Top-Rated Free Essay
Preview

Computer Operating System Maintenance and Training Manuel

Good Essays
4325 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Operating System Maintenance and Training Manuel
Table of Contents

➢ Table of Contents……………………………………………….........................................2

➢ Introduction………………………………………………………………………………….....3

➢ Overview of Operating System

➢ Components and functions of operating systems………………………….........4-5

➢ Different versions of Windows…...………………………………………………....6

➢ Installation of Windows Operating Systems

➢ Procedures to install Windows………………………………………………………7

➢ Methods of supporting operating systems………………...……………………...8

➢ Possible concerns when installing and maintaining operating systems………..8

➢ Troubleshooting and Maintenance Issues for Operating Systems

➢ Troubleshooting techniques for operating system-related problems……………9-10

➢ Maintenance issues for operating systems…………..…………………………….11

➢ Upgrading an operating system compared with a clean installation…………....12

➢ Networking and Security of Operating Systems

➢ Networking in operating systems……………………………………………..........13

➢ Possible concerns when connecting an operating system to a network ..........14

➢ Security Features of Windows 2000, Windows XP and Windows Vista OS…...15

➢ Steps to secure modern Operating Systems.…………………………...…………16

➢ Personal Computers on the Internet

➢ Difference between Internet and Network Connections…….............................17

➢ Steps to connect a workstation to the Internet……………………………………..18

➢ Potential Problem and solutions when connecting an OS to Internet…………...19

➢ Legacy Operating Systems

➢ Features of older Operating Systems….…………………………………..............20

➢ Issues involved with supporting legacy Windows Operating Systems…………..21

➢ Support of older applications in current operating systems………………………22

➢ Conclusion……………………………………………………………………………………….23-24

Introduction

During this training guide, you will see important information provided regarding computer systems and all of the various operation systems extensively used in Datamax. The different segments in this manual will provide: specifics of the Windows operating system, (with more methods for setting up,) maintenance performance and help with troubleshooting situations. Alternate subjects which are in the manual are networking, security of operating systems and data regarding history or other, older operating systems. Information about operating systems entails information which describes the parts, and, the operations in the various operating systems. This part also includes useful information about many different versions of Windows.

The installation part describes Windows 2000, Windows XP and Windows Vista. The different ways of supporting these operating systems is included, and the information on how installations might be executed, if required. This guide also includes any extra info on the setting up and maintaining an OS. You will see a main concentration on the significance of networking and security while using an operating system. This part will involve particular problems for example security measures and the essential measures required to protect an operating system from probable risks or viruses.

Computer systems are widely used to link to the net. You will see Network information supplied on the variations between the two types of links. There will also be measures provided which will describe how to link a workstation to the net and how your computer will be protected, eventually, from possible network risks. Finally, a part will provide specifics of “legacy” or older operating systems, and, how to support these system types correctly. Information is also provided that regards several possible problems and older operating systems.

Overview of Operating Systems

Entails important information regarding different operating systems used here at Datamax. These types of operating systems incorporate Windows 2000, Windows XP and Windows Vista.

Components and functions of operating systems

The shell (Andrews) is a part of the Microsoft Windows graphical user interface. Control Panel allows people to see and adjust basic system settings and controls through applets for example; putting hardware, setting up and eliminating software, controls user accounts and changes several accessibility alternatives. Additional applets can always be around by means of third party software. The Control Panel is a special part of the Microsoft Windows operating system since its 1st release with several of the present applets added to later versions. Starting with Windows 95, the Control Panel is used like a special folder, even though the folder doesn't physically exist. The alternative entails techniques to various applets for example Add or Remove, (Install/Uninstall), Applications and Internet Options.

The kernel (Andrews) is the core part of nearly all computer operating systems; it's a connection between programs and the original data processing finished at hardware stage. The kernel's main duties include handling the system's resources and interaction between hardware and software parts. Generally, like a basic part for an operating system, a kernel might offer the lowest-level abstraction layer for the resources which application software should manage so as to fully execute its function.

The Device Manager (Andrews) is called the Control Panel applet in Microsoft Windows operating systems. It lets people to observe and manage the hardware together with the computer system. When a place of hardware isn't functioning correctly, the defective hardware is pointed out for the user’s consideration, so that they might know precisely where the problem lies. The set of hardware might be arranged by different criteria. The main work of the device manager is to help the user in finding any problems or may also be a helpful resource while troubleshooting.

