Sie sind auf Seite 1von 99

OPERATING SYSTEM

COURSE CODE CSE 305

BAHRA UNIVERSITY SHIMLA HILLS

SCHOOL OF COMPUTER SCIENCE AND ENGINEERING

Contents
1. Introduction to Window 7 operating system ............................................................................................... 2 2. Implementation of various aero features of window 7. ............................................................................... 3 3. Understanding window upgrade, window update and action center. ........................................................ 14 4. To create user account and setting up parental control on user account. .................................................. 23 5. Commands for window power shell and MSCONFIG. ............................................................................ 32 6. To understand system restore, recovery tool option, various safe mode options and MMC console management. ................................................................................................................................................. 37 7. Introduction to window 7 upgrade advisor, windows defender and windows registry file. ...................... 45 Windows Registry ......................................................................................................................................... 45 8. Making a word file and how to protect it with password. ......................................................................... 47 9. To create a blog. ........................................................................................................................................ 52 10. Implementation of disk defragmenter and disk cleanup maintenance tools. ........................................... 57 11. What is bitlocker and TPM. How a bitlocker encrypt a file. ................................................................... 60 12. Introduction to sky drive and windows live mesh. .................................................................................. 72 13. Implementation of FCFS (First Come First Serve) scheduling algorithm .............................................. 85 14. Implementation of SJF (Shortest Job First) scheduling algorithm. ......................................................... 88 15. Implementation of priority scheduling algorithm.................................................................................... 91 16. Implementation of Round Robin scheduling algorithm. ......................................................................... 95

1. Introduction to Window 7 operating system


Windows 7 is an operating system produced by Microsoft for use on personal computers, including home and business desktops, laptops, netbooks, tablet PCs, and media center PCs. It was released to manufacturing on July 22, 2009 and became generally available for retail worldwide on October 22, 2009, less than three years after the release of its predecessor, Windows Vista. Windows 7's server counterpart, Windows Server 2008 R2, was released at the same time. Windows 7 is succeeded by Windows 8. Unlike Windows Vista's many new features, Windows 7 was an incremental upgrade designed to work with Vista-compatible applications and hardware. Presentations given by Microsoft in 2008 focused on multi-touch support, an updated Windows shell with a new taskbar, referred to internally as the Superbar, a home networking system called HomeGroup, and performance improvements. Some standard applications that have been included with prior releases of Microsoft Windows, including Windows Calendar, Windows Mail,Windows Movie Maker, and Windows Photo Gallery, are not included in Windows 7; most are instead offered separately at no charge as part of the Windows Essentials suite. Minimum hardware requirements for Windows 7

If you are already a Vista user then the improvements to Windows 7 are going to be more subtle. Vista users are likely already familiar with features like the Aero visual functions, the Start Menu organization and Search. However, if you are currently using XP, then you may require a bit of an adjustment period. Improvements for both Vista and XP Users

New Taskbar and System Tray Quick Desktop View button Improved Start Up, Sleep and Resume performance Improved power management saves memory and battery life Libraries to improve file access and organization Action Center for system maintenance, back ups, troubleshooting and more User Account customization of notifications

Improved back up New wallpapers and themes Improved gadgets New premium games include Chess Titans, Mahjong Titans and Inkball Advanced Calculator functions including saving history Improved networking via HomeGroups Passkey protection with networks Device Stage for recognizing USB devices faster.

Changes and improvements from Windows XP only


New Start Icon Aero Snap, Shake and Peek Desktop icons like Computer and My Documents are removed and accessed through the Start Menu Larger icons and hidden icons in the Taskbar Quick Launch toolbar has been replaced by pinning a program to the Taskbar Jump Lists for easier access A Search Bar in the Start Up Menu The "Run" command is accessed through the Start Menu's Search Bar Faster and smoother gaming components Parental Controls for monitoring computer use Update feature that eliminates web surfing for patches

2. Implementation of various aero features of window 7.


Aero Features Windows 7 uses a group of features called Windows Aero. Aero is a visual desktop experience that combines translucent windows, appealing color and graphics effects with convenient functionality. Aero includes Snap, Peek, Shake and Flip. Aero is an interface that makes your visual interactions with the desktop fun and easy. Aero Peek makes your open windows transparent so you may see your desktop. It also allows you to peek at items in your taskbar for a thumbnail preview. Aero Snap is a quick way to resize your windows to make them easier to read, organize

and compare. Aero Flip allows you to preview all your open windows from a central window or 3D view that you can flip through. Aero Shake allows you to take your mouse and shake only the open window you want to focus on and the rest will disappear.

Snap Snap allows you to resize open windows to make reviewing and comparing easier.

Overlapping windows

Side-by-side Snap view

1. Place the mouse at the top of the window, drag to the left or right of the screen, wait for

the transparent window to appear and let go.


2. Your window should Snap into place. 3. To return to the full view, Snap the window to the top of the screen.

Peek You can view your open windows on the taskbar by using Peek. Simply scroll the mouse over the taskbar icons and a thumbnail preview of the open windows will appear.

Aero Peek However the mouse over the windows in Peek and the full window will appear on your screen. 1. Click on the Peek preview to open the window or click on the "X" to close the window from the Peek view.

Previewing a window with Aero Peek Shake When your desktop is cluttered with open windows, you can use Shake to select a single window and close the rest. 1. Click on the top of the window you want to focus on, Shake it and the rest of the windows will disappear. 2. Simply Shake the window again and the closed windows will reappear.

Cluttered screen

Shake to clear screen Flip Flip and Flip 3D are two more ways you can preview your open windows.

Aero Flip 1. Press and hold the Alt key and then press Tab to open the Flip view of your open

windows. 2. While still pressing the Alt key, you can Flip through the open windows by pressing the Tab key. 3. Stop on the window you want to open and it will appear on the full screen.

Aero Flip 3D 1. Press and hold the Windows key and then press Tab for a 3D version of Flip. 2. Use the Tab key or Arrow keys to Flip through your open windows. 3.Implementation of snipping tool, sticky notes and task bar features. Taskbar

Get immediateaccess with Jump Lists

The taskbar is now more convenient to use with larger views and easier access.

Jump Lists allow you to right click on an icon in the taskbar and immediately access items like music, videos or web pages that you use on a regular basis.

Pin allows you to place programs on the taskbar and rearrange the order of the icons as you wish. Action Center allows you to control the alerts and pop-ups you receive regarding maintenance and security.

Search

Find documentsfast with the new Search As soon as you start typing in the Search bar of the Start Menu you will instantly see a list of relevant options grouped by categories with highlighted keywords and text. This allows you to easily scan for the documents, music, pictures and email you are looking for.

Libraries

Access your files in Libraries

Libraries allow you to organize your files in one place so they are easy to search and access. Windows 7 has four default Libraries for documents, music, pictures and videos, however you can customize and create you own Libraries based on your needs.

Gadgets

Desktop

gadgets

You can select or download gadgets such as a slide show, calendar or weather update to add to your desktop. The live updates of some gadgets like weather, stocks and feed headlines are quite convenient.

Additional things you can do in Windows 7

Device Stage: When you plug a device into your computer such as a camera, mobile phone or flash drive, a window will open up with a menu of popular tasks, status information and options for your device. Windows Live Essentials: Windows Live Essentials is free software that enhances the Windows 7 experience. It replaces Windows Mail and allows you to email, instant message, edit photos, blog, etc. Home Group: Home Group allows you to connect two or more PCs on a home network in order to easily share and access files and printers. Windows Touch: You can use Windows Touch with a touch-screen PC to browse and flick through the screen using your fingers with multitouch technology. Remote Media Streaming: With Remote Media Streaming you can access your music, pictures

and videos stored on your home PC remotely using the Internet. Viewing open windows with Aero Peek

If you wish, you can change the order of the icons by clicking and dragging the icon to whatever space you desire on the taskbar.

Pin a program to the taskbar You may Pin programs to the taskbar and access them with a single click of the mouse.

To Pin a program, drag it to the taskbar and release.

Pinning a program to the taskbar

To Unpin programs, simply right click on the icon and select Unpin.

Unpinning a program Access a Jump List A Jump List is like a "mini-menu" for a program. It allows quick access to recent files, frequently viewed items, performance tasks and more. For example, you may select

frequently used websites with a simple click from the Internet Explorer Jump List.

Right click on an icon to open the program's Jump List.

A Jump List for Internet Explorer More Taskbar Features Click the buttons in the interactive below to learn more about the additional taskbar icons.

Show Desktop To Peek at the desktop without closing windows: 1. Hover the mouse over the Show desktopbutton.

The Show desktopbutton 2. The windows will become transparent allowing you to see the desktop.

Viewing the desktop

3. Click on the Show desktop button to close the windows. 4. Click again and the windows will return.

3. Understanding window upgrade, window update and action center.


Upgrading to Windows 7 Windows 7 Versions and Pricing The major upgrade versions of Windows 7 are Home Premium, Professional, and Ultimate. Home Premium is the most popular version of Windows 7 and will likely suit the needs of most users. The Professional version may appeal to small to medium business owners as it has extras like Windows XP mode and networking back up features. Ultimate is the most powerful version with added security features, such as Bitlocker and the flexibility of use in 35 languages.

Major upgrade versions To see which features each version of Windows 7 has, go to Microsoft's Compare Windows 7 page. You may come across a Windows 7 Starter version. This version is made for smaller laptops (sometimes called netbooks) and will have limited performance and features compared to Home Premium. There is also a Windows 7 Home Premium Family Pack ($149.99) for upgrading up to three PCs in the home. Full versions of the above products are more expensive, but will only be required if you are not already running Windows XP or Vista. Windows 7 Requirements for Upgrade In order to run Windows 7, your PC must have the following:

1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor 1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit) 16 GB available hard disk space (32-bit) or 20 GB (64-bit) DirectX 9 graphics device with WDDM 1.0 or higher driver

Additional System Requirements may be needed to run certain features. Windows 7 Upgrade Advisor Microsoft is providing a tool called the Windows 7 Upgrade Advisor so customers can determine if their PC is able to run Windows 7. It is a good idea to download the Windows 7 Upgrade Advisor before upgrading upgrading. It will analyze your computer's processor, memory, storage, graphics capabilities and any other compatibility issues. If possible, it will also provide guidance for resolving issues. You should plug in and connect all USB devices, printers, external hard drives, etc. when running the Upgrade Advisor. This will provide the best analysis of your system. Windows Experience Index It is another indicator of how well your computer will respond to window 7.the window experience indedx tests your system and rates it with a score between 1 and 7.9. The higher the score the better your computers performance. 1. To check your windows experience index, click on the start menu and select computer. The computer window will appear. 2. Select system properties in the button bar at the top of the screen. The system window displays your computers windows experience index rating. It also shows other system information, including whether your computer has a 32 bit or 64 bit processor.

