SysInfoTools DBX Recovery
Product Number: 0
Consolidating database servers with Lenovo ThinkServer RD630

What's hot (17)

PDF
Dell 3-2-1 Reference Configurations: Scalable performance and simplicity in s...
PDF
Configuring a failover cluster on a Dell PowerEdge VRTX
PDF
New Features For Your Software Defined Storage
PDF
Berkeley latency-mar2012
DOCX
Creating Virtual Infrastructure
PDF
Java Standard Edition 5 Performance
PDF
Ms Sql Server Black Book
PDF
Shared Oracle Hosting (Linux)
PDF
Consolidate and upgrade: Dell PowerEdge VRTX and Microsoft SQL Server 2014
PPSX
Be2010 全功能 20100301
PDF
Citrix Virtual Desktop Handbook
PDF
Converged architecture advantages: Dell PowerEdge FX2s and FC830 servers vs. ...
PDF
Configuring a highly available Microsoft Exchange Server 2013 environment on ...
PDF
Database performance with Dell PowerEdge PCIe Express Flash SSDs
PDF
Increased database performance and reduced costs with Dell PowerEdge FX2 & VM...
PDF
Net scaler vpx
PDF
Migrating to Microsoft Windows Server 2012 and Microsoft SQL Server 2012 on D...
Dell 3-2-1 Reference Configurations: Scalable performance and simplicity in s...
Configuring a failover cluster on a Dell PowerEdge VRTX
New Features For Your Software Defined Storage
Berkeley latency-mar2012
Creating Virtual Infrastructure
Java Standard Edition 5 Performance
Ms Sql Server Black Book
Shared Oracle Hosting (Linux)
Consolidate and upgrade: Dell PowerEdge VRTX and Microsoft SQL Server 2014
Be2010 全功能 20100301
Citrix Virtual Desktop Handbook
Converged architecture advantages: Dell PowerEdge FX2s and FC830 servers vs. ...
Configuring a highly available Microsoft Exchange Server 2013 environment on ...
Database performance with Dell PowerEdge PCIe Express Flash SSDs
Increased database performance and reduced costs with Dell PowerEdge FX2 & VM...
Net scaler vpx
Migrating to Microsoft Windows Server 2012 and Microsoft SQL Server 2012 on D...
Ad

Similar to ITE - Chapter 12 (20)

PPTX
Creating your own datacenter
PPTX
Upgrading AD from Windows Server 2003 to Windows Server 2008 R2
PDF
fast_bitcoin_data_mining
PDF
Introduction to visual DSP++ Kernel
PPT
ITE - Chapter 13
ODP
Nagios Conference 2012 - Dan Wittenberg - Case Study: Scaling Nagios Core at ...
PDF
Case Project 12-2 Devising an AD DS Design with RODC, AD RMS, and A.pdf
DOCX
Windows sever 2008
PPTX
Configuring and Troubleshooting XenDesktop Sites
PDF
Building “old” Windows drivers (XP, Vista, 2003 and 2008) with Visual Studio ...
PDF
Active Directory Upgrade
PDF
A27 Vectorwise Performance Considerations_implementation_best_practices
PDF
PDF
IBM BladeCenter Foundation for Cloud: Integration Guide
DOC
RAC_Database_Technical_Document
PPT
2.1 system concept
PPTX
Constructing a Modern Information System for a Small Company: A Real Battle
PPTX
Server 2008 R2 Yeniliklər
PDF
The top five questions to ask about NoSQL. JONATHAN ELLIS at Big Data Spain 2012
Creating your own datacenter
Upgrading AD from Windows Server 2003 to Windows Server 2008 R2
fast_bitcoin_data_mining
Introduction to visual DSP++ Kernel
ITE - Chapter 13
Nagios Conference 2012 - Dan Wittenberg - Case Study: Scaling Nagios Core at ...
Case Project 12-2 Devising an AD DS Design with RODC, AD RMS, and A.pdf
Windows sever 2008
Configuring and Troubleshooting XenDesktop Sites
Building “old” Windows drivers (XP, Vista, 2003 and 2008) with Visual Studio ...
Active Directory Upgrade
A27 Vectorwise Performance Considerations_implementation_best_practices
IBM BladeCenter Foundation for Cloud: Integration Guide
RAC_Database_Technical_Document
2.1 system concept
Constructing a Modern Information System for a Small Company: A Real Battle
Server 2008 R2 Yeniliklər
The top five questions to ask about NoSQL. JONATHAN ELLIS at Big Data Spain 2012
Ad

