Date post: | 23-Jun-2015 |
Category: |
Documents |
Upload: | carmenpuigdueta |
View: | 141 times |
Download: | 1 times |
OPERATING
SYSTEMS AND
COMPUTING
NETWORKS
CARMEN RODRÍGUEZ-OSORIO PUIGDUETA
1. WINDOWS TOOLS
•BACKUP
Utility: Backup and Restore creates safety copies of your most important personal
files, so you're always prepared for the worst. Windows can choose what to back up.
Another option is that you pick the individual folders, libraries, and drives that you
want.
How does it work? :
Her you have
to decide what
to backup
Then it will appear a window to see the
backup progress. When this process is
finished another window will show up saying
that the process is complete. In that same
window there will be a button called
“Report”; if you press it a notepad box will be
opened containing the detailed information of
the previous process.
To know if the backup has been successful you can delete the original copy and click again
on “Backup”. After this you just need to select the file that has been copied.
Here you have to put where you want
to make the copy. It can be a disk or
even a CD or pen drive.
Now instead of choosing
the first option, we choose
the second one: “Restore
files and settings”.
DISK DEFRAGMENTER
Utility: “Disk Defragmenter” is a tool that rearranges the data on your hard disk and
reunites fragmented files so your computer can run more efficiently.
How does it work?:
Select your hard disk
in the list of available
drives. Then, click on
“Defragment”.
FILES AND SETTINGS TRANSFER WIZARD (F.A.S.T.)
Utility: it packs up and saves files and settings to transfer them to a new computer.
How does it work?:
You have here
two options:
transfer files and
settings to the
new computer or
transfer them
from the old one.
Now we’re going
to choose the
second option.
Here you have to select a
transfer method. You can
do it by direct cable, a
removable media…In the
last option there’s also a
“Browse” button to select a
location (folder or disk
drive).
Now you have to
select what to
transfer. You can
transfer only settings,
only files or both.
You have also the
option to select which
files and settings you
want to transfer.
In this box you
have all the
items that will
be transfer
depending on
the option you
choose.
Now we’re
going to choose
the first option:
transfer files
and settings to
the new
computer.
We have to select the
last option because we
have already transferred
files and setting from the
old computer.
Here you have to say where
the wizard should look the
items you have already
transferred (by cable,
removable media or other).
Of course you have to
select the same transfer
method that you chose in
the old computer.
In case you have
transferred it to a
network drive or a
removable drive for
example, you can click
on “Browse…” and
select where the items
are.
SECURITY CENTER
Utility: it can help enhance the computer's security by checking the status of several
security essentials on the computer, including firewall settings, Windows automatic
updating, anti-malware software settings, Internet security settings, and User
Account Control settings. If Windows detects a problem with any of these security
essentials (for example, if the antivirus program is out of date), Security Center
displays a notification and places a Security Center icon in the notification area.
How does it work?:
First we are going to enable the . To do this you just need to click on the
Firewall box. Then, it will appear another window below. To enable it you have to click on
“Recommendations”.
We can see that
the security
essentials are not
marked on, but
When clicking on
this box you’re
saying that you have
a firewall solution
that you’ll monitor
yourself, so
Windows won’t
monitor the Firewall.
Now we are going to enable the . You have to click on the
Autoatic updates box. After that, another window will appear below. To enable it you have
to click on “Turn on automatic updates”.
Eventually, we’re going to enable the . To do this you have to
click on the Virus protection box. Later, another windoew will show up below. To enable it
you have to click on “Recommendations…”.
After all this processes the window that
appeared at the beginning must be like this,
with all the boxes marked with ON.
You can click on
“How?” to know
how to get another
antivirus program.
The other option is
clicking on the little
box below in case
you have an
antivirus program
and will monitor it
yourself.
DISK CLEANUP
Utility: it frees up space on the hard disk by searching the disk for files that you can
safely delete. You can choose to delete some of the files or all of them. To do this
you can remove temporary Internet files, empty the recycle bin, remove installed
programs that you no longer use…
How does it work?:
You have to select
the drive you want
to clean up, for
example the local
disk C.
Here you can
choose the files
you want to
delete just by
clicking on the
little boxes
placed on the
left.
2. COMPUTER NETWORK
LIST OF COMPONENTS FOR THE NETWORK HARDAWARE
-Network card, network adapter, or NIC (network interface card)
It’s designed to allow computers to physically access a networking medium. It
allows also any device to connect to the network without creating an address
conflict.
-Cable and connectors
There are three types of cables:
-Twisted pair using a RJ45 connector
-Coaxial cable
-Optical cables
-Hub or switch
They connect computers in a given network.
-Router
It forwards data packets between telecommunications networks, creating an overlay
internetwork. It is connected to two or more data lines from different networks.
It has a unique IP address in the network. This address is also known as gateway
address.
•SCHEMEOF THE EQUIPMENT AND DEVICES CONNECTIONS
*Ethernet cables: are copper wires carrying electric signals.
NETWORKS SOFTWARE SETTINGS AND PROTOCOLS
-Name and workgroup
First we have to click on “Start” and on “My computer”. Once we are in “My
computer” window we click with the right button and select “Properties”.
Then we have to click on “Computer name” and select “Change”. Another window
will show up and here we have to change the name of the workgroup. We can also
change the computer name. When clicking on OK it will appear window saying that
you must restore the computer for the changes to take effect.
We change the
name of the
workgroup so
that all the
computers of
the network
have the same
name showing
that are part of
a whole (the
workgroup).
-IP address and other information
Go to “Start” and click on “Control Panel”. Double click on “Networks
connections”.
