StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Operating System of Microsoft - Term Paper Example

Cite this document
Summary
The paper "The Operating System of Microsoft" describes that the recovery of such information becomes a critical element of concern for the involved parties. This feature remains significantly relevant to the legal department owing to the information contained and generated within the department…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.6% of users find it useful
The Operating System of Microsoft
Read Text Preview

Extract of sample "The Operating System of Microsoft"

?Windows 7 vs. Vista Grade 29th Feb, Windows 7 vs. Vista Windows 7 remains the most current version of operating systems released by the Microsoft Corporation. The operating system was meant to provide an upgrade of Windows Vista, its predecessor. The application of Windows 7 remains similar to the predecessor in terms of compatibility in machines. An essential upgrade from Vista to Windows 7 would not include changes in hardware configuration, as the new version remains fully compatible with the predecessor’s hardware requirements (Microsoft, 2012). An installation of Windows 7 would become an upgrade, as the Windows version was essentially released to upgrade the previous version. Upgrading the existing system would include installation of Windows 7. This upgrade would provide improved functioning of the existing features through the performance improvements included in the new Windows version. These features allow computers to perform numerous functions previously unavailable in the other Microsoft operating systems. Installation of Windows 7 would also include upgrading the server system through the installation of a compatible system in the server. The Windows server 2008 R2 could be identified as the best option for the server. The Microsoft Corporation released this server system as a counterpart for Windows 7 (Microsoft, 2012). These systems function in extreme uniformity once installed together, allowing quick access to company servers from the personal computers. Compatibility of these two systems remains essential in enabling ad creasing efficiency of the entire system. This server system would significantly improve the capability of the installed operating system to access the company server. This server system becomes essential when using Windows 7 in ensuring proper functionality for the operating system. The system requires hardware configuration similar to those of the preceding versions released. The fundamental aspect of the system remains the capability to allow easy document sharing. The system image could be defined as the capability for a computer system to shut and return to the same state when restarted. This remains one of the essential changes present in the Windows 7 version, integrating the capability to hibernate computers. The new version presents systems with the ability to store information in volatile memories essentially allowing creation of system images. The proposed Windows version comes with the capability to hibernate, therefore, allowing the capability to operate the computers in energy saving modes. This feature remains critical in reducing the energy consumption of the entire company (Pogue, October 21, 2009). The system image feature becomes essential in allowing off-line operating system debugging. The operating system with the capability to create system images, allows the computer to return to operational mode immediately, upon command. This feature could assist the department in minimizing incidents of losing critical data, stored within the departmental computers. The creation of a system image remains a feature available only in this version of Microsoft windows. Windows 7 allows the user to create system images, enabling the mounting of system drives that cannot be modified. The system images allow performing of various actions aimed at recovering system information regarding the operating system. Microsoft Corporation introduced this feature when launching Windows 7, making the operating system the first Microsoft windows with the capability to mount system image independently. The inclusion of the system image significantly improves the capability to avail system backup, which could become critical in recovering lost system information. The operating system allows launching of this feature from different media including optical disks. Creating a system image during the first installation could enable the launching of the image from the computer hard disk. The hardware requirements for Windows 7 remain similar to those of Windows Vista, though the operating system contains improved features within the applications. While all applications remain the same with those available in Windows Vista, the Windows media player feature has been replaced with the Windows media center. The functioning of the Windows media center requires different hardware configuration. The feature requires installation of a TV tuner to enable recording and receiving of TV. The operating system requires a minimum of 15 gigabytes of hard disk space to install fully. Numerous applications have also been included within the new operating system, improving the operation of the current system. The action center enhances security for the computer and provides a mode for securing information (Vacca, 2009). The legal files contained in departmental computers would be entirely protected. The operating system allows creation of local network that could essentially improve information sharing within the department. The operating system integrates the latest version of Internet Explorer provided by Microsoft Corporation. The version comes with enhanced features for internet connections. This could essentially become critical in the communication of legal issues between Contoso and the clients. The latest Internet Explorer version remains compatible with other graphical web browsers. The newest version of Internet Explorer only runs on Windows 7(Keizer, 2011). This web browser supports auto correction of documents being written, making the installation of Windows 7 necessary within the department. Auto correction remains essential in editing documents and clearing any critical writing mistakes present. Internet Explorer 10 remains the first and only available web browser with auto correcting capability. This feature could significantly enhance the communication between clients and company officials through emails. Communication between the different company offices could be enhanced through a network connection between the various offices. The operating system also supports virtual private networks, which could be utilized to enhance the connection between the head office and regional offices. This networking could be utilized in long distance connections allowing regional offices to share and access documents and folders from the head office (Keizer, 2011). The efficiency created by this network would ensure protection of company information through using a single server, located at the head office. Since the company operates from different locations, availing information in these locations remains fundamental to proper service delivery to the clients. Different office locations could access information contained in the company’s server once the virtual private network becomes functional. Utilizing a single server, accessible through a secure network, could significantly enhance security of information as protection can be installed from a single location. Securing company information remains critical in protecting information loss and unauthorized access. Resource access allows for the limitation of access into classified company information. The operating system comes with the capability to include security codes when saving personal documents, therefore, protecting the document from unauthorized access (Comer, 2009). The system also includes a logging access controlling the ability to edit any information