3. Select windows experience index link to view the rating of individual computer components that are scored. The rating is determined by lowest subscore.

If you are currently using Windows Vista then your upgrade experience might be quite easy. If you have XP, then upgrading will likely be more complicated. Either way, it is probably best to download and run the Windows Upgrade Advisor before proceeding. Based on the current version of your operating system, you will need to figure out if you have to perform a simple upgrade or a custom (clean) installation. You can visit Microsoft's Upgrade to Windows 7 page to determine what type of upgrade you need and what additional information should be considered before performing the upgrade. Even if you do not need to do the custom (clean) installation, it is a good idea to back up your files before upgrading. For more information, read Backing Up Your Computer in our Computer Basics tutorial. Microsoft provides instructions for doing a custom (clean) installation. However, you may want to consider using a computer service professional if you are not comfortable with this process. In this case, the score of 4.3 should be sufficient to experience most of the new windows features. If your system scores lower than a 3, you may miss out on some of the digital media and graphics features, including Window's Aero. What Kind of Upgrade do I Need?

Once you have determined which Windows 7 version you want and what kind of upgrade you need to perform, you may go to a retail outlet or the online Microsoft Store to purchase your upgrade. Conclusion Now that you know what it takes to upgrade, you have a better idea of whether Windows 7 is right for you. Depending on your circumstances, upgrading may be an easy or complicated process. As previously mentioned you should weigh any complications you may experience with your desire for the improvements and features that Windows 7 has to offer. Time and cost are also factors, especially if you are considering purchasing a new computer.

Personalize Font Settings You may adjust the Font Settings and ClearType on your desktop based on your preferences. To Change the Font:

1. From the Search bar in the Start Menu, type and select Fonts. 2. Select the Font you desire from the Fonts

To Change the Font Size:


1. Adjust the Font Size by selecting Change Font Size from the menu on the left of the Fonts

pane. 2. Select the desired font size and click Apply.

Changing the font size Please note that a larger font size may interfere with how some items are displayed on the screen. ClearType You may also adjust the ClearType for your screen. ClearType helps improve the readability of text on LCD monitors and screens.

To adjust ClearType, select Adjust ClearType text from the menu on the left of the Fonts pane and following the steps for selecting the text that appears the best to you.

Action Center:

What is the Action Center? The Action Center is a centralized place to view Security and Maintenance messages, and it also makes it easy to find and fix problems with your computer. To Use the Action Center: If you have any important messages, the flag icon on the taskbar will display a red "X" symbol. 1. To open the Action Center, click on the small flag icon on the taskbar. 2. Review the messages. 3. Click Open Action Center to respond to messages.

Open the Action Center To Access the Action Center from the Control Panel:
1. Click Start. 2. Go to the Control Panel. 3. Click Review Your Computer's Status under System and Security.

Fixing problems using the Action Center: Your messages are displayed in the Action Center pane. Important messages will have a red bar, and less important ones will have a yellow bar. If a security or maintenance issue has a solution, there will be a button on the right side of the message. Some messages are just notifications and do not indicate a problem with your computer. Those messages will not include a solution button, but they may still have important information or instructions.

Respond to messages in the Action Center Changing Your User Account Control Settings What is User Account Control? User Account Control warns you when a program or user is trying to change your computer's settings. It puts a temporary lock on your computer until you confirm that you want to allow the changes. This helps to protect your computer frommalicious software. When it was introduced in Windows Vista, many users found that it generated too many disruptive pop -up warnings. Windows 7 now lets the user decide how often they will receive those warnings.

To Change Your User Account Control Settings: 1. Open the Action Center. 2. Click Change User Account Control settings.

Change User Account Control Settings Use the slider to choose the level of protection you want from User Account Control. It is recommended that you use one of the top two settings. The other two should only be used in special circumstances. It may be best to choose the highest setting and if you end up getting too many popups, you can always lower it to the second setting.
4.

Adjust how you receive notification messages

Windows 7 Troubleshooting Not all computer problems will be shown in the Action Center. For example, you may be having trouble with aparticular program or device, or with connecting to the internet. For these types of problems, you will want to view the Troubleshooting options. To get there, click Troubleshooting at the bottom of the Action Center pane.

Access Troubleshooting In the Troubleshooting pane you will see a number of programs called troubleshooters, which help you identify and fix problems with your software and hardware. Click the buttons in the interactive below to see information about some useful troubleshooters. Note that your computer may have a slightly different list of troubleshooters.

4. To create user account and setting up parental control on user account.


To create a new account:
1. From the Manage Accounts pane, click Create a new account. 2. Type an account name.

Creating an account
3. Select Standard user or Administrator.

4. Click Create Account.

Changing an Account's Settings Once you've created a new account, you may want to add a password or make other changes to the account'ssettings. To Create a Password:
1. From the Manage Accounts pane, click the account name or picture.

2. Click Create a password.

Create a password
3. Type a password in the New password field and retype it in the Confirm new password

field.

Type a password and hint


4. If you want, you can type a password hint to help you remember your password. 5. Click Create password. 6. To go back to the Manage Accounts pane, click Manage another account.

Account passwords are case sensitive, which means that capital and lowercase letters are treated as different characters. For example, aBc1 is not the same as abc1. To Change Your Account Picture: You can also change the picture for any account. This picture appears next to the account name and helps you easily identify the account.
1. From the Manage Accounts pane, click the account name or picture. 2. Click Change the picture.

Change the picture


3. Select a picture, or click Browse for more pictures to select one of your own.

Account pictures
4. Click Change Picture.

Standard vs. Administrator Accounts Before you start making new user accounts, it's important to understand the two types of accounts:

Standard: Standard accounts are the basic accounts you use for normal, everyday tasks. As a Standard user, you can do just about anything you would need to do, such as running software or personalizing your desktop. Also, Parental Controls can be placed on Standard accounts. Administrator: Administrator accounts are special accounts used for making certain changes to system settings or managing other people's accounts. They have full access to every setting on the computer. Every computer will have at least one Administrator account.

So as you can see, Administrator accounts are more powerful. But for the same reason, Standard accounts are safer, so they are generally better for everyday use. In fact, you can make Administrator-level changes while logged into a Standard account; you will just need to provide an Administrator password when making the changes. To Go to Your User Accounts: 1. Go to your Control Panel from the Start Menu. 2. Click Add or remove user accounts.

3. The Manage Accounts pane will appear. You will see all of the user accounts here, and you can add more accounts or manage existing ones.

The Manage Accounts pane Using Parental Controls Windows 7 offers various Parental Controls to help you control the types of content that your children can access. You can place parental controls on any Standard account, and each account can have different settings. If you have more than one child, each child can have access to different types of content, and you can always change the Parental Controls settings as your child gets older. Learn more about Parental Controls in this video. Before You Set Up Parental Controls You'll need to create an account for your child, if you haven't already. It should be a Standard account; you can't apply Parental Controls to an Administrator account. When you're setting up Parental Controls, it doesn't matter which account you're logged into, but if you're logged into a Standard account, then you'll need to provide an Administrator password before making any changes. Make sure that your child does not know your Administrator password, as it would allow them to change or disable Parental Controls for any user account. To Set up Parental Controls:
1. Go to your Control Panel from the Start Menu. 2. Click Set up parental controls for any user.

Getting to Parental Controls


3. Click on any Standard Account.

Choose an account
4. Click On to turn Parental Controls on.

Parental Controls main page


5. Now you can click Time limits, Games or Allow and block specific programs to set the

Parental Controls. We'll explore each of these on the next page.


Changing Your Parental Controls Settings Time Limits The Time limits settings allow you to control when your child can use the computer. Click and drag from any box to allow or block a section of time. If you want, you can set different time limits on different days. For example, you may want to allow more computer use on weekends.

Time limits

Games The Games settings allow you to select which game ratings to allow, and you can also allow or block specific games. First you'll have to click Yes to allow your child to play games, then you can change your Games settings.

Games settings Here we have selected "Everyone" as the highest rating allowed. That means thechild can play games rated "Everyone" OR "Early Childhood."

Game ratings

To Allow or Block Specific Programs: Allow and block specific programs controls which non-game programs your child can use. By default, your child can use all non-game programs. But there may be some programs you don't

want your child to use like a financial or email program. Here's how to block specific programs:

1. Click Will Jr can only use the programs I allow. 2. Click Check All. 3. Uncheck the programs you want to block.

Non-game programs

5. Commands for window power shell and MSCONFIG.


How to use MSCONFIG in Windows 7 Here is how to use MSCONFIG in Windows 7 to disable some of the unnecessary programs that automatically load on start-up. Disabling these programs will help your computer boot faster. 1. Click on the Windows 7 start icon in the bottom left corner of your screen.

2. Type MSCONFIG in the search box and then either press enter on your keyboard or double-click on the MSCONFIG program that appears in the search results. 3. Windows 7 will launch Microsoft's System Configuration Utility. Click on the Startup tab.

4. This takes you to a page with a list of "startup items." Startup items are programs that are automatically loaded every time you turn on your computer. Some startup programs are absolutely necessary, others are simply a waste of RAM.

In Windows 7, allmost all of Windows' essential programs are loaded through something called "Windows Services." This means that most of the startup items you see in Windows 7 are completely optional and can be turned off. However, a good rule of thumb is to disable only those programs that you recognize and don't need to have running all the time. When in doubt, leave it on. Or, better still, check out Paul "PacMan" Collins' huge "Startup Applications" list at http://www.pacsportal.co.uk/startup_search.php. This list of over 25,000 startup items you may encounter in MSCONFIG tells you which items are absolutely necessary, which items are optional, and which items you should definitely uncheck. Commands for window power shell: 1: Get-Help The first PowerShell cmdlet every administrator should learn is Get-Help. You can use this command to get help with any other command. For example, if you want to know how the Get-Process command works, you can type: Get-Help -Name Get-Process You can also use Get-Help with individual nouns and verbs. For example, to find out all the commands you can use with the Get verb, type: Get-Help -Name Get-* 2: Set-ExecutionPolicy Although you can create and execute PowerShell scripts, Microsoft has disabled scripting by default in an effort to prevent malicious code from executing in a PowerShell environment. You can use the SetExecutionPolicy command to control the

level of security surrounding PowerShell scripts. Four levels of security are available to you:

Restricted -- Restricted is the default execution policy and locks PowerShell down so that commands can be entered only interactively. PowerShell scripts are not allowed to run. All Signed -- If the execution policy is set to All Signed then scripts will be allowed to run, but only if they are signed by a trusted publisher. Remote Signed -- If the execution policy is set to Remote Signed, any PowerShell scripts that have been locally created will be allowed to run. Scripts created remotely are allowed to run only if they are signed by a trusted publisher. Unrestricted -- As the name implies, Unrestricted removes all restrictions from the execution policy.