More from Irsandi Hasan (20)

PPTX
CCNA v6.0 ITN - Chapter 11
PPTX
CCNA v6.0 ITN - Chapter 10
PPTX
CCNA v6.0 ITN - Chapter 09
PPTX
CCNA v6.0 ITN - Chapter 08
PPTX
CCNA v6.0 ITN - Chapter 07
PPTX
CCNA v6.0 ITN - Chapter 06
PPTX
CCNA v6.0 ITN - Chapter 05
PPTX
CCNA v6.0 ITN - Chapter 04
PPTX
CCNA v6.0 ITN - Chapter 03
PPTX
CCNA v6.0 ITN - Chapter 02
PPTX
CCNA v6.0 ITN - Chapter 01
PPTX
VMware vShield - Overview
PPTX
CCNA RS_NB - Chapter 11
PPTX
CCNA RS_NB - Chapter 10
PPTX
CCNA RS_NB - Chapter 9
PPTX
CCNA RS_NB - Chapter 8
PPTX
CCNA RS_NB - Chapter 7
PPTX
CCNA RS_NB - Chapter 6
PPTX
CCNA RS_NB - Chapter 5
PPTX
CCNA RS_NB - Chapter 4
CCNA v6.0 ITN - Chapter 11
CCNA v6.0 ITN - Chapter 10
CCNA v6.0 ITN - Chapter 09
CCNA v6.0 ITN - Chapter 08
CCNA v6.0 ITN - Chapter 07
CCNA v6.0 ITN - Chapter 06
CCNA v6.0 ITN - Chapter 05
CCNA v6.0 ITN - Chapter 04
CCNA v6.0 ITN - Chapter 03
CCNA v6.0 ITN - Chapter 02
CCNA v6.0 ITN - Chapter 01
VMware vShield - Overview
CCNA RS_NB - Chapter 11
CCNA RS_NB - Chapter 10
CCNA RS_NB - Chapter 9
CCNA RS_NB - Chapter 8
CCNA RS_NB - Chapter 7
CCNA RS_NB - Chapter 6
CCNA RS_NB - Chapter 5
CCNA RS_NB - Chapter 4

Recently uploaded (20)

PDF
project resource management chapter-09.pdf
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
August Patch Tuesday
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Approach and Philosophy of On baking technology
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Encapsulation theory and applications.pdf
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
A Presentation on Artificial Intelligence
PPTX
cloud_computing_Infrastucture_as_cloud_p
project resource management chapter-09.pdf
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
WOOl fibre morphology and structure.pdf for textiles
Unlocking AI with Model Context Protocol (MCP)
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
August Patch Tuesday
SOPHOS-XG Firewall Administrator PPT.pptx
Group 1 Presentation -Planning and Decision Making .pptx
Approach and Philosophy of On baking technology
Assigned Numbers - 2025 - Bluetooth® Document
Encapsulation theory and applications.pdf
1 - Historical Antecedents, Social Consideration.pdf
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Heart disease approach using modified random forest and particle swarm optimi...
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Zenith AI: Advanced Artificial Intelligence
MIND Revenue Release Quarter 2 2025 Press Release
Digital-Transformation-Roadmap-for-Companies.pptx
A Presentation on Artificial Intelligence
cloud_computing_Infrastucture_as_cloud_p