stored within the computer. Minimizing access becomes essential in creating a secure information storage facility. The information contained within the legal department remains critical for operations of the company. Protection of this information, therefore, remains essential, and installation of Windows 7 could provide the desired information protection. The operating system provides for creation of passwords in securing private information. Passwords could become an essential aspect of data protection through limiting access to information, by requiring authorization password. This feature could significantly enhance information security as the various passwords remain known only to persons authorized to access the information. Windows 7 enterprise edition, suitable for companies, contains Bit Locker drive encryption that provides protection for large volumes of data (Microsoft, 2012). The encryption contained in Windows 7comes with the capability to encrypt removable devices like USB among others. This protection allows protection of machines for information contained in removable devices. Essentially, such protection could protect malicious information, from removable devices, being included within the documents contained in a computer. The operating system could be installed in laptops and other mobile devices enabling mobile computing. The capability to be utilized in mobile devices remains essential in allowing access of information from different points. The operating system remains compatible with various smartphones with abilities to perform numerous tasks including connecting the internet. This feature could essentially create a mobile connection between the various individuals working in the legal department. Mobile computing could improve the data access within the department, through availing all departmental files in different places outside the company premises. This would improve the efficacy of field officers in delivering necessary information and files to clients. Through the mobile computing feature, the officers could also access updated information from the company database (Poslad, 2009). Various portable devices including Personal Digital Assistants among others could be installed with Windows phone. This operating system functions similar to Windows 7 for personal computers and remains compatible with the Windows features. The virtual private network also comes with a mobile version of the network. This network remains compatible with different portable, mobile devices including smart-phones. Since Windows 7 comes with a phone version, the utilization of the phone version could immensely enhance information accessibility from remote locations. Field officers could be equipped with smart-phones, allowing access to required documents from the company servers. As opposed to laptops, iPhones have the capability to access several IP addresses without losing information in other applications. These devices can also connect to the internet while moving. This enhancement would significantly improve mobile computing for the field officers. The system contains features for securing, and maintaining the computer hardware systems in the Windows action center. This feature allows the checking of computer hardware configuration and provides users with information regarding malfunctioning of any hardware. Connection to the Microsoft website provides constant updates to maintain the system in the best working conditions. This updating remains critical in ensuring the system remains compatible with the most current technologies. The updated versions remain compatible with all previous versions ensuring the company system can decode information received from different sources. This becomes essential when information needs to be shared with clients, who might not be using a similar system. The operating system comes with different versions of providing information regarding changes within the boost system. The transparent encryption mode of windows 7 could detect unauthorized changes into the booting setup of machines. Detection of unauthorized changes prompts the bitlocker to request for a recovery password or recovery key. These two elements remain critical cryptographic secrets known only by authorized persons. The Microsoft Corporation provides the essential information for decrypting information volumes within computers installed with Windows 7. The presence of this feature within the operating system remains critical in enhancing security for the personal computers. This feature remains fundamental in ensuring that unauthorized persons do not include changes into the hardware configurations, hence providing sufficient hardware protection. These features remain only available in the ultimate and enterprise versions of Windows 7. Virtual hard disk formats, supported by Windows 7, allow for the creation of backup memory for information. The operating system fully supports the various file formats of this nature (Warman, October 20, 2009). Backups remain critical in incidents abrupt power interruption. During these incidents, critical data might be lost from the computer. Recovery of such information becomes a key element of concern for the involved parties. This feature remains significantly relevant to the legal department owing to the information contained and generated within the department. This feature could assist the department in minimizing loss of information from unexpected occurrences. Windows 7 comes with the capability to recovery elements of the operating system information that might be accidentally altered. The operating system features windows recovery environment, a tool for diagnosing and repairing system errors preventing the booting process. This recovery remains essential in allowing constant access to information stored within personal computers. This feature has been significantly improved in Windows 7 and presents different recovery options within the operating system. The recovery performed by the system, retains the information contained within the storage devices of the computers. The system restore feature allows the operating system to restore all components of the computer to a desired previous state. The various recovery features significantly improve the capability for computers installed with Windows 7 to retain relevant information. These features ultimately offer data security through allowing recovery following accidental or malicious information altering. References Comer, D. (2009). Computer networks and internets. New Jersey: Prentice Hall. Keizer, G. (2011). Windows Vista: No IE10 for you. Computerworld. Microsoft, C. (2012). Windows 7 home?. Retrieved February 16, 2012, from http://Windows.microsoft.com/en-US/Windows7/products/home Pogue, D. (October 21, 2009). Windows 7 Keeps the Good, Tries to Fix Flaws. New York Times. Poslad, S. (2009). Ubiquitous Computing: Smart Devices, Environments and Interactions. Chichester, West Sussex: John Wiley & Sons Ltd. Vacca, J. R. (2009). Computer and information security handbook. Burlington: Morgan Kaufmann Publishers. Warman, M. (October 20, 2009). Microsoft Windows 7 review. The Daily Telegraph (London). Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Contoso Legal Department and Client Term Paper Example | Topics and Well Written Essays - 1000 words”, n.d.)
Contoso Legal Department and Client Term Paper Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/information-technology/1442648-contoso-legal-department-and-client
(Contoso Legal Department and Client Term Paper Example | Topics and Well Written Essays - 1000 Words)
Contoso Legal Department and Client Term Paper Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/information-technology/1442648-contoso-legal-department-and-client.
“Contoso Legal Department and Client Term Paper Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/information-technology/1442648-contoso-legal-department-and-client.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Operating System of Microsoft