You can set an execution policy by entering the Set-ExecutionPolicy command followed by the name of the policy. For example, if you wanted to allow scripts to run in an unrestricted manner you could type: Set-ExecutionPolicy Unrestricted 3: Get-ExecutionPolicy If you're working on an unfamiliar server, you'll need to know what execution policy is in use before you attempt to run a script. You can find out by using the GetExecutionPolicy command. 4: Get-Service The Get-Service command provides a list of all of the services that are installed on the system. If you are interested in a specific service you can append the -Name switch and the name of the service (wildcards are permitted) When you do, Windows will show you the service's state. 5: Convert To-HTML PowerShell can provide a wealth of information about the system, but sometimes you need to do more than just view the information onscreen. Sometimes, it's helpful to create a report you can send to someone. One way of accomplishing this is by using the ConvertTo-HTML command. To use this command, simply pipe the output from another command into the ConvertTo-HTML command. You will have to use the -Property switch to control which output properties are included in the HTML file and you will have to provide a filename.

To see how this command might be used, think back to the previous section, where we typed Get-Service to create a list of every service that's installed on the system. Now imagine that you want to create an HTML report that lists the name of each service along with its status (regardless of whether the service is running). To do so, you could use the following command: Get-Service | ConvertTo-HTML -Property Name, Status > C:\services.htm 6: Export-CSV Just as you can create an HTML report based on PowerShell data, you can also export data from PowerShell into a CSV file that you can open using Microsoft Excel. The syntax is similar to that of converting a command's output to HTML. At a minimum, you must provide an output filename. For example, to export the list of system services to a CSV file, you could use the following command: Get-Service | Export-CSV c:\service.csv 7: Select-Object If you tried using the command above, you know that there were numerous properties included in the CSV file. It's often helpful to narrow things down by including only the properties you are really interested in. This is where the Select-Object command comes into play. The Select-Object command allows you to specify specific properties for inclusion. For example, to create a CSV file containing the name of each system service and its status, you could use the following command: Get-Service | Select-Object Name, Status | Export-CSV c:\service.csv 8: Get-EventLog You can actually use PowerShell to parse your computer's event logs. There are several parameters available, but you can try out the command by simply providing the -Log switch followed by the name of the log file. For example, to see the Application log, you could use the following command: Get-EventLog -Log "Application" Of course, you would rarely use this command in the real world. You're more likely to use other commands to filter the output and dump it to a CSV or an HTML file. 9: Get-Process

Just as you can use the Get-Service command to display a list of all of the system services, you can use the Get-Process command to display a list of all of the processes that are currently running on the system. 10: Stop-Process Sometimes, a process will freeze up. When this happens, you can use the Get-Process command to get the name or the process ID for the process that has stopped responding. You can then terminate the process by using the Stop-Process command. You can terminate a process based on its name or on its process ID. For example, you could terminate Notepad by using one of the following commands: Stop-Process -Name notepad Stop-Process -ID 2668 Keep in mind that the process ID may change from session to session. 11. Get-Date 12. Clear-Host Get current date and time clear/cls Clear the screen

6. To understand system restore, recovery tool option, various safe mode options and MMC console management.
Recovering Your Settings with System Restore What is System Restore? Programs that you install can make changes to your system settings, and occasionally this can cause problems with your computer. System Restore is often the easiest way to fix these problems. System Restore allows you to "rewind" your system settings to an earlier point in time, called a restore point. Keep in mind, this will not erase your recent documents, and it cannot be used to recover lost documents or other files. However, it may uninstall recent programs and drivers. To Run System Restore:
1. Click Recovery at the bottom of the Action Center.

Opening System Restore


2. Click Open System Restore. 3. Follow the instructions on the screen. 4. You will be asked to select a restore point. If you've just installed a program that seems

to be causing problems, you will probably want to restore your system to the point just before that program was installed.

Choose a system restore point Microsoft Management Console 3.0 Microsoft has based most of its management applications on the Microsoft Management Console, or the MMC. The MMC provides a framework for building management consoles. This

framework has been used by Microsoft and many third-party application vendors for creating their management consoles. In fact, many of configuration tools available in Windows 7 are really MMC consoles with pre-added snap-ins. The consoles are then saved in such a way that they cannot be directly altered by users. The MMC contains snap-ins that are used for system and application management. As seen in Figure 5.22, Windows 7comes with many built-in MMC snap-ins that can be used to manage the system. These snap-ins can

Figure 5.22: Windows 7 MMC Snap-ins be used to manage user settings, Windows applications, security, and many other vital aspects of the system. Windows 7 contains the following built-in MMC snap-ins:

ActiveX Control This snap-in allows you to add individual ActiveX controls to view and configure. ActiveX controls are Internet Explorer plug-ins that are used to add functionality to the browser.

Authorization Manager This snap-in allows you to set permissions for Authorization Managerenabled applications. Certificates This snap-in allows you to configure the different certificate stores available on the system. Certificates help provide a secure operating environment for your system. You can use them for identification, securing data, and securing communications. There are certificate stores in place for users, applications, and the system itself.

Component Services This snap-in is used to manage the system's COM+, or Component Services configuration. You can also configure Distributed Computer Object Model (DCOM) and Distributed Transaction Coordinator (DTC) settings using this snap-in. These are especially important when programs need to communicate between multiple computers.

Computer Management This snap-in is actually a collection of snap-ins used for task scheduling, disk management, performance monitoring, and many other configuration and management tasks.

These snap-ins are grouped together under Computer Management for ease of use.

Device Manager This snap-in is used for viewing and configuration of hardware devices installed on the system. You disable devices, update drivers, and troubleshoot potential issues with your hardware devices.

Disk Management This snap-in is used for disk and volume management. You can create volumes, format disks, and enable fault tolerance. Event Viewer This snap-in is used to view the system event logs. These logs can help you determine if your system or applications are having problems. The Security log can also be used to determine if there is unauthorized access to your system.

Folder This snap-in is used to add a folder than can be used for organizing your snap-ins. This can come in very handy if you have added many snap-ins to a single MMC console.

OS Lab manual

Group Policy Object Editor This snap-in is used for configuring the Group Policy Objects on the system. Group policies are used to provide a centralized way for managing your systems. IP Security Monitor This snap-in is used to monitor the status of your IP Security(IPsec) configuration. IPsec is used to secure communications between computers. This snap-in can help you determine which IPsec policies are being applied to your systems. IP Security Policy Management This snap-in is used to understand and configure the settings in your IPsec policy. Link to Web Address This snap-in allows you to add a Web page to the MMC. This can be useful for applications and systems with Webbased management. Local Users and Groups This snap-in allows you to configure users and groups on the local system. You can add user accounts, delete user accounts, and configure various user properties. NAP Client Configuration This snap-in allows you to configure Network Access Protection (NAP) client configuration settings. NAP is a security feature that is used to limit who can gain access to your network. Performance Monitor This snap-in allows you to monitor your system performance, including memory, hard disks, processors, and many other components. Print Management This snap-in is used to manage print servers and printers connected to the system. Resultant Set of Policy This snap-in is used to show what settings will be applied to the system after all policies have been applied. This helps when you want to test out your Group Policy settings without actually applying them to the system. Security Configuration and Analysis This snap-in provides configuration and analysis of security templates being applied to the system. Security Templates This snap-in allows you to edit the security templates that can be applied to the system. Services This snap-in allows to you view and configure the properties for services running on the system. You can disable, start, stop, or restart services. You can also configure authentication and fault tolerance for services.

OS Lab manual

Shared Folders This snap-in allow you to view properties and status information for file shares that exist on the system. You can see what folders are beings shared and who is accessing them. Task Scheduler This snap-in allows you to sche dule tasks to be automatically run at specified times and/or at specified intervals. TPM Management This snap-in allows you to configure the Trusted Platform Module, if one exists in the system. Trusted Platform Modules are used to generate keys for cryptographic operations. Windows Firewall with Advanced Security This snap-in allows you to configure Windows Firewall settings on the system. You can control what processes, applications, and systems can access your system or generate network traffic from your system.

WMI Control This snap-in allows you to configure and manage the Windows Management Instrumentation (WMI) service. WMI is used for management and monitoring of Windows systems. To add snap-ins to an MMC console, do the following:
1. Run the command MMC.exe from a command prompt or from the Windows 7 Search bar. 2. If prompted by UAC to allow the MMC to make changes to the computer, click Yes. This

should bring up a blank MMC console.


3. From the File menu, select Add/Remove Snap-in. 4. From the Add or Remove Snap-ins window, choose the snap-in you want to add.

ClickAdd. Depending on the snap-in you add, you may be prompted for additional information.
5. After you have added all your snap-ins, click OK. You snap-ins should now appear in the

MMC. The MMC can be very flexible. You can add whatever snap-ins you want to a blank MMC console. You can also modify one of the predefined management tools that use the MMC. After you have modified an MMC console, you have the option to save your changes. Simply select File | Save or File | Save As, whichever is appropriate. There are also other options available for controlling what can and cannot be done inside an MMC console. If you choose File | Options, you will be presented with the MMC Options window, as seen in Figure 5.23. Here, you can change the icon used for console, or set the console mode. The console mode determines what users can and cannot see within the console and what changes they can make. The following are the four basic console modes available for the MMC:

OS Lab manual

Author mode This mode gives you full access to do anything in the MMC. You can add and remove snap-ins, create views, and open new windows. User mode full access This mode give you full access to the tree within the MMC. But, you cannot add or remove snap-ins. User mode limited access, multiple window This mode prevents you from being able to view contents of the tree that are not visible in the console window. User mode limited access, single window This mode opens the console with just a single window.

Users cannot view items that do not appear in that window. The Options window allows you to specify if changes to the console can be saved. There is also an option for whether or not to allow the user to customize the console views.