Clik on “Network connection”
Right click correct Local Are Connection by identifying correct network card and
click “Properties”.
Select “Internet Protocol (TPC/IP). Click on “Properties”.
Now we can key in the IP address, Subnet mask, Default gateway and DNS servers.
To do this first we have to select “Use the following IP address”. Then we can key
all the data. The IP address and the subnet mas must be the ones of our computer.
In the box of the default gateway we have to key the IP address but changing the
last number. In the Preferred DNS server we have to key also the IP address but
choosing a different last number.
-The IP address of the computer must be unique. None
of the computers in the network can share the same IP
address, because it would cause and IP address conflict.
-Default gateway is a router that can route the traffic to
the other network or Internet.
-DNS server is an application server that can translate
URL to IP address.
If youhave
DHCP server
setup on the
router or you
have DHCP
(Dynamic
Host
Configuration
Protocol)
server in
home
network, your
computer can
be assiged IP
address
automatically
by selecting
Obtain an IP
address
automatically
and Obtain
DNS server
address
automatically.
3. MSDOS COMMANDS
A command is a unique word used to perform a specific operation.
PING
It’s a utility used to verify if a network data packet is capable of being distributed to
an address without errors. The ping utility is commonly used to check for network
errors.
It helps in determining TCP/IP Networks IP address as well as determines issues
with the network and assists in resolving them.
First we have to click on “Run…”
We have to key “cmd” in the box and click on OK:
Then it will show up a window in which we have to key “ping” and the IP address
of your computer. Below that it says “0% loss”, that means that the operation has
been successful and there are not errors.
If we change the IP address, the operation won’t be successful and it will say 100%
loss. This happens because the IP address must be the one of the computer in which
the operation has been done.
IPCONFIG
It verifies a network connection as well as verifies the network settings.
First we have to click on “Run…”
We have to key “cmd” in the box and click on OK:
Then it will show up a window in which we have to key “ipconfig”.
Here we can see
the IP address, the
subnet mask and
the default
Gateway.
4. Security problems
PROBLEM 2:
Win32.Boberog.AQ is one of the Windows illegal malicious programs which may
occupy system resources and slow down computers. Some of such malicious
programs may frequently pop up advertising messages to interrupt computer users,
while more severely they may destroy the data in computers.
This worm is designed to be copied from a computer to another, but automatically.
First it controls the characteristics of the computer that allows transfers files. Once
that worm is in the computer it can travels alone.
-Causes: this worm can appear on the computer when opening a program that is
infected. It’s normally transmitted by files attached in an email.
-How to prevent it?: the only thing you can do is not opening any attached file to
an email from an email address unknown.
-Possible solution: as the antivirus detects the problem but cannot solve it you have
to do something to remove it.
There are two possible solutions. The first one is a manual one pretty difficult that
requires a big knowledge of software. The other one is an automatic one.
You have to install Worm: win32/Boberog.AZ removal tool. This software will
remove this virus automatically. The software scans the PC thoroughly for detecting
all threats that exist within and helps to clean them. But, there are cases in which the
software download process would fail and, therefore it requires to follow the
following steps:
1)Click on the box placed in Internet Explorer “Tools”. Then select “Internet
Options”.
2) Click on the “Connections” option. Then select “LAN Settings”.
3) Then click on the box “Use a proxy server for your LAN” and click OK to
proceed.
4) Once this process is completed you can download the Automatic tool to scan PC
easily.
http://www.spydig.com/spyware-info/Win32-Boberog-AQ.html
http://www.slideshare.net/mikejacob/remove-wormwin32boberogaz
PROBLEM 4:
-Causes: Windows XP will automatically load and startup all the programs that are
in the startup folder whether you intend to use them or not.
-How to prevent it?: delete a program when you don’t use it anymore so that it
doesn’t accumulate in the computer and make it runs slowly.
-Possible solution: to be able to speed up the boot up process of your XP Windows
PC you have to remove the programs that usually bog it down. Process:
1) Click on Start, then Run, and type "msconfig". Wait for a new window to pop up.
2) Look under the "BOOT.INI" tab. You will see a box labeled "Timeout:", and a
numerical value. By default, it's 30, which means 30 seconds of wait time before
boot. This can be changed, make it 4 seconds.
3) Delete The Temporary Files Periodically From Your Computer To Make The
Applications Run Faster. Type %temp% in the run dialog box by clicking on Start -
> Run, and click on "OK". You will see an open folder with many files. Click on the
Edit menu and click on Select all and then click on the File menu and select Delete.
4) Perform a Scandisk To See That Your Computer Hard Drive is in Healthy
Condition and it helps Your Computer Run Faster.
5) Always Perform a Disk Defragmentation at least once a month. Start the disk
defragmentation from the System Tools menu available in the Accessories menu
from the Start menu.
http://www.wikihow.com/Make-Windows-XP-Startup-Faster
PROBLEM 5:
-Causes: a virus has been transmitted to your computer.
-How to prevent it?: install an antivirus from the beginning and update it before it
expires.
-Possible solution: try logging into Safe Mode with Networking and downloading
from there an anti-malware. Safe Mode with Networking sometimes keeps malware
from running and protecting itself.
To get into Safe Mode with Networking you have to:
1) Log out and reboot your machine.
2) When the machine starts the reboot sequence, press the F8 key repeatedly.
3) Select Safe Mode with Networking from the resulting menu.
4) Login. If the malware has changed your password, try logging in as
Administrator. By default, Administrator has no password.
5) The machine will continue booting, but the Windows desktop will look different.
6) When you're finished doing what you need to do, log out and reboot back into
normal mode.
www.yahooanswers.com