ITE - Chapter 12

  • 1. IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter 12: Advanced Operating Systems Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 1
  • 2. Chapter 12: Objectives  Select the appropriate operating system based on customer needs.  Install, configure, and optimize an operating system.  Describe how to upgrade operating systems.  Describe preventive maintenance procedures for operating systems.  Troubleshoot operating systems. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 2
  • 3. Chapter 12: Critical Concepts  What is this chapter about and why is it important?  This chapter dives into the more intricate operations and functions of the operating system. On the new certification, Windows 2000 Professional, Windows XP, and Windows Vista are covered. Another challenge is that Windows 7 is being deployed in the corporate environment. Computer boot problems, determining which operating system is the best to install based on the customer’s needs, reloading the operating system, customizing the operating system, and tweaking the operating system for optimum performance are all part of teaching advanced operating systems. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 3
  • 4. Chapter 12: Activities  What activities are associated with this chapter? 12.2.2 Lab: Advanced Installation of Windows XP 12.2.2 Optional Lab: Advanced Installation of Windows Vista 12.2.3 Lab: Create a Partition in Windows XP 12.2.3 Optional Lab: Create a Partition in Windows Vista 12.2.4 Lab: Customize Settings in Windows XP 12.2.4 Optional Lab: Customize Settings in Windows Vista 12.2.5 Optional Lab: Install an Alternate Browser 12.4.1Lab: Schedule Task Using GUI and “at” Command in Windows XP 12.4.1 Optional Lab: Schedule Task Using GUI and “at” Command in Windows Vista Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 4
  • 5. Chapter 12: Activities (continued)  What activities are associated with this chapter? 12.4.2 Lab: Restore Points in Windows XP 12.4.2 Optional Lab: Restore Points in Windows Vista 12.5.3 Lab: Fix Operating System Problem 12.5.3 Lab: Remote Technician: Fix an Operating System Problem 12.5.3 Lab: Troubleshooting Operating System Problems in Windows XP 12.5.3 Optional Lab: Troubleshooting Operating System Problems in Windows Vista Chapter 12 Quiz Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 5
  • 6. Chapter 12: New Terms  What terms are introduced in this chapter? American Standard Code for Information Interchange (ASCII ) 12.2.6 answer file 12.2.2 C: drive 12.2.3 CHKDSK 12.2.4 cookie 12.2.5 default installation 12.2.2 disk management 12.2.3 Disk Operating System (DOS) 12.5.2 drive letter 12.2.3 format 12.2.9 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 6
  • 7. Chapter 12: New Terms  What terms are introduced in this chapter? icon 12.2.4 installation CD 12.2 Master Boot Record (MBR) 12.5.2 MSCONFIG 12.2.9 Multipurpose Internet Mail Extensions (MIME) 12.2.6 Network Operating System (NOS ) 12.1.2 network server 12.1.2 NT Loader (NTLDR) 12.5.2 primary partition 12.2.3 registry 12.4.2 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 7
  • 8. Chapter 12: New Terms  What terms are introduced in this chapter? Remote Installation Services (RIS) 12.2.2 resolution 12.2.7 restore point 12.4.2 Simple Mail Transfer Protocol (SMTP) 12.2.6 System Restore 12.2.4 Task Manager 12.2.4 unattended installation 12.2.2 virtual memory 12.2.4 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 8
  • 9. Chapter 12: Changes  What has changed from the previous version (4.0) of ITEPC? Page 12.1.3 Windows OS directory structures • User file locations • System file locations • Fonts • Temporary Files • Program Files • Offline fFles and Folders Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 9
  • 10. Chapter 12: Changes (continued)  What has changed from the previous version (4.0) of ITEPC? Page 12.2.3 Create, view, and manage disks, directories, and files • Disk Structure •Active, primary, extended, and logical partitions •Mount points •Mounting a drive • FAT32 and NTFS • Drive Status •Foreign •Healthy •Initializing •Missing •Not Initialized •Online •Online (Errors) •Offline •Unreadable Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 10
  • 11. Chapter 12: Changes (continued)  What has changed from the previous version (4.0) of ITEPC? Page 12.2.4 Identify procedures and utilities that are used to optimize the performance of operating systems • Hard drive management tools •Disk Error-Checking Tool •Disk Defragmenter • System Information • Remote Desktop •Remote Assistance • Administrative tools •Event Viewer •Computer Management •Services •Performance Monitor Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 11