MMC Options Window Computer Management Console

System Tools Task Scheduler, Event Viewer, Shared Folders, Local Users and Groups, Performance, Device Manager Storage Disk Management Services and Applications Services, WMI Control

Figure 5.24: Computer Management Console These snap-ins are used to manage the system. Again, these snap-ins can be used individually. The Computer Management console just puts them all together to make management easier. If you need to, you can create a custom MMC console with these snap-ins in addition to others.

OS Lab manual

Local Group Policy Editor Setting individual settings can be quite cumbersome. To help Windows uses the concept of group policies. Group policies can be used to easily set multiple settings. Windows 7 comes with an MMC snap-in called Group Policy Object Editor. You can add this snap-in to the MMC and choose Local Computer when asked which Group Policy Object to edit. Now, you can edit the computer's local group policy. As seen in Figure 5.25, the local computer policy is divided into two main sections: Computer Configuration and User Configuration.

Figure 5.25: Local Computer Policy Snap-in Computer Configuration The Computer Configuration section is used for computer-wide settings. Many of these settings are applied when the system first boots up. These settings will apply to any user who logs into the system. The Computer Configuration section contains three subfolders:

Software Settings By default, there is nothing to be configured here. Windows Settings These are general Windows settings that can be configured for all users. There are subnodes for Name Resolution Policy, Scripts(Startup/Shutdown), Deployed Printers, Security Settings, and Policy-based QoS.

Administrative Templates These are registry-based settings that can be set for the system. There are subnodes for Control Panel, Network, Printers, System, andWindows Components.

User Configuration The User Configuration section is used for user-specific settings. Most of these settings are not applied until a user logs into a system. These settings will apply no matter what system a user logs into. The User Configuration section contains three subfolders:

Software Settings By default, there is nothing to be configured here. Windows Settings These are general Windows settings that can be configured for all users. There are subnodes for Scripts(Logon/Logoff), Security Settings, Policy-based QoS, Deployed Printers, and Internet Explorer Maintenance.

OS Lab manual

Administrative Templates These are registry-based settings that can be set for the system. There are subnodes for Control Panel, Desktop, Network, Shared Folders, Start Menu, and Taskbar, System, and Windows Components.

7. Introduction to window 7 upgrade advisor, windows defender and windows registry file. Windows Registry
The registry has long been the central configuration store for Windows systems. The registry is divided in categories called hives. These hives are where the actual configuration settings are stored. There are five main hives in the registry are as follows: HKEY_CLASSES_ROOT This maintains file type associations.

HKEY_CURRENT_USER This maintains user settings for the user currently logged into the system. HKEY_LOCAL_MACHINE This maintain system-wide settings. HKEY_USERS This maintains user settings for all users. HKEY_CURRENT_CONFIG This maintains information about the current hardware configuration.

The registry can be modified directly or indirectly. You must be careful when modifying the registry directly. Any misconfigurations or typos can severely affect the functioning of your system. Regedt32 is the primary tool provided with Windows 7 for modifying the registry. You can use Regedt32 to configure registry settings and to set registry permissions. Simplified Configuration and Management of Desktops Microsoft developers included an undocumented method for simplifying administration by combining shortcuts. It is a simple and single container with multiple shortcuts to Windows 7 options that are available through other methods as seen in Figure 5.26. This may be helpful for administrators and power users alike to configure and manage single Windows 7 desktops.

OS Lab manual

Combined Shortcut Window Windows Task Scheduler 1. Open Task Scheduler by clicking the Start button , clicking Control Panel, clicking System and Security, clickingAdministrative Tools, and then double-clicking Task Scheduler. If you're prompted for an administrator password or confirmation, type the password or provide confirmation. 2. Click the Action menu, and then click Create Basic Task. 3. Type a name for the task and an optional description, and then click Next. 4. Do one of the following: To select a schedule based on the calendar, click Daily, Weekly, Monthly, or One time, click Next; specify the schedule you want to use, and then click Next. To select a schedule based on common recurring events, click When the computer starts or When I log on, and then click Next. To select a schedule based on specific events, click When a specific event is logged, click Next; specify the event log and other information using the drop-down lists, and then click Next. 5. To schedule a program to start automatically, click Start a program, and then click Next. 6. Click Browse to find the program you want to start, and then click Next. 7. Click Finish. To schedule a task to run automatically when the computer starts If you want a task to run when the computer starts, whether a user is logged on or not, follow these steps. 1. Open Task Scheduler by clicking the Start button , clicking Control Panel, clicking System and Security, clickingAdministrative Tools, and then double-clicking Task Scheduler. If you're prompted for an administrator password or confirmation, type the password or provide confirmation.

OS Lab manual

2. Click the Action menu, and then click Create Basic Task. 3. Type a name for the task and an optional description, and then click Next. 4. Click When the computer starts, and then click Next. 5. To schedule a program to start automatically, click Start a program, and then click Next. 6. Click Browse to find the program you want to start, and then click Next. 7. Select the Open the Properties dialog for this task when I click Finish check box and click Finish. 8. In the Properties dialog box, select Run whether user is logged on or not, and then click OK.

8. Making a word file and how to protect it with password.


The following part shows you a simply instruction of password protecting Microsoft Excel 2013 files.

Open the Microsoft Excel 2013 spreadsheet that you want to password protects. And click on the "FILE" on the left tip of the interface.

Select the "Info" option from the left-side panel of the File menu. Select "Protect Workbook" and then the "Encrypt with Password" on the drop down menu.

OS Lab manual

Type your password in the Encrypt Document dialog window. Remember that the password should be strong and unforgettable. Note: A strong password needs to contain special character such as @#$%^& and must be at least 8 characters long.

Re-enter your password in the Conform password window and click "OK".

OS Lab manual

How to Password Protect Excel 2013 Read Only Option? Microsoft Excel 2013 also let users to secure their documents from changing by using edit restriction options. Thus others can only read but cannot change your Excel 2013 files. Here is how:

1. Click on the "FILE"-> "Info" option -> "Protect Workbook" -> Restrict Editing 2. Set the formatting as well as editing restrictions on the document.

3. Check the "Allow only this type of editing document" within the Editing Restrictions and choose the No change (Read only) option in the dropdown list and then select "Everyone" in groups.

OS Lab manual

4. Enter your password in the "Start Enforcing Protection" box and click "OK".

Protecting an Excel 2013 workbook is easy with the steps above. In addition, a number of Excel 2013 users complain that they often encounter the dilemma of forgetting Excel 2013 password. With that in mind, I will introduce a simple way for you to find your lost Excel 2013 password below. How to Recover Password-protected Excel 2013 File?

Download and install an Excel 2013 password recovery tool on your computer. Launch the software after installation.

OS Lab manual

Download SmartKey Excel Password Recovery:

Size: 31.15MB

Secure Download

Select an attack type to recover your forgotten MS Excel password. (Normally choose from Brute-Force with Mask, Brute-Force Attack, and Dictionary). Your lost password will be appearing in the File Opening Password box of the pop-up dialogue window after a few seconds.

Now following the tips we offered you can easily protect workbook in Excel 2013 whenever you need to. And if unfortunately forgot MS Excel 2013 password, don't worry; the powerful Microsoft Excel 2013 password recovery tool will recover your password effectively and professionally.

OS Lab manual

9. To create a blog.
How To Create a Blog for Free in 4 Easy Steps Step 1: Choose a free blogging software. Step 2: Register for an account and create your blog These articles from About.com Web Logs provide step-by-step instructions to help you start a blog with either of the two most popular free blogging softwares - Blogger.com and Wordpress.com. Step 3: Select Your Domain, Theme and Other Options. During the registration process for your new blog account, you'll need to choose a domain name and blog theme. You also might want to take a few minutes before you actually start blogging to customize some of the other preferences for your blog that your blogging software allows you to modify such as the author name, comment moderation process, and so on. However, you're not required to do any customization before you start publishing blog posts. Step 4: Start blogging. Once you've completed steps 1-3, you're ready to join the blogosphere and start publishing content on your blog. There are many more ways you can customize your blog with plug-ins, feeds, blogrolls, and more, but these four easy steps are all you need to follow in order to start a simple blog.

How to enable a pen drive to use on a system if it is disabled? Right click on My computer; You will see manage. Click on Manage, You will get the Computer management Local on the left and you will see device manager; Click on device manager; You will see Universal Serial Bus Controllers on the right; Click on USB Controllers you will see storage, right click on it, you will see the enable menu, just click it .

Remote Desktop Connection Remote Desktop Connection is a technology that allows you to sit at a computer (sometimes called the client computer) and connect to a remote computer (sometimes called the host computer) in a different location. For example, you can connect to your work computer from your home computer

OS Lab manual

and have access to all of your programs, files, and network resources as though you were in front of your computer at work. You can leave programs running at work and then, when you get home, you can see your work computer's desktop displayed on your home computer, with the same programs running.

A Remote Desktop connection between two computers You cannot use Remote Desktop Connection to connect to remote (host) computers running the following editions ofWindows Vista:

Windows Vista Starter Windows Vista Home Basic Windows Vista Home Basic N Windows Vista Home Premium

However, any edition of Windows Vista can be running on your computer (the one you want to connect from). You cannot use Remote Desktop Connection to connect to remote computers running Windows XP. You don't need to install it. In this version of Windows, Remote Desktop Connection is installed by default.

Open Remote Desktop Connection by clicking the Start button , clicking All Programs, clicking Accessories, and then clicking Remote Desktop Connection.

To allow remote connections on the computer you want to connect to, follow these steps:
1. Open System by clicking the Start button

, clicking Control Panel, clicking System

and Maintenance, and then clicking System.

OS Lab manual 2. Click Remote settings on the left. 3. In the System Properties dialog box, under Remote Desktop, select the one of the three

options, and then click Select Users. If you are prompted for an administrator password or confirmation, type the password or provide confirmation. If you are an administrator on the computer, your current user account will automatically be added to the list of remote users and you can skip the next two steps.
4. In the Remote Desktop Users dialog box, click Add. 5. In the Select Users or Groups dialog box, do the following:

To specify the search location, click Locations, and then select the location you want to search. In Enter the object names to select, type the name of the user that you want to add, and then click OK. The name will be displayed in the list of users in the Remote Desktop Users dialog box.

Note

You cant connect to a computer that is sleeping or hibernating, so make sure the settings for sleep and hibernation on the remote computer are set to Never. (Hibernation is not available on all computers.) For information about making those changes, see Change, create, or delete a power plan (scheme).