The Windows Registry (Andrews) is actually an ordered database which holds configuration settings and, alternatives on Microsoft Windows operating systems. It requires different settings for low-level operating system parts and the programs operating on the platform: the kernel, device drivers, services, SAM, user interface and third party programs all use the Registry. The registry also provides a method to access counters for checking system performance.

Different versions of Windows

Windows 2000 is a series of operating systems created by Microsoft to use on several business desktops, laptops, and servers. It was launched on February 17, 2000 and was the successor to Windows NT 4.0. It's also the final launch of Microsoft Windows to display the "Windows NT" designation. It was initially succeeded by Windows XP, meant for desktop systems in October, 2001 and Windows Server 2003 for servers in April, 2003. Four versions of Windows 2000 were made public: Professional, Server, Advanced Server, and Datacenter Server.

Windows XP is an operating system created by Microsoft, meant for use on PC’s, including resident and business desktops, notebooks and other media centers. It was launched in 2001. The name "XP" is an acronym for "eXPerience." XP is the successor to both Windows 2000 Professional and Windows Me. It's the original, consumer-oriented, operating system to be created on the Windows NT kernel and design. Windows XP was launched on October 25, 2001.
Windows Vista is actually a series of operating systems which was created by Microsoft to work with home and office desktops, notebooks, tablet PCs, and media center PCs. Windows Vista entails many alternate changes, and, latest features and alternatives such as; an updated graphical user interface and visual style named Windows Aero, a revised search feature, multimedia tools for example Windows DVD Maker and a renovated networking, audio, print, and display sub-system version. Vista aim is to better the level of communication between devices on home networks, using sophisticated peer-to-peer technology so as to enable sharing files and digital media between computer systems and devices.

Installation of Windows Operating Systems

Procedures to install Windows

When a person is operating the Windows Setup application, they are needed to offer important data on the way to add and arrange the operating system. Very careful preparation can verify your set up of Windows to be more effective by assisting a person to avoid probable issues during set up. A clear knowledge of the configuration options will also help in making sure one has correctly designed their system.

You might set up Windows by means of many different techniques. All are valid and good but will clearly rely on an individual’s particular requirements and restrictions. Some software might be added by just copying it to a computer system and after that choosing it without additional activities, for example set up procedures, required. A few applications, however, might be provided in a form inappropriate for fast set up and require a step-by-step set up process. A few installations might require people to; unpack provided files which are in a shrunken type and copy them to a proper spot, alter the software to fit the hardware and arrange the user's preferences, provide information regarding the program to the operating system, and so on. The original installer can check for system viability and over-all mass storage space.

Some software was created to be added just by copying the files to a selected spot and, then, there aren't any set up procedures. Long ago, this was a normal practice for several different applications which were operating by way of MS-DOS, Mac OS, Atari TOS and AmigaOS. Previous versions of these operating systems are even now usual and, standard in Mac OS X programs and are used in different Windows programs. Versions of some operating systems, that don't need set up, do exist and can be operated straight from a bootable CD, DVD or USB drive without having any type of impact on other operating systems set up but not operating on the system.
Methods of supporting operating systems

Assist for file systems differ between latest operating systems, though there are lots of file systems that involve support and drivers for. Operating systems generally differ on file system support, and, the disk formats which they are installed on. Microsoft Windows presently covers NTFS(New Technology File System) and FAT(File Allocation Table) file systems, (incorporating FAT16 and FAT32,) together with network file systems which are shared with other computer systems and the ISO 9660 and UDF file systems which are originally used for CDs, DVDs, and optical discs such as Blu-ray. Every file system is generally restricted in use, in Windows, to particular media. CDs should utilize ISO 9660 or UDF, and Windows Vista NTFS is the only file system to which the operating system may be eventually installed on. Windows Included CE 6.0, Windows Vista Service Pack 1 and Windows Server 2008 cover ExFAT, or, a file system which is more effectively suited to flash drives.