The Common Vulnerability in the Microsoft Windows Operating System

The first thing that needs to be done in mitigating this exploit is to identify whether the operating system does belong to the versions which are vulnerable.... The paper "The Common Vulnerability in the Microsoft Windows operating system" states that the technical specifications of the process undergone for this exploit have been discussed and several mitigation options that were successful in terminating this exploit have been entertained.... Microsoft Security Bulletin MS03-026 2003) The report details about the technical specifications of the vulnerability, its severity level if it is exploited in a Windows operating system, the methods, and details about how it is exploited, and the consequences that it could lead to a system....
10 Pages (2500 words) Coursework

Non-Microsoft Desktop Operating System

From the paper "Non-Microsoft Desktop operating system" it is clear that the year 1986 marked the introduction of IBM AIX in the market amidst the notion that it was a hybrid system.... Even though it offers a non-Microsoft operating system, the UNIX system has always maintained its customers because of its services.... Most people shifted from the Microsoft operating system during this phase when the UNIX system was associated with the launching of the internet and the World Wide Web....
4 Pages (1000 words) Research Paper

Microsoft Windows operating system

the operating system is such a product which the consumer feels like updating whenever a new variant is around.... But in case of the operating system this condition doesn't seem to be arising in the near future, for the want of regular updation by the consumer and the rapid advancements taking place in the technology field.... ut in case of microsoft operating the market is totally dominated by Microsoft.... he price elasticity, ep = (Proportionate change in the quantity demanded) / (Proportionate change in price)Now in case of microsoft it can be said that, if we treat PCs as a single homogeneous commodity, then Microsoft's pricing of Windows was 'not' consistent with its status of a monopoly over personal computer (PC) operating systems....
2 Pages (500 words) Essay

Earliest Microsoft Operating Systems

Rowland Hanson, marketing head of microsoft suggested that Windows would be a very appealing name to the customer when compared to 'Interface Manager', which was supposed to be its name.... n the 9th of December 1987, the second version of microsoft Windows 2.... was rather an operating environment than a complete operating system; it extended MS-DOS and shared the intrinsic problems and flaws of the latter.... The paper "Earliest microsoft Operating Systems" discusses that the Windows Server 2008 will be built to ship only 64-bit....
7 Pages (1750 words) Coursework

Window Server 2012

Moreover, different domain models have been created by Microsoft that finds applicability to a platform depending on the version of server operating system installed within it.... Since in the case of Shiv LLC the considered version of server operating system is Windows Server 2012, thus two specific categories of domain models can be found applicable in this context.... Thus, this proposal will mostly remain focused towards understanding the aspect regarding how Windows Server 2012 can be implemented within the areas of active directory, group policy setup, domain naming system (DNS), file services, remote services and windows server update services (WSUS) in order to reinforce the functionality of Shiv LLC....
8 Pages (2000 words) Research Proposal

Microsoft: Vista Operating Systems

The paper "Microsoft: Vista Operating Systems" explores Vista as a Windows operating system used in many personal computers, tablets, laptops, office computers, and desktops.... It cost the company long working hours and much finances in developing the windows operating system.... Through research, Vista Windows operating system has been competing internationally due to the globally increased market (Lambert & Cox, 2007).... Due to this, the prices of the Vista operating system could have been very high....
4 Pages (1000 words) Essay

The Performance Objectives of Microsoft

This has, however, more to do with the competition where other smaller companies are reaching out to the clientele base with products that don't need to be licensed since their revenue generation base differs from that of microsoft.... This has, however, more to do with the competition where other smaller companies are reaching out to the clientele base with products that don't need to be licensed since their revenue generation base differs from that of microsoft....
8 Pages (2000 words) Case Study

Development Of Microsoft Windows Operating Systems

This 'software bloat' of the operating system drained battery life on laptops much more quickly than computers running on XP.... If Microsoft adheres to the three-year timeline they set for the software's development, then the operating system will be released for retail in the second half of 2009, not even two years after the retail release of Windows Vista.... The writer of the paper "Development of microsoft Windows Operating Systems" analyzes modern versions of Windows that came after MS-DOS, their advantages and disadvantages....
8 Pages (2000 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us