How do I change Remote Desktop Connection settings? 1. Open Remote Desktop Connection by clicking the Start button , clicking All Programs, clicking Accessories, and then clicking Remote Desktop Connection.
2. Before connecting, click Options, and then make the changes you want on the Display,

Local Resources, Programs,Experience, and Advanced tabs.


1. Note

To save these settings for future connections, on the General tab, click Save.
2. Click Connect.

How can I disconnect from a Remote Desktop session? To disconnect without ending your Remote Desktop session

You can temporarily disconnect from a session by clicking the Close button on the connection bar (the horizontal bar at the top of your screen). This leaves your programs running so that, next time you connect, you can continue where you left off.

OS Lab manual

To end your Remote Desktop session and disconnect

In the Remote Desktop Connection window, click the Start button next to the Lock button , and then click Log Off.

, click the arrow

How can I reconnect after temporarily disconnecting from a Remote Desktop session? Connect to the remote computer as you normally would. The next time you connect to the same remote computer, Remote Desktop Connection automatically reconnects to the session that was in progress (if the remote computer is set up to allow reconnecting of disconnected sessions).

Can I use keyboard shortcuts with Remote Desktop Connection? Yes. There are two ways to do this. You can set up the remote computer to recognize Windows keyboard shortcuts that you type (for example, ALT+TAB), or you can use Terminal Server keyboard shortcuts. To use Windows keyboard shortcuts, follow these steps:
1. Open Remote Desktop Connection by clicking the Start button

, clicking All Programs, clicking Accessories, and then clicking Remote Desktop Connection.

2. Click Options, and then click Local Resources. 3. Under Keyboard, select On the remote computer to make the remote computer

recognize the Windows keyboard shortcuts that you type. (You can also choose In full screen mode only to get the same result as long as you use Remote Desktop Connection in full-screen mode. This is the default setting.)

What is Windows Remote Assistance? Applies to Windows 7 Sometimes the best way to fix a problem is to have someone show you how. Windows Remote Assistance is a convenient way for someone you trust, such as a friend or technical support person, to connect to your computer and walk you through a solutioneven if that person isn't nearby. To help ensure that only people you invite can connect to your computer usingWindows Remote Assistance, all sessions are encrypted and password protected.

OS Lab manual

Remote Assistance connection between two computers By following a few steps, you can invite someone to connect to your computer. After he or she is connected, that person can view your computer screen and chat with you about what you both see. With your permission, your helper can even use his or her own mouse and keyboard to control your computer and show you how to fix a problem. You can also help someone else the same way. For more information, see Get help with your computer using Windows Remote Assistance and Help someone with a computer problem using Windows Remote Assistance.

Sending a Remote Assistance Invitation


1. Open Help and Support Center by clicking Start, and then clicking Help and Support. 2. Under Ask for Assistance click Invite a friend to connect to your computer with

Remote Assistance. 3. The Remote Assistance page is displayed. Click Invite someone to help you. 4. There are three available options for sending the Remote Assistance invitation: Windows Messenger, email, or saving the invitation as a file. Choose one of the three options, and then follow the directions. With the email or Save as Invitation methods, the Novice will be given the opportunity to protect the session with a password. The Novice must also select a time period when the invitation will automatically expire. The Novice can expire any invitation at any time by clicking the View invitation status link on the Remote Assistance page that is referred to in Step 3. 5. When the Expert receives the invitation, the Expert is prompted for the password which the Novice set. After supplying this password, the Expert can initiate the Remote Assistance session. 6. After the Expert initiates the session, the Novice's computer verifies the password that the Expert entered. 7. The Novice's computer also checks to make sure that the invitation that the Expert used is a valid invitation and that the invitation is still open.

OS Lab manual 8. If the invitation is open and the password is correct, the Novice receives a notification

stating that the Expert wants to start the session now and the Novice is prompted to start the Remote Assistance session. 9. If the Novice chooses to start the session, the Remote Assistance Novice chat dialog box will open on the Novice's computer and the Remote Assistance Expert console opens on the Expert's computer. At this point, the Expert can see everything on the Novice computer, in real time. 10. The Expert can request to take control of the Novices computer at this point by clicking the Take Control button on the Expert console. This sends a message to the Novice's computer notifying the Novice that the Expert is requesting to take control of the computer. The message provides the following three methods by which the Novice can stop the Experts control of their computer: Press the ESC key. Hold down the CTRL key, and then press the C key. Click the Stop Control button next to the Novice's chat window.
11. If the Novice chooses to give control of the computer to the Expert, the Novice and the

Expert share control of the keyboard and the mouse. It is best if the Novice does not move the mouse or type when the Expert has control because the session responds to both users inputs, which causes the mouse to behave erratically. If the Novice stops control, the Remote Assistance session continues and the Expert can still see the Novice's desktop.

10. Implementation of disk defragmenter and disk cleanup maintenance tools.


What is disk defragmentation? Applies to Windows Vista Disk defragmentation describes the process of consolidating fragmented files on your computer's hard disk. Fragmentation happens to a hard disk over time as you save, change, or delete files. The changes that you save to a file are often stored at a location on the hard disk that's different from the original file. Additional changes are saved to even more locations. Over time, both the file and the hard disk itself become fragmented, and your computer slows down as it has to look in many different places to open a file. Disk Defragmenter is a tool that rearranges the data on your hard disk and reunites fragmented files so your computer can run more efficiently. In this version of Windows, Disk Defragmenter runs on a schedule so you don't have to remember to run it, although you can still run it manually or change the schedule it uses. To start Disk Defragmenter MMC, use one of the methods that is described in this article. Method 1: Use the Properties of Your Local Disk
1. Open My Computer.

OS Lab manual 2. Right-click the local disk volume that you want to defragment, and then click

Properties. 3. On the Tools tab, click Defragment Now. 4. Click Defragment. Method 2: Use Computer Management MMC
1. Start Computer Management MMC (Compmgmt.msc). 2. Click Disk Defragmenter. 3. Click the volume that you want to defragment, and then click Defragment.

Method 3: Use Disk Defragmenter MMC.


1. Start Disk Defragmenter MMC (Dfrg.msc). 2. Click the volume that you want to defragment, and then click Defragment.

The version of Disk Defragmenter MMC that is included with Windows XP has the following limitations:

It can defragment only local volumes. It can defragment only one volume at a time. It cannot defragment one volume while it is scanning another. It cannot be scheduled. If you need to schedule disk defragmentation, use the Defrag.exe command line tool. For additional information about using the command line Defrag.exe tool, click the following article number to view the article in the Microsoft Knowledge Base: 283080 Description of the New Command Line Defrag.exe Included with It can run only one MMC snap-in at a time.

Windows XP

How to Defragment a Hard Drive on a Windows 7 PC By Dan Gookin from Troubleshooting Your PC For Dummies, 3rd Edition Defragmenting is commonly called defragging. No matter what you call it, defragging or defragmenting your hard drive will speed up disk performance. If you havent defragmented your PCs hard drive in a while (or ever), youre in for a treat. A freshly defragmented hard drive makes your computer seem brand new. Your PCs main hard drive is automatically defragmented on a regular schedule when you use Windows 7. Even so, you can manually defragment your hard drive or removable storage media. In Windows 7, follow these steps to pull a manual defrag of the PCs main hard drive:
1. Open the Computer window. 2. Right-click the media you want to defragment, such as the main hard drive, C. 3. In the drives Properties dialog box, click the Tools tab. 1. Click the Defragment Now button.

OS Lab manual

The Disk Defragmenter window appears. Rather than plow ahead and potentially waste time defragmenting a drive that doesnt need it, check the medias current fragmentation.
2. Click the Analyze Disk button. 3. Wait while Windows checks the defragmentation on the media.

Check the Percent Fragmented value by the disk in the Disk Defragmenter window. If its zero, theres no point in continuing: Skip to Step 8. Even when the drive shows 0 percent fragmented files, you can still proceed with defragmentation. No media can be fully defragmented, so the Windows Defragmenter will always find something to do.
4. Click the Defragment Disk button.

Windows defragments the media. Sit back and watch, or do something else, though you shouldnt do anything on your computer while the media is being defragmented.
5. Click the Close button, and close up any other windows you opened.

You may not notice any drastic improvement in disk performance, especially when the hard drive is frequently defragmented. But if you just defragmented your PCs hard drive for the first time, prepare to be stunned.

You cannot defragment a network drive. Do not defragment a media card or flash drive. These drives have a limited number of writes available to them. That is, the media can support data being written to it a finite number of times. This number can be huge, but its a real number; after reaching the number, the media becomes useless. By not defragmenting a media card or flash drive, you avoid accelerating the deadline. Optical drives cannot be defragmented. Even after running the Defragmentation utility, file fragments remain on the hard drive. Thats just the nature of disk storage. Please dont obsess and run the defragmentation utilities over and over, trying to get a perfectly defragmented hard drive.

How to Use Disk Cleanup in Windows 7 and Vista A handy way to remove lots of files you dont need on a hard drive is to employ the aptly named Disk Cleanup tool. What Disk Cleanup does is locate files that can easily be removed to free up some disk space, especially files that may not be obvious to you, such as temporary files used by Windows or when browsing the Internet. To run Disk Cleanup in Windows 7 and Windows Vista, follow these steps:
1. From the Start button menu, choose All ProgramsAccessoriesSystem ToolsDisk

Cleanup. 2. In Windows Vista, choose the option My Files Only.

OS Lab manual

Start with your own files first. If that doesnt remove enough files, repeat these steps and choose the option Files from All Users on This Computer.
3. If prompted, choose the mass storage device that you want to clean up.

The prompt appears only when you have multiple storage media on your PC. You probably want to choose drive C, the main storage device.
4. In the Disk Cleanup dialog box, place check marks by all the items you want to

remove. Its okay to place check marks by all items. Those things wouldnt be listed if they were crucial to the computers operation. Theres one exception to placing check marks by all the items, however: Hibernation File Cleaner. Do not remove that item if you use hibernation on your computer.
5. Click OK.

Youre not quite there yet.


6. Click the Delete Files button to begin the cleanup process.

Wait while the disk is being cleaned. When the process is complete, the window goes away. In Windows 7, you can click the Clean Up System Files button to remove unneeded bits and pieces of various Windows updates that may be littering the hard drive. Click the button before Step 4, and then after the system files are cleaned up, you can proceed with removing other disk detritus. You can also access the Disk Cleanup utility from a disk drives Properties dialog box by clicking the Disk Cleanup button on the General tab.