Possible concerns when installing and maintaining operating systems

Microsoft supplies regular improvements for its operating systems although several other suppliers offer only regular patches to their software. It’s smart to make frequent checks for software improvements and patches which are generally launched for most computer systems which would really benefit from it. There are several activities which must be carried out on a constant basis to keep Windows running and file systems safe and operating at optimum efficiency:

❖ Provide virus safety. ❖ Throw out obsolete and unused files frequently and keep available space on hard drives which are used for virtual memory. ❖ Scan the storage media for issues and rectify any and all issues. ❖ Defragment the hard disk drives regularly. ❖ Prepare back-up files and keep updated recovery disks. ❖ Frequently check in for improvements and use them accordingly.

Troubleshooting and Maintenance Issues

Troubleshooting techniques for operating system-related problems

Keep Current

A good “rule of thumb” to accept, while executing software-related troubleshooting, is to be certain that you own the latest versions of the required programs, drivers and operating system. Usually, this means keeping a stock of any software and hardware that you might have included in your computer system and after that searching sites which belong to organizations that make these items. This is, obviously, to find any kind of improvements, patches, service packages and other types of bug solutions.

Spyware/Internet Pop-Ups

There are several internet “pop-ups” which are included in sites. This eventually implies that they happen if they are linked to the website which you are currently browsing. It is possible to avoid these types of pop-ups, but, they are rather an irritation and may be usually offensive. Some types of pop-ups happen irrespective of the website which you are viewing and can show up even if you aren't in the middle of exploring the net! These kinds of nuisances are due to a computer system getting “infected” with a type of virus referred to as spyware. (Andrews)

(Figure A) Shows a clear sign of some sort of virtumonde adware on a computer system.

DLL Error

Inside computer systems, there's a dynamic link library (DLL), or, an accumulation of minute applications to which any may be accessed when needed by a bigger application which is operating on the computer system. The smaller application which allows the bigger one to communicate with a particular device, for example a printer or scanner, is frequently called a DLL program. DLL files which back-up specific device operation are known as device drivers. (Figure B) [pic] (Figure B)
Maintenance issues for operating systems

Programs Crash Repeatedly

There are some routes which you might follow while experiencing one of your preferred alternatives consistently failed when using it:

Reboot

The program might be failing since the device is in bad condition. Restarting the computer system will make sure that, the next time that the program is used, the unit will be in a good condition.

Download Updates/Latest Version

You might be associated with a problem which the spyware manufacturer is already conscious of and has followed their initiative to use a repair for. By going to the software corporation's site, a person might search till they find the item update part. Download and abide by the page's set up instructions so as to correctly fix the program. Even if the organization doesn't appear to have the sufficient fix for the problem, they might keep a documented work-around so as to eventually fix the issue.

Upgrading an operating system compared with a clean installation

Upgrading an operating system

Turn on the power to the computer system and instantly enter the boot menu (it could take the install program a great deal of time to load.) As soon as loading is finish, observe the onscreen instructions. It’s quite probable that the installer might request information and facts while it's being installed, but for the most part, the waiting is not very bothersome. To the finish of the set up, the installer might request you for particular, last-minute, details.

Clean installation

Turn on the computer system and swiftly access the boot menu. Pick any key and navigate through the terms and conditions. Eliminate all the existing partitions. (Figure C)

[pic]
(Figure C)
Here is where the person decides between a clean install or an upgrade

Networking and Security of Operating Systems

Networking in Operating Systems

Network Operating Systems (NOS) are basically used, to drive computers which work like servers and provide the methods which are important for network operation. They were also developed for buyer computer systems and provide options which make the difference between network operating systems and stand alone operating systems much less clear. NOS offer the following activities; print and file sharing, account management for different people, safety and backing up information. Generally, NOS prove to be complete operating systems which involve job, task and file administration. In some instances however, (for example with numerous previous operating systems,) there was a separated part, that increased a normal, non-networking operating system by having these networking capabilities.

Possible Concerns While Connecting an OS to a Network

Cable Issue: It's possible that a wire which is being used to link different parts of a network might be cut or even shorted out. A short can take place when a wire conductor is joined with another surface which is also conductive; that adjusts the original route of the electric signal. Wire testers have been developed and are offered for use with different kinds of cable problems. These include; connector issues, cable shorts, interface levels, wrong cable use and broken wires.

Connection Issue: A connection problem might take place with a device in the network on changing the system settings or by a probable break down of a connection part, including; a switch, router or hub.

Software Issue: Network problems can, occasionally, be linked back to the program settings for example; the registry, WINS configuration, DNS configuration, and so on.