  • 12. Chapter 12: Changes (continued)  What has changed from the previous version (4.0) of ITEPC? Page 12.2.4 Identify procedures and utilities that are used to optimize the performance of operating systems (continued) • Device Manager •Enable •Disable •Warnings •Indicators • Task Manager •Process list •Resource usage •Process priority •Termination • System Monitor • Regional and Language Options Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 12
  • 13. Chapter 12: Changes (continued)  What has changed from the previous version (4.0) of ITEPC? Page 12.2.9 Windows CLI commands • MSCONFIG • DIR • CHKDSK • EDIT • COPY • XCOPY • FORMAT • HELP • SFC • MD / CD / RD Page 12.4.1 Schedule automatic tasks and updates • CLI Scheduled Tasks • Windows Automatic Updates Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 13
  • 14. Chapter 12: Changes (continued)  What has changed from the previous version (4.0) of ITEPC? Page 12.4.2 Set restore points • System Restore utility Page 12.5.1 Review the troubleshooting process • Identify the Problem • Establish a Theory of Probable Causes • Determine an Exact Cause • Implement a Solution • Verify Solution and Full System Functionality • Document Findings Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 14
  • 15. Chapter 12: Changes (continued)  What has changed from the previous version (4.0) of ITEPC? Page 12.5.2 Identify common problems and solutions • Boot Error Messages and Conditions •The computer displays an Invalid Boot Disk error •The computer displays an Inaccessible Boot Device error •The computer displays a Missing NTLDR error • Operational problems •A service fails to start •A device fails to start •The computer continually restarts •The computer displays a BSOD error •The computer locks up •An application fails to install, start, or load Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 15
  • 16. Chapter 12: Changes (continued)  What has changed from the previous version (4.0) of ITEPC? Page 12.5.2 Identify common problems and solutions. • Error Messages and Conditions •System Performance and Optimization •Aero does not run •The search feature takes a long time •The UAC no longer works •The sidebar is empty •The computer is running slowly Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 16
  • 17. Chapter 12: Classroom Management  Provide the students with as much hands-on experience as possible with the computers so that they become familiar with the operating system tools, boot menus, control panels, and command-line tools.  If a lab demonstrates a GUI tool, have the students research and bring up the same tool using a command from a prompt. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 17
  • 18. Chapter 12: Teaching Analogies  All parts of the computer must work together for efficient production. A desk is like RAM. The person at the desk is like the CPU. The filing cabinet is like the hard drive. When working at a desk, a person uses the papers and information on the desk to do the task at hand. When more information is needed, the person looks inside the filing cabinet to retrieve information and bring it to the desk where it is used. Upgrading your RAM is like making the desk space bigger, and upgrading the hard drive is similar to getting a bigger filing cabinet.  A computer with a dual operating system is like having two cars to drive. However, you can only use one at a time. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 18
  • 19. Chapter 12: Suggested Class Discussions  Why are command-line utilities important for technicians to use with deployments and troubleshooting?  What are the situations in which a dual-boot operating system would most likely be used?  What are some methods for deploying a corporate operating system and applications image?  What are some methods for deploying corporate updates? Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 19
  • 20. Chapter 12: Best Practices  Have the students create at least one partition as FAT or FAT32 and save a file to the partition. Students should use the convert.exe command from a prompt to convert the partition with the file intact.  On a flat panel monitor, demonstrate different resolutions and how the concept of native resolution is important on laptops and flat panel monitors. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 20
  • 21. Chapter 12: Outside Reading Microsoft Windows http://www.microsoft.com/windows/default.aspx Apple OS X http://www.apple.com/macosx/ Linux http://www.linux.com/ Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 21
  • 22. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 22
  • 23. Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 23