11. What is bitlocker and TPM. How a bitlocker encrypt a file.


What is BitLocker? What does it do? What does it not do? BitLocker lets you encrypt the hard drive(s) on your Windows 7 and Vista Enterprise, Windows 7 and Vista Ultimate or Windows Server 2008 and R2. BitLocker will not encrypt hard drives for Windows XP, Windows 2000 or Windows 2003. Only Windows 7, Vista and Server 2008 include BitLocker. BitLocker drives can be encrypted with 128 bit or 256 bit encryption, this is plenty strong to protect your data in the event the computer is lost or stolen. BitLocker protects your hard drive from offline attack. This is the type of attack where a malicious user will take the hard drive from your mobile machine and connect it to another

OS Lab manual

machine so they can harvest your data. BitLocker also protects your data if a malicious user boots from an alternate Operating System. With either attack method, BitLocker encrypts the hard drive so that when someone has physical access to the drive, the drive is unreadable. Now if you are a network admin and you need to harvest data from a hard drive when a machine fails, our tools include the functionality to prompt the admin for the recovery key so the hard drive can be accessed. We've done a good job at ensuring the data does not end up in the wrong hands, while making it easy for authorized users to access the data in the event of a failure. What does BitLocker do? Again, BitLocker encrypts the hard drive(s) to protect the Operating System from offline attacks. Server 2008, 2008 R2, Windows 7 Enterprise, Windows 7 Ultimate, Windows Vista Enterprise, and Windows Vista Ultimate all include BitLocker functionality. Windows 7 Professional and Windows Vista Business Edition and the Home Editions do not include BitLocker. The RTM versions of Vista only allow BitLocker encryption of the C: drive. SP1 for Vista, and Windows 7 include the ability to encrypt all of the hard drives belonging to the Vista and Windows 7 machine. Server 2008 (and R2) include the ability to encrypt all of its attached hard drives as well. BitLocker on a Server 2008 (and R2) server might not make sense for your servers in the Data Center, but using BitLocker on servers in remote offices makes a lot of sense. How many remote offices have their servers in secure Data Centers? They don't! If you're lucky, your server sits in a locked closet. If you're unlucky, it sits under someone's desk. Deploying BitLocker to these machines makes perfect sense because if those machines are stolen, their data is encrypted and protected from the types of attacks that they would be exposed to. Another piece to protect these remote servers is the Read Only Domain Controller functionality. I won't go into it here, but it gives you the ability to provide fast logon experiences for your remote users while ensuring that all of the domain credentials are not stored on these remote office servers. Windows 7 extends BitLocker functionality to removable drives, we call that functionality BitLocker to Go. BitLocker to Go gives you the ability to encrypt your thumb drives and even USB hard drives. You even have the ability to enforce BitLocker to Go via Group Policy, this Group Policy can ensure that users can only store corporate data on encrypted drives. What does BitLocker not do? BitLocker does not protect the computers contents while Windows is running. Again, BitLocker is built foroffline attacks, once the operating system is up and running. Windows 7 and Vista will protect your data from unauthorized access. When 7 (and Vista) is up and running, unauthorized access can come in the form of:
1. A malicious user trying to log onto the local computer. Windows 7 (and Vista) can

protect itself by enforcing strict password policy and complexity. Please ensure that if your data is important enough to encrypt, that you also require complex passwords

OS Lab manual

and/or two factor authentication. Two factor authentication takes the simple passwords or easy to guess passwords out of the equation so that they are no longer a risk. 2. A malicious user connecting to the computer over the network to harvest data from the local computer. If the user has access to your physical network, the malicious user can try to connect to your machine over the network. Again, strict user permissions on the local machine and on your network as a whole, will prevent malicious users from accessing your network. How To Use BitLocker on Drives without TPM BitLocker is an encryption feature available in Ultimate and Enterprise versions of Windows 7 and Vista, but requires a Trusted Platform Module (TPM) on the system. Not all systems include TPM and today we take a look at how to bypass it so you can use BitLocker. Enable BitLocker You can use BitLocker to encrypt an entire fixed drive, such as the local drive Windows is installed on or an internal data drive. For removable flash or external USB drives you can use its younger brother, BitLocker To Go. First lets take a look at how to enable BitLocker on a local hard drive. To encrypt an entire drive, simply right-click on the drive and select Turn on BitLocker from the context menu.

Next youll need to choose a secure password that will be used to access the drive.

OS Lab manual

Youre prompted to store the recovery key which is used in the event you lose your password or smartcard. If you store it as a file make sure that its not on the same drive that youre encrypting.

OS Lab manual

Confirm you want the drive to be encrypted then wait until the process is complete. The amount of time it takes will vary based on the size and amount of data on the drive.

To access the encrypted drive youll need to enter in the password to unlock it.

OS Lab manual

The drive icon will change to show its encrypted with BitLocker, where the gold lock indicates its locked up and the gray lock is displayed after you have unlocked it.

Use BitLocker on a Drive Without TPM What happens if you get this goofy errorand what is a TPM anyway? TPM stands for Trusted Platform Module which is a microchip in a computer that supports advanced security features. Its where BitLocker stores the encryption key. If you have a drive that doesnt have a compatible TMP then youll need to use the following steps and have a flash drive.

OS Lab manual

Enter in gpedit.msc in the search box of the Start menu and hit Enter.

Under Local Computer Policy navigate to Computer Configuration \ Administrative Templates \ Windows Components \ Bit Locker Drive Encryption \ Operating System Drives and double click on Require additional authentication at startup.

Enable the feature and check the box next to Allow BitLocker without a compatible TPM,click Apply and Ok, and close out of Local Group Policy Editor.

OS Lab manual

Go back to the hard drive you want to encrypt and turn on BitLocker. A restart will be required to prepare the disk, and at this point make sure the flash drive is plugged in.

After the restart youre prompted to use the startup key on the flash drive every time you start the computer.

OS Lab manual

Select the drive you want to use to store the key.

After that the process is as we showed above. This method may not be as convenient but at least you dont have to go out and buy a new system that includes a TPM. If you dont want to deal with this process, read about how to encrypt your driving using TrueCrypt. Also, you might want to check out our article on using BitLocker To Go for encrypting flash drives.

OS Lab manual

Microsoft Enterprise Desktop Virtualization (MED-V)

Microsoft Enterprise Desktop Virtualization (MED-V) removes the barriers to Windows 7 upgrades by resolving application incompatibility. MED-V delivers applications in a Virtual PC workspace running Windows XP. It does this in a way that is completely seamless for the user; applications appear and function as though they were installed locally. MED-V enables IT teams to simplify management and delivery by accelerating deployment of critical operating system upgrades. Benefits of Using MED-V As previously stated, you can use MED-V to run Internet Explorer 7 or Internet Explorer 6 in a virtual environment with a previous operating system version, seamlessly integrated into the Windows 7 desktop. The following list addresses some of the benefits of using MED-V:

MED-V is easy to provision and deploy. MED-V provides a way to automate the first-time setup of virtual machines at the endpoint, including assignment of a unique computer name, performing initial network setup, and joining the virtual machine to a corporate domain. With MED-V, you can customize images in heterogeneous desktop environments, and you can adjust the Virtual PC memory allocation based on available RAM on the host computer. Application and website provisioning is based on Active Directory users/groups. You can assign a virtual image and define which applications are available to the user and which web sites should be redirected to Internet Explorer 6 or Internet Explorer 7.

MED-V is centrally managed. You can centrally define usage permissions and virtual machine settings and centrally monitor endpoint clients. There are also helpdesk tools to diagnose and troubleshoot virtual machines. With MED-V, you can maintain a minimal inventory. While you do have additional operating systems, you are generally not burdened with many extra images to manage. While language packs or Internet Explorer 7 may require more images, many customers find that they need only a single additional image. MED-V provides an administrator console for virtual image management and a central image repository for image storage, versioning, and delivery (which can be based on Internet Information Services [IIS] web servers, System Center Configuration Manager, or alternative deployment technologies). Integration with makes it possible to provision virtual images based on group membership or user identity.

You can use standard image maintenance. With MED-V, you can continue using Windows Server Update Services (WSUS) to deploy the latest Microsoft product updates or System Center

OS Lab manual

Configuration Manager. The MED-V workspace is managed as any other desktop in the enterprise. For more information, see the Microsoft Enterprise Desktop Virtualization Evaluation Guide. Also, see the Links for Further Information later in this document. Limitations of MED-V MED-V utilizes client machine resources, and this may be an issue for under-powered hardware. Starting the virtual machine on the client side can take a few minutes; it therefore might be beneficial to set the MED-V preference to leave the virtual machine running for the best user experience. MED-V requires that you manage an extra operating system, which means extra inventory, patching, antivirus software, and so on. However, MED-V can be managed with the same tools that you are managing the MED-V host with, as an example you can patch the MED-V workspace with Windows Server Update Services (WSUS), as described in Appendix 5: Updating Using Windows Server Update Services. MED-V does not work on a virtualized operating system through virtualized desktop infrastructure (VDI). VDI clients are already virtual, so they cannot host a virtual instance. This means that if you are using VDI for user desktops, you cannot host MED-V. How to Deploy and Configure MED-V Instructions for deploying and configuring MED-V can be found at MED-V Deployment and Configuration on TechNet. Following is a summary of the high-level steps:
1. Install and configure the MED-V Server component. 2. Configure the Image Web Distribution Server. 3. Install MED-V Client and MED-V Management Console. 4. Create Virtual PC Image for MED-V. 5. Create MED-V Workspace. 6. Test, pack, and upload Virtual PC Image. 7. Create and configure MED-V policy. 8. Test Internet Explorer access from client workstation.

Also see the MED-V Quick Start Guide and the Microsoft Enterprise Desktop Virtualization (MED-V) Administration Video Series. How to Define Internet Explorer 6 or Internet Explorer 7 URL Redirection with MED-V A core function of MED-V is to redirect a URL from Internet Explorer 8 on a MED-V host to Internet Explorer 6 or Internet Explorer 7 on the guest, allowing companies to move to Windows 7. This is done by configuring a policy in the MED-V Management Console where it is then applied to MED-V users throughout the company. MED-V policy dictates the who, what, and how of applications who will receive the policy, what applications or websites they will see or be redirected to, and how those will be seen by the user. In the case of redirecting websites, an administrator defines which sites should be redirected to the guest and what happens when the user types or selects a different site in the guest. The user simply interacts

OS Lab manual

with the browser they are presented with, and the MED-V policy defined by the administrator manages the users experience. The following screen shot shows a sample MED-V policy configuration in the MED-V Management Console, which can be used to publish Internet Explorer 6 to the host operating system. A workspace is defined and assigned to users (see the left pane for Workspaces in the following screenshot), and then the administrator can define what applications can be seen on the MED-V host from the MED-V workspace. This is done by selecting the applications tab and identifying the shortcuts that will be created on the MEDV host. In the published applications section, a shortcut to Internet Explorer 6 has been created, which allows the user to seamlessly launch Internet Explorer6 from the MED-V host. Publishing this shortcut is optional for automatic redirection but it demonstrates how any applications from the guest can be published to the host.