Security Features of Windows; 2000, XP and Vista Operating Systems

There are lots of security and safety characteristics which are relatively recent to Microsoft (MS) Windows and many of them are unavailable in any of the previous Windows operating system launches. In early 2002, Microsoft declared their “Trustworthy Computing Initiative,” that involved applying a good deal of effort for developing Window’s operating system to meet a level of security which exceeded their competitors. In the organization, Windows tailored to a “Security Development Lifecycle,” with the fundamental idea of “secure by development, secure by default and secure in arrangement.” Microsoft also created new coding for Vista which involved utilizing SDL style and any earlier code which existed was both analyzed and refigured so as to supply greatest security for customers. Specific locations where Windows has started these kinds of revolutionary safety and security improvements incorporate; parental handling, user account controlling, Network Access Protection, an integral malware tool and systems which defend from particular digital content. Instances are listed below:

Windows Defender: Microsoft’s best anti-spyware function. MS transformed the title from “Microsoft Anti-Spyware” since it now offers these kinds of characteristics as; system scanning for spyware (just like other free competition products) and “Real Time Security” agents which check many different aspects of Windows for any modifications which may have taken place because of spyware. These types of common areas incorporate; auto-start programs, system configuration configurations, Internet Explorer configurations and downloads and, any add-ons for example “Windows Shell” extensions.

Windows Updates: Security and software upgrading has been made easy since it is currently solely carried out through the control panel. The Windows Mail spam filter and Windows Defender definitions are automatically upgraded through Windows Update. People who finalize to stay with the suggested default for automatic improvements will have the latest drivers set up, available when they attach a latest device.

Windows Firewall: Advanced significantly so as to handle several issues related to the flexibility of Windows Firewall in a company atmosphere.

Steps to Secure Modern Operating Systems

The best way for a person to completely try to avoid harmful action is to effectively password defend any and all user accounts by having a firewall software. This software program or hardware part may prevent distant access to an individual’s computer system, and does so by closing down all slots leading to different data; until the original communication is arriving from inside the actual firewall itself, first. Setting up reliable and trustworthy antivirus software, (through an antivirus software program for example MacAfee or Norton Antivirus,) will also successfully avoid a person from viruses and for full protection; it is important to incorporate a spyware program for locating a removal tool. There are an uncountable quantity of individuals who have devoted a huge period of time and energy creating this kind of free software so as to get rid of or avoid harmful scenarios.

Personal Computers on the Internet

Differences between Internet and Network Connections

A “Network Operating System” (Andrews) is called an operating system which requires applications and parts which allow a person on a network to accept requests from alternate computer systems for information and provide access to given recourses for example file systems and printers.

❖ Include, control and take away users that try to use different resources on the network. ❖ Let users the entry to info on the network. This info is generally found on the server. ❖ Let users the entry to hardware which is linked to the network. ❖ Get information and services which is found on the network. ❖ Lets the person to give documents on the attached network.

A network operating system (NOS) incorporates different protocol stacks, and, device drivers for network hardware.

Internet Connection

An “Internet Connection” is described as a general method of unified computer networks which use the general “Internet Protocol Suite” (IPS) to serve billions of people throughout the world. An IPS is a huge network which is developed by several other networks composed of public and private, company, educational and government networks which are on a regional to international length which are adjoined to a wide range of optical and electric networking systems. The Internet gives a wide selection of information services and resources, (most significantly the inter-linked hypertext files of the “World Wide Web” (WWW) and the design which offers “Electronic Mail” (E-mail).

Steps to Connect a Workstation to the Internet

Step One: (Allowing networking on a workstation)-Connect to the router through your browser,

Step Two: Allow encryption on the access point,

Step Three: Program the router access security password,

Step Four: Modify the Service Set Identifier, (network identification or SSID,) from the computer system default to something unique, (something individually secret; name, birthday and so on.) Don't disable the “SSID Broadcast.”

Step Five: Lastly, turn off distant access and cordless administrating.

Potential problems and solutions when connecting an OS to the internet

Cable Issue: It's possible that a wire which is used to link different regions of a network might be cut and even shorted out. A short can take place if a wire conductor is joined with another surface which is also conductive; that changes the original route of the electric signal. Cable testers have been developed and are offered for use with different kinds of cable problems. These include; connector issues, cable shorts, interface levels, wrong wire use and broken wires.

