StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Installation and Configuration of an Operating System - Report Example

Cite this document
Summary
The operating system is a program that operates on a computer. The operating system does essential tasks such as sending information to the monitor, keeping track of information on the disk, recognizing any input to the computer from the keyboard and controlling printers and disk drivers…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.9% of users find it useful
Installation and Configuration of an Operating System
Read Text Preview

Extract of sample "Installation and Configuration of an Operating System"

Installation and Configuration of an Operating System Installation and Configuration of an Operating System The operating system is a program that operates on a computer. Operating system does essential tasks such as sending information to the monitor, keeping tracks of information on the disk, recognizing any input to the computer from the keyboard and controlling printers and disk drivers (Skandier, 2007). The operating system can be used to secure the information put into a computer where unauthorized users cannot access. There are various categories of the operating system including multi-user, multiprocessing, multi-reading, real-time and multitasking. Operating systems are usually installed in computers by professions who follow certain procedures as discussed in the paper. Basic operating system monitoring tools are classified into log-based tools and real-time tools. The significance of monitoring tools is to assist the computer in making the decision to the system, fix systems and processes, managing resources in the system and examining systems. Real-time tools measure the present system state and updates about the performance of the operating system. The tools depend on system calls where they extract information concerning performance readings making it significance to the system performance. Changing the real-time tools is very difficult due to unavailability of OS source code. The real-time tools mostly perform in UNIX and Windows systems. Process monitor, process explode, process viewer, performance monitor, and task manager are the real-time tools found in Windows (Morimoto, Lewis & Noel, 2006). UNIX tools comprise of process status, XOS view, treeps and top tools. There are five features in real time performance tools that every tool should exhibit. The graphical user interface is the first feature that shows whether the real-time tool has command-line interface or graphical user interface. The second feature helps in indicating whether the tool is capable of updating its measurements at a certain rate or it should be updated manually. The third characteristic typically shows whether the real-time tool allows controlling of monitored processes and ability to change priorities and exit processes (Morimoto, Lewis & Noel, 2006). Every real time tool should exhibit the measurements of process performance. The final characteristic that every tool should exhibit is showing system performance. Log-based tools record the performance information meant for analyzing, post-processing and finding trends in the operating system. Performance Alerts and Logs are the commonly used in Windows. Performance Alerts and Logs facilitate during logging data, selecting data and showing the sampling rate of logging data. The various log-based tools in Windows include event viewer and Event Log Service, Performance Data Log Service and Performance Alerts and Logs. System activity reporter and CPUstat are the only log-based tools found in UNIX. All the log-based tools should admit the given five features. Every log-based tool should indicate whether it has command-line interface or graphical user interface. The second feature is that every tool should show the adjustments of the rate of logging data. Thirdly, every tool should allow filtering of the logged data or predetermine the data (Skandier, 2007). The fourth feature allows scheduling of Log on when to commence and stop logging. The final characteristic involves producing tools that are compatible with other log-based tools for analyzing data. After discussing the tools used in the operating system, it is necessary to discuss installation and configuration of a new operating system. Determining the operating system to be installed, installation of a new operating system and installation of specific operating system are the three main categories of how to install and configure an OS. The first step is checking the requirements of the system (Andrews, 2014). It is advisable to install a newer performing operating system to older computer machines that can accommodate. For example, most Windows installations occupy a space of 1GB in the hard disk and Linux operating systems only require a smaller space as compared to that of Windows. The second thing is to make wise decisions on whether to download or purchase a new OS. I would prefer purchasing a new OS after researching and getting the best operating system of the office computer. The advantage of buying an operating system is because it is issued with an installation disc together with a product code. It is also flexible because installation can be done at home with no need of downloading or transferring keys that may harm the computer programs in case of viruses. The fifth step is to back up the data to prevent losing the office information previously stored in the computer (Andrews, 2014). It should be done before starting the installation by copying all important files to the external hard drive. There will be reinstallation of all programs since they cannot be easily transferred. The second main step involves starting installing the operating system. The installation will follow a certain order, for example, if Linux has to be installed it is advisable to install Windows first and Linux follows to allow booting. The disk should be installed in the drive and later reboot the computer. Some settings such as BIOS are adjusted for an effective booting. The common keys that should be used are F10, F12, F2, and Del/Delete. After selecting the appropriate drive, the changes are saved and later exit from the setup for the computer to reboot (Skandier, 2007). The setup program is waited to load because it copies some files from the computer before it continues. The keyboard layout and language are selected at this level. The product key of the operating system is entered in which some are put before installation and others after installation. Windows usually provide the option of performing or upgrading a Custom installation. It is preferable to choose performing Customs installation to minimize problems that may arise during installation. The next step is to format the partitions to clear the data and create unallocated space. The unallocated space is selected, and a hard drive partition is created if Windows is being installed (Skandier, 2007). The Linux options have to be set before starting the installation unlike in Windows where the users fill their personal information at the end of the installation. At this stage now the installation is at the end where the installation should be allowed to complete. Once the installation of Windows completes, a Window login is created together with a username where the product has to be put again. In Windows 8, the colors have to be customized first before choosing a Microsoft account or traditional Windows username. Finally, install programs and drivers (Skandier, 2007). The drivers should be modern and install an antivirus program that will secure computer from getting viruses from the internet or any other external source. The specific operating systems include Windows 7, Windows 8, Ubuntu, Mac OS X, Linux Mint and Fedora. Task Manager is a constituent of Microsoft Windows that assist administrators to effectively monitor, troubleshoot and manage Windows operating system tasks. Task manager as a monitoring tool, displays swap-file, the memory usage and performs data and representations of the CPU graphically. Networking details and disk are the modern Task Managers. The Task Manager helps the IT professionals in identifying bottlenecks in the system in case of a performance problem, therefore, playing the role of comprehensive troubleshooting tool. Task Manager performs as a management tool where it reports all Task Manager Processes and applications running in the windows system (Mueller, 2006). The data can be essential in identifying the malware software that could be found in the system. The administrators use the Task Manager to terminate processes and applications, set the affinity of the processor and alter processing priorities for preeminent performance. Conclusively, installation of a new operating system is not complicated unless the computer machine has the problem. The various operating systems can be found on the internet and in specific shops prepared by IT professions. The monitoring tools have both pros and cons in the operating system. For example, the process monitor is very simple to use and is the best to those who prefer to use commands. One con is that it is not most configurable. The installation of different operating systems depends on RAM and ROM of the computers and also the crucial tasks meant to perform. For example, the operating systems of computers in various offices differ depending on the task they perform. The Task Manger allows shut down or restarting the computer if unresponsive or busy and gives the lists of currently logged end users. References Andrews, J. (2014). A+ guide to managing and maintaining your PC. Australia: Course Technology. Morimoto, R., Lewis, A., & Noel, M. (2006). Microsoft Windows server 2003: Unleashed. Indianapolis, Indiana: Sams. Mueller, J. P. (2006). Microsoft® Windows® XP Power Optimization. Hoboken: John Wiley & Sons. Skandier, T. (2007). Cliffs Testprep Comptia A+. New York: Wiley. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Installation and Configuration of an Operating System Report Example | Topics and Well Written Essays - 1250 words, n.d.)
Installation and Configuration of an Operating System Report Example | Topics and Well Written Essays - 1250 words. https://studentshare.org/information-technology/1878557-operating-system-assessment
(Installation and Configuration of an Operating System Report Example | Topics and Well Written Essays - 1250 Words)
Installation and Configuration of an Operating System Report Example | Topics and Well Written Essays - 1250 Words. https://studentshare.org/information-technology/1878557-operating-system-assessment.
“Installation and Configuration of an Operating System Report Example | Topics and Well Written Essays - 1250 Words”. https://studentshare.org/information-technology/1878557-operating-system-assessment.
  • Cited: 0 times