Figure 2. Applications tab. The following screen shot shows a sample MED-V policy configuration, which redirects all guest browser requests for http://site1 to the MED-V Internet Explorer instance. An administrator can define a domain name or an IP address that will be redirected automatically from the MED-V host to the guest. Other features include the ability to force all other URLs browsed in the guest to be automatically redirected to the MED-V host as well as any mailto links. MED-V identifies the correct browser to deliver the content based on the MED-V policy.

OS Lab manual

Web tab.

12. Introduction to sky drive and windows live mesh.


Windows Live Mesh

Windows Live Mesh

OS Lab manual

Windows Live Mesh

Developer(s)

Microsoft

Stable 2011 (15.4.3555.0308 Win, release 15.4.5726.23 Mac) / March 22, 2012; 16 months ago

Operating system Windows (XP and later) andMac OS X (Intel Only)

Type

File sharing

Website

explore.live.com/windowmesh s-live-

Windows Live Mesh Windows Live Mesh (formerly known as Live Mesh, Windows Live Sync, and Windows Live FolderShare) was a free-to-use Internet-based file synchronization application byMicrosoft designed to allow files and folders between two or more computers be in sync with each other on Windows (Vista and later) and Mac OS X (v. 10.5 Leopard and later, Intel processors only) computers or the Web via SkyDrive.[1] Windows Live Mesh also enabled remote desktop access via the Internet. Access files in your Mesh online storage

OS Lab manual

Windows Live Mesh was retired on February 13, 2013, and remote desktop and peer-to-peer syncing have stopped working. If you still have Mesh installed on a computer, you might see the message, "Sorry, there is a problem with the Windows Live Mesh servers." If you still have files in your Mesh online storage (called Mesh synced storage or SkyDrive synced storage) make sure you have copies of them on your computer. On August 13, 2013, all files in Mesh online storage will be permanently deleted. Save copies of the files in your Mesh online storage The latest versions of your files should already be on your computer. But if you stopped syncing them on your computer before Mesh was retired, or if you uninstalledMesh, follow these steps to access your files:
1. Go to the temporary Synced folders page. (You need to use this special link because the

address has changed and other links wont work.)


2. Click View all synced folders. 3. Click a folder to view its contents. 4. Click each file to download it.

Skydrive SkyDrive (officially Microsoft SkyDrive, previously Windows Live SkyDriveand Windows Live Folders) is a file hosting service that allows users to upload and sync files to a cloud storage and then access them from a Web browser or their local device. It is part of the Windows Live range of online services and allows users to keep the files private, share them with contacts, or make the files public. Publicly shared files do not require a Microsoft account to access How to Use SkyDrive Edited by Codes for us, Aramanda, Kanhu, HaldirofLorien and 4 others 3 Article EditDiscuss Cloud computing means using off-site computer infrastructures that can be leased or freely used to provide for computer requirements of individuals and organisation. That infrastructure includes all resources of an in-site computer facility; that is, processors, physical memories (RAMs) and storages known as drives.

OS Lab manual

It helps, as is believed, to reduce costs of maintenance and upgrading of in-site facility lower on the idea of use it when you need and use it more when you need more. Moreover, you are not attached to your fixed IT fascilities and can have access to required resources on the go: on a variety mobile devices operating systems, and smartphones. One part of those resources, drives, comes to be more handy for individual users. Microsoft SkyDrive is among the most important ones. Steps 1. 1 Sign using your Microsoft account. o If you do not have an ID, one free will be offered to you to sign up and join. Just go to windows.live.com Windows Live

2. 2 Select your desired ID. In the next stage you have the option to choose your ID. o That could be at the "live dot", "outlook dot" or "hotmail dot" followed by your country URL extension. In the US it follows by "com" only.

OS Lab manual

3. 3 Follow simple procedure to finish getting your ID. o Now you are in your personal "outlook" page.

o Small dialogue shows finishing update. At any time you can launch SkyDrive by Clicking on "Open your SkyDrive folder."
4. 4

OS Lab manual

Look at the range of services available. Go to top left corner "Outlook" From the drop down menu select "Skydrive"

6. Observe that it immediately creates your sky drive on the cloud. You have place holder for your personal documents, pictures and public items. At the top there are options for creating on-line (that is, on-cloud) Office documents for productivity. Please also refer to Backup Your Important Files Using Hotmail SkyDrive. Click on the "Get SkyDrive apps"

OS Lab manual

7. Look at the different flavours of SkyDrive available for different devices. That helps you to have access to your cloud storage on the SkyDrive from different pieces of device you might use at any place. In the next stage click on "Download the desktop app."

8.

OS Lab manual

Look at the bottom of your Browser. Allow the install to "Run."

Installation proceeds.

9. Click on "Get Started" button. Fill the form according to your acquired Microsoft Account.

OS Lab manual

10. Note that the "cloud hard disk" has been installed on your computer. There is no need to change its location on a safer place in your computer. No failure on your computer will touch that drive; except that you delete its content.

OS Lab manual

11. Click on "Next" button Update your other device pieces in sharing SkyDrive.

12. Click on "Done" button.

OS Lab manual

Your SkyDrive is on your device.

13. Click on the small caret on the quick launch. It shows the hidden icons; among them SkyDrive icon. Moving green line means SkyDrive being updated.

14. Utilize your SkyDrive for share and team work. Among your documents you have a place for "Public" files. Put some files there. Open the "Public" to see them. In the Demo picture, there are two files.

OS Lab manual

One is actually SkyDive executable file that you can download and run to install SkyDrive. In the demo it is shown to the reader that it is even possible to upload exe files in the SkyDrive. It is important for the team works to have such a capacity for beta testing and other purposes. Other file is just a notepad. It is a draft of this article to back it up. Select this one by ticking the box in front of its name. If you like to embed it in your Blog or other Internet pages click on "Embed" on the right side pane to get the embedding HTML code. If you like to share it, then click on "Share" in the right side panel.

15. Look at the widget that opens. It has different options. You can send an email as a link to this file. o You can post it to Facebook or Tweeter or LinkedIn. o Sharing link could allow people only "View" your file without being able to modify it. o Sharing link could allow both "View" and "Edit" of the file. Besides, being a "Public" file allows people to search it and if found through the Internet search engines to be viewed by the public. You can put your file in nonpublic folders if you want it to be of access of you-only or you and your teamonly.

OS Lab manual

o For any reason, you can shorten the link address to be more digestable, by clicking on the "Shorten" button. You can put that address in your browser right now and find out a draft of this article.

Hotfix A hotfix or Quick Fix Engineering update (QFE update) is a single, cumulative package that includes information (often in the form of one or more files) that is used to address a problem in a software product (i.e. a software bug).[1] Typically, hotfixes are made to address a specific customer situation and may not be distributed outside the customer organization. The term hotfix was originally applied to software patches that were applied to live (i.e. still running) systems. Similar use of the terms can be seen in hot swappabledisk drives. The more recent usage of the term is likely due to software vendors making a distinction between a hotfix and a patch. How to Install Microsoft Hotfixes & Updates Installing Windows updates are an important part of keeping your computer safe. Windows updates allow you to pick and choose updates you want to install on your computer. These updates

OS Lab manual

can include fixes to software vulnerabilities, new Windows and program features, and hardware updates. Windows XP uses the Windows Update website, while Windows Vista and Windows 7 utilize a built-in updating feature. Whether you have XP, Vista or Windows 7, you must keep your system updated using Windows Update if you want to keep your computer safe from malware and other attacks. steps: Windows Vista/Windows 7 Click the Start menu button at the bottom of the screen. Click Control Panel. Select Check for updates under Security. View your high-priority and optional updates. Click the View available updates link to view the high-priority and optional updates available for download. Click the boxes next to each update you want to install. This allows Windows to know which ones you want to proceed with installing. Click Install at the bottom of the window to begin the download and installation process. Follow any onscreen instructions that may appear.

13. Implementation of FCFS (First Come First Serve) scheduling algorithm


Scheduling Algorithms: Scheduling: - CPU scheduling is defined as the process of moving the processes from job pool to the main memory. Scheduling Criteria: -

1. CPU-utilization: - Keep the CPU and other resources as busy as possible. 2. Throughput: - No. of processes that complete their execution per unit time. 3. Turnaround time: - It is defined as the amount of time to execute a particular process from
its entry time.

4. Waiting time: - It is defined as the amount of time a process has been waiting in the ready
queue.

5. Response time: - It is defined as the amount of time it takes from when a request was
submitted until the first response is produced but not output is known as the response time. Different scheduling algorithms: -

OS Lab manual

Scheduling algorithms are mainly divided into two main types: -

1. Non-preemptive scheduling algorithms: - Once the CPU is given to a process it cannot be


preempted until it completes its CPU-burst.

2. Preemptive scheduling algorithms: - If a new CPU process arrives with CPU burst length
less than the remaining time of current executing processes preempt.

First come first serve (FCFS) scheduling algorithm: - With this scheme the process that requests the CPU first is allocated the CPU first. The implementation of the FCFS policy is easily managed with the FIFO queue. When a process enters the ready queue, its PCB is linked onto the tail of the queue. When the CPU is free, it is allocated to the process at the head of the queue. The running process is then removed from the queue. The code for FCFS is simple to write and understand.