Connection Issue: A connection problem might take place with a device in the network on changing the system settings or by a probable break down of a connection part, for example; a switch, router or hub.

Software Issue: Network problems may, occasionally, be linked back to the software settings for example; the registry, WINS settings, DNS settings, and so on.

Features of Older Model Operating Systems

Legacy Operating Systems

“Windows Fundamentals for Legacy PCs” (WinFLP) is actually a little client operating system from Microsoft which is based on “Windows XP Embedded” however increased for the benefit of older and less commanding hardware. WinFLP was made public during July of 2006 and wasn't promoted to be a whole and full-blown, normal OS; although it is able to carrying out a lot of the jobs which are commonly associated with one. It requires the particular efficiency for local workloads only, for example; administration, safety and relevant document observing jobs.

Issues involved with supporting Legacy Windows Operating Systems

WinFLP, as the title puts forward, entails a smaller set of features than that of a whole Windows XP set up. For example, program like “Outlook Express” isn't obtainable, even in the situation which requires a complete set up. There are also many system tools which are eliminated from WinFLP, although they aren't usually used elements and are seldom used; plus, they may be reinstated with free tools or probably with files from a full XP set up. Additionally, the operation system doesn't involve full support for terminal-based links. One more restriction proves to be the ultimate nonexistence of the Compatibility tab which would generally live in the properties section for executable files. WinFLP won't also normally supply many different programs; for example particular games or MSPaint. It does, however, contain the basic programs such as the calculator, WordPad and Notepad.

Support of Older Applications in Current Operating Systems

WinFLP is selectively accessible to Microsoft Software Assurance customers, as it was intended to be a less-expensive advancement option for organizations which include having several Windows9x computer systems, but lacks the hardware required in order to support the modern version of Windows. It can't be found available through stores or from OEM channels. For clients who use Legacy Microsoft items which aren't backed by MBSA 2.1, there is always Microsoft Update.

Conclusion

We have made it to the finish we have reviewed different important data regarding Windows Operating systems. At this point if the principle has been correctly, pursued people will be capable to set up, update, carry out repair and trouble-shooting problems, networking, safety of operating systems, and data relating to legacy and older operating systems.

Through this guide, we have covered some important descriptions that will allow people to be capable to start correct set up in operating systems. Below I have offered a few of those descriptions for rapid referrals.

Key Terms

Antivirus- is software utilized to avoid, find, and eliminate malware, including computer viruses, worms and Trojan horses.

Device Manager- Control Panel applet in Microsoft Windows operating systems. This permits users to see and manage the hardware linked to the computer system.

Firewall- is a component of a computer system or network which is developed to stop unauthorized access while allowing approved communications

Kernel- is the main part of computer operating systems actually the link between applications and the actual data processing carried out at the hardware stage.

Malware- harmful software, is software developed to covertly access a computer system without the owner's informed approval.

Network- is a set of computer systems and devices connected by communications means which help communications among users and permit users to share sources.

Operating System- software, composed of programs and data that operates on computer systems and controls the computer hardware and gives usual services for efficient performance of different application software.

Shell- piece of software which offers an interface for users of an operating system that provides entry to the services of a kernel.

Spyware- kind of malware which can be set up on computer systems and gathers little pieces of information simultaneously regarding users without their information.

Windows registry- database which saves configuration settings and options on Windows operating systems.

For further information and assistance, refer to
Andrews, J. (n.d.). A+ guide to managing and maintaining your pc (Adobe Digital Editions version), doi: 9781435429185

-----------------------
Make sure that all of the utilized cables are in the proper, functioning order and placed in such a manner that they are out of the way of traffic, pinch scenarios etc.

Use the “ping” or “path-ping” command-line tools to check regular connectivity. Apply ping command-line in order to segregate network hardware issues and incompatible configurations.