CHECK THESE SAMPLES OF Installation and Configuration of an Operating System

Project Plan For Access Control System In a Dormitory

In the paper “Project Plan for Access Control system in Dormitory” the author presents his project that aims to install Access Control Systems in the dormitories of a small college.... It will provide the functionality of Visitor Management system integrated with Social Security Cards.... A configuration plan will be developed in order to customize/integrate the software application (Visitor Management system) with already/existing deployed software systems in the hostel....
3 Pages (750 words) Case Study

Midland Bank Call Center Installation

Server and client installation knowledge, including lining up with an existing network, create operating domains and allocating users to them for seamless operation, all require extensive technological and network management capabilities.... Major part of the installation exercise was to make sure that all the nodes get connected appropriately and configure all the users in the unit with clear rights to work on their areas.... erver and client installation: The implementation of this project was planned for five days at an important client location....
7 Pages (1750 words) Essay

Safety Elements in Aircraft Performance

The capacity of the braking system for absorption of airplane energy has limits imposed in the chart system wherever applicable.... The particular performance criteria studied is that of FAR25 with inclusion of conditions, configurations and operating modes.... The particular performance criteria studied is that of FAR25 with inclusion of conditions, configurations and operating modes.... , 2005)Note: It is noted that the manual points out that the weight limit charts within its ambit does not specify which of the above factors may limit weight under given operating conditions....
2 Pages (500 words) Essay

The Installation of an Operating System

The operating system setup to be Unattended Installation Unattended installation is an automated technology in installation of an operating system.... It is mainly used… During installation, the administrator or technician is required to have at least an operating system and answer file.... uring installation, the administrator or technician is required to have at least an operating system and answer file.... Therefore, the setup would not prompt the user for an action on installation and configuration; instructions on the answer file are followed....
1 Pages (250 words) Essay

Introduction to Operating Systems

Sometimes, important files get damaged affecting the working of an operating system.... One can use this type of intervention to install, as well as to upgrade an operating system. “This type of software is generally… Unattended installation makes use of an answer file to guide the windows setup program regarding installation of the operating system.... One can use this type of intervention to install, as well as to upgrade an operating system....
1 Pages (250 words) Assignment

Project Analysis and Planning in VMware

Resource and Management costs are reduced when businesses use a virtualized system.... Creating more room for physical computer servers in organizations is eliminated due to the fact that a virtualized system accumulates very little room as the system acts as one physical server for all computers in the organization....
15 Pages (3750 words) Essay

Reverting to Earlier Configuration File in Network Management

Reverting also allows the user to roll back to any Cisco operating system that is saved in the system.... Installation of a router would require that the system be shut down thus loss of running time, resources and increase in costs incurred during downtime.... he disadvantages of Reverting to an old system include the system continuing to work under limitations such as inefficiency that initially prompted the change.... Additionally, it is not economically sound to revert to an old system as that means loss of resources initially put into the project while Reverting the configuration change must be approved, which frequently results in delay thus loss of time and resources....
1 Pages (250 words) Essay

Components Needed for the Desired PC to Build

Furthermore, it is updated with the latest operating system and software that allows multiple user accounts.... The mini or mid-sized tower case is selected for the computer, so as to accommodate the maximum accessories and other extras attached to the system.... First, the harmonization of efficiencies of internal specifications will increase the speed of the system.... The unique specification of the Dell Optiplex 270 recommended will make all these functions smooth and ensure that the system never lapse during the course of such operations....
5 Pages (1250 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us