Example: Process P1 P2 P3 24 3 3 Burst Time

Now ganntt chart for this is as: P1 0 Waiting time of process P1 = 0. Waiting time of process P2 = 24. Waiting time of process P3 = 27. 24

P2 27

P3 30

OS Lab manual

Now Average Waiting time of all the processes = (0+24+27)/3 = 17 ms. ________________________________________________________________ Write a program in C++ to implement FCFS scheduling algorithm. #include<iostream.h> #include<conio.h> void main() { clrscr(); int bu[20],n,i; float twt=0.0,awt,wt[10]; cout<<"Enter the number of processes:"<<endl; cin>>n; cout<<"Enter the burst time of each process:"<<endl; for(i=1;i<=n;i++) { cin>>bu[i]; } for(i=1;i<=n;i++) { cout<<"The burst time of process P"<<i<<" ="<<bu[i]<<endl; } cout<<endl; wt[1]=0; cout<<"The waiting time of process P1 ="<<wt[1]<<endl; for(i=2;i<=n;i++) { wt[i]=bu[i-1]+wt[i-1]; cout<<"The waiting time of process P"<<i<<" ="<<wt[i]<<endl; twt=twt+wt[i]; } cout<<endl; cout<<"The total waiting time of the processes is ="<<twt<<endl; awt=twt/n; cout<<"The average time of process is ="<<awt<<endl; getch(); } _________________________________________________________________ Output of the above program: -

OS Lab manual

________________________________________________________________

14. Implementation of SJF (Shortest Job First) scheduling algorithm.


Shortest Job first (SJF) scheduling: - It associates with each process the length of the processs next CPU burst. When CPU is available, it is assigned to the process that has the smallest next CPU burst. If the next CPU burst of the two processes are the same, FCFS scheduling is used to break the tie. A more appropriate term for this scheduling method would be the shortest-nextCPU-burst algorithm, because scheduling depends on the length of the next CPU burst of a process rather than its total length. Example: Process Burst time

OS Lab manual

P1 P2 P3 P4 Now gantt chart is as: P4 P1 0 3 9

6 8 7 3

P3 16

P2 24

Waiting time of process P1 = 3 Waiting time of process P2 = 16 Waiting time of process P3 = 9 Waiting time of process P4 = 0

Now average waiting time = (3+16+9+0)/4 = 10.25 ms. __________________________________________________________________ Write a program in C++ to implement shortest-job-first scheduling. #include<iostream.h> #include<conio.h> void main() { clrscr(); int bu[10],n,i,j; char c[10]; float twt=0.0,awt,wt[10]; cout<<"\tEnter the number of processes:"<<endl<<"\t"; cin>>n; cout<<endl; cout<<"\tEnter the name of the processes:"<<endl<<"\t"; for(i=1;i<=n;i++) { cin>>c[i]; cout<<"\t"; } for(i=1;i<=n;i++) { cout<<"Enter the burst time for process "<<c[i]<<" =\t"; cin>>bu[i]; cout<<endl; cout<<"\t"; } int temp,b[10],temp1; cout<<endl; for(i=1;i<=n;i++) { b[i]=bu[i];

OS Lab manual

cout<<"\tThe burst time for process "<<c[i]<<" =\t"<<b[i]<<endl; } cout<<endl; for(i=1;i<=n;i++) { j=i; whi le(b [j1]> b[j] && j>1) { temp=b[j]; b[j]=b[j-1]; b[j-1]=temp; temp1=c[j]; c[j]=c[j-1]; c[j-1]=temp1; j--; } } cout<<"\tNow the processes in the sotred order is as:"<<endl; for(i=1;i<=n;i++) { cout<<"\t"<<c[i]<<" =\t"<<b[i]; cout<<endl; } wt[1]=0; for(i=2;i<=n;i++) { wt[i]=wt[i-1]+b[i-1]; twt=twt+wt[i]; } awt=twt/n; for(i=1;i<=n;i++) { cout<<"\tThe waiting time of process "<<c[i]<<" =\t"<<wt[i]<<endl; } cout<<"\tThe average waiting time of all the processes is =\t"<<awt<<endl; getch(); } __________________________________________________________________ Output of the above program: -

OS Lab manual

__________________________________________________________________

15. Implementation of priority scheduling algorithm.


Priority Scheduling: - SJF is a special case of the general priority scheduling algorithm. A priority is associated with each process and the CPU is allocated to the process with the highest priority. Equal priority processes are scheduled in FCFS order. The larger the CPU burst the lower the priority and vice versa. Example: Process P1 P2 P3 10 1 2 Burst time 3 1 4 Priority

OS Lab manual

P4 P5

1 5

5 2

The ganntt chart is as: P2 P5 0 1 6

P1 16

P3 18

P4 19

Waiting time for process P2 = 0. Waiting time for process P5 = 1. Waiting time for process P1 = 6. Waiting time for process P3 = 16. Waiting time for process P4 = 18. Now average waiting time (0+1+6+16+18)/5 = 8.2 ms. __________________________________________________________________ Write a program in C++ to implement priority scheduling algorithm. #include<iostream.h> #include<conio.h> void main() { clrscr(); textmode(C4350); int bu[10],n,i,j,p[10]; char c[10]; float wt[10],twt=0.0,awt,temp,temp1,temp2; textbackground(4); cout<<"\t"; cprintf("\n********** Program for Priority scheduling Algorithm ********** "); textbackground(4); cout<<endl; cout<<"\tEnter the number of processes"<<endl; cout<<"\t = "; cin>>n; cout<<"\tEnter the name of the processes:"<<endl; for(i=1;i<=n;i++) { cout<<"\t"; cin>>c[i]; } for(i=1;i<=n;i++) { cout<<"\tEnter the burst time of "<<c[i]<<" = "; cin>>bu[i]; } cout<<endl; for(i=1;i<=n;i++)

OS Lab manual

{ cout<<"\t"; cout<<"Enter the priority of "<<c[i]<<" = "; cin>>p[i]; } cout<<endl; cout<<"\tProcess Data is as:"<<endl; cout<<endl; cout<<"\t"<<"Name"<<"\t"<<"Burst Time"<<"\t"<<"Priority"<<endl; for(i=1;i<=n;i++) { cout<<"\t"<<c[i]<<"\t"<<bu[i]<<" \t"<<p[i]; cout<<endl; } for(i=1;i<=n;i++) { j=i; while(p[j-1]>p[j] && j>1) { temp=p[j]; p[j]=p[j-1]; p[j-1]=temp; temp1=c[j]; c[j]=c[j-1]; c[j-1]=temp1; temp2=bu[j]; bu[j]=bu[j-1]; bu[j-1]=temp2; j--; }} cout<<endl; cout<<"\tNow the processes in the sotred order of their priorities is as:"<<endl; cout<<endl; cout<<"\t"<<"Name"<<"\t"<<"Burst Time"<<"\t"<<"Priority"<<endl; for(i=1;i<=n;i++) { cout<<" \t"<<c[i]<<" \t"<<bu[i]<<" \t"<<p[i]; cout<<endl; } cout<<endl; wt[1]=0; for(i=2;i<=n;i ++) { wt[i]=wt[i-1]+bu[i-1]; twt=twt+wt[i]; } awt=twt/n; for(i=1;i<=n;i++) { cout<<"\tThe waiting time of process "<<c[i]<<" =\t"<<wt[i]<<endl; } cout<<"\tThe average waiting time of all the processes is =\t"<<awt<<endl; getch(); } ________________________________________________________________ Output of the program is: -

OS Lab manual

__________________________________________________________________ Round Robin scheduling algorithm: - It is for time sharing systems. It is similar to FCFS but preemption is added to enable the system to switch between the processes. A small unit of time, called a time quantum or time slice is defined. The ready queue is treated as a circular queue. The CPU scheduler goes around the ready queue allocating the CPU to each process for a time interval of upto 1 time quantum. Example: - Given time quantum is = 4 ms. Process P1 P2 P3 24 3 3 Burst Time

Now ganntt chart is as: P1 P2 0 4 7

P3 10

P1 14

P1 18

P1 22

P1

P1 26 30

Waiting time of process P1 = (10-4) = 6 ms.

OS Lab manual

Waiting time of process P2 = 4 ms. Waiting time of process P3 = 7 ms.

Now average waiting time is (6+4+7)/3 = 5.66 ms.

16. Implementation of Round Robin scheduling algorithm.


Write a program in C++ to implement Round Robin scheduling. #include<iostream.h> #include<conio.h> void main() { clrscr(); textmode(C4350); textbackground(4); cout<<"\t"; cprintf("\n***** Program for Round Robin scheduling Algorithm ***** "); textbackground(4); int i,j,tq,k,B[10],Rrobin[10][10],count[10]; int n,Bu[20]; float Twt,Awt,A[10],Wt[10],w; int max=0; int m; Twt=0.0; cout<<endl; cout<<endl; textbackground(4); cout<<"\t"; cprintf("Enter the no of processes:"); cin>>n; for(i=1;i<=n;i++) { cout<<"\tEnter The BurstTime for Process P"<<i<<"= "; cout<<"\t"; cin>>Bu[i]; } for(i=1;i<=n;i++) { B[i]=Bu[i]; textbackground(4); cout<<"\tBurst time for process P"<<i<<"= "; cout<<B[i]; cout<<endl; if(max<B[i]) max=B[i]; Wt[i]=0; } cout<<endl; cout<<"\t"; cprintf("Enter the Time Quantum"); cout<<endl; cout<<"\t"; cin>>tq; cout<<endl; m=max/tq+1; cout<<endl;

OS Lab manual

for(i=1;i<=n;i++) { for(j=1;j<=m;j++) { Rrobin[i][j]=0; } } i=1; while(i<=n) { j=1; while(B[i]>0) { if(B[i]>=tq) { B[i]=B[i]-tq; Rrobin[i][j]=tq; j++; } else { Rrobin[i][j]=B[i]; B[i]=0; j++; } } count[i]=j-1; i++; } textbackground(4); cout<<"\t"; cprintf("Display"); cout<<endl; for(i=1;i<=n;i++) { for(j=1;j<=m;j++) { cout<<"Rr["<<i<<","<<j<<"]="<<Rrobin[i][j]; cout<<" "; } cout<<"" ; } int x=1; i=1; while(x<=n) { for(int a=1;a<x;a++) { Wt[x]=Wt[x]+Rrobin[a][i]; } i=1; int z=x; j=count[z]; k=1; while(k<=j-1) { if(i==n+1) { i=1; k++; } else { if(i!=z )

OS Lab manual

{ Wt[z]=Wt[z]+Rrobin[i][k]; } i++; } } x++; } cout<<endl; for(i=1;i<=n;i++) { textbackground(4); cout<<"\t"; cprintf("Weighting Time for process P"); cout<<i<<"="<<Wt[i]<<endl; cout<<endl; } for(i=1;i<=n;i++) { Twt=Twt+Wt[i]; } Awt=Twt/n; textbackground(4); cout<<"\t"; cprintf("Total Weighting Time="); cout<<Twt; cout<<endl; cout<<endl; cout<<"\t"; cprintf("Average Weighting Time="); cout<<Awt<<""; cout<<endl; getch(); } Output of the above program: -

OS Lab manual

Das könnte Ihnen auch gefallen