Be sure to properly update all of the given software accordingly.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    ISSC340 Week1Assignment

    • 286 Words
    • 1 Page

    2. Describe the function and characteristics of a network operating system (NOS). (Minimum word count: 100)…

    • 286 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    5. [3] Ten processes share a critical section implemented by using a semaphore x. Nine…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Place the hard drive into a case to make sure to fits into the dock bay then screw the hard into the case. After that place the case into the dock bay and screw down so it fall out. Then place the SATA or IDE cable into the hard drive and then plug the other end into the motherboard…

    • 322 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The reliance by companies of all sizes on information technology creates strong demand for system and network administration jobs. Information System majors will increasingly find themselves with opportunities and responsibilities in these areas. However, teaching operating systems and networking to information systems major presents many challenges. We have developed a model for teaching these topics to information systems majors in the context of operating system and network administration. This paper describes our model, the lecture materials used, and a novel lab configuration.…

    • 1732 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    IT TECHNICIAN

    • 425 Words
    • 2 Pages

    1. Dr Strong is a dentist who schedules all her patients for 30 minutes appointments. Some of the patients take more or less than 30 minutes depending upon the type of dental work to be done. The following table shows the various categories of work, their probabilities and the time actually needed to complete the work…

    • 425 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    System Support

    • 333 Words
    • 3 Pages

    A system that is design to support decision making when problem is not structured. It helps user analyze but, but user must know how to deal with the problem, and how to use the result of the analysis.…

    • 333 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    With the amount of electronics used by humanity, disposal of outdated and broken equipment is a big problem that is growing larger with every upgrade and new device. A big problem with this increasing amount of waste is the hazardous chemicals that can be released into the environment from the old equipment. Another problem is the fact that these items are usually constructed of materials that don't biodegrade without significant amounts of time. For these reasons, it isn't always advisable to dump the equipment in landfills. There are methods available for reducing and recycling this electronic waste, whether it be repairing old computers for other users, or recycling the components themselves into new equipment. There are still problems with refurbishing old computers, such as people being unwilling to use outdated equipment. Even if they are willing to take the equipment, they might not have access to proper disposal resources. This also points out that these concerns should be addressed globally, it is impossible to say how someone's trash could affect our entire ecosystem. Everybody should take pride in their environment and pull their own weight in order to keep it clean.…

    • 6411 Words
    • 26 Pages
    Good Essays
  • Good Essays

    So I got an early morning phone call from my father “Hey baby I have no sound on my laptop.” Dad we have fixed this issue before did you not take notes. “, So as I talked him through the steps again we got it working. I have chosen to become a computer support specialist. Computer Support specialist is a helpful type of job. It can be very flexible. I got to thinking about the way things were going and wanted to start a real career. I did some research and found this information maybe someone else could use it to help them.…

    • 615 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    | |1. Apply Quality Standards |Applying of Quality Standards |Assess quality of received materials. |6 hrs. |…

    • 610 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Maintenance Management

    • 1053 Words
    • 5 Pages

    The term ‘maintenance’ means to keep the equipment in operational condition or repair it to its operational mode. Main objective of the maintenance is to have increased availability of production systems, with increased safety and optimized cost. Maintenance management involves managing the functions of maintenance. Maintaining equipment in the field has been a challenging task since the beginning of industrial revolution. Since then, a significant of progress has been made to maintain equipment effectively in the field. As the engineering equipment becomes sophisticated and expensive to produce and maintain, maintenance management has to face even more challenging situations to maintain effectively such equipments in industrial environment. This brief note on maintenance management includes maintenance strategies, functions of maintenance department, maintenance organization and elements of maintenance management.…

    • 1053 Words
    • 5 Pages
    Good Essays
  • Good Essays

    In this manual you will learn how to maintain your pc as well as learn about the safety while doing so. There are so many things out there that people do not know about computers that you will be shocked about in this manual. Maintaining the hardware in your computer will keep your computer running for years. It will also be cheaper for you over buying a brand new computer. On the next page you will find a diagram of your tower. This will help you be more familiar with what you are working with on your computer. So let’s get to learning about knowing how to maintain your computer.…

    • 6227 Words
    • 25 Pages
    Good Essays
  • Satisfactory Essays

    The CRK is based on the book Windows® Internals, 4th edition (Microsoft Press, 2004) by Mark Russinovich and David Solomon.…

    • 734 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Software maintenance

    • 7948 Words
    • 32 Pages

    CHAPTER 6 SOFTWARE MAINTENANCE Thomas M. Pigoski Technical Software Services (TECHSOFT), Inc. 31 West Garden Street, Suite 100 Pensacola, Florida 32501 USA +1 850 469 0086 tmpigoski@techsoft.com Table of Contents 1. Introduction............................................................... 1 2.…

    • 7948 Words
    • 32 Pages
    Powerful Essays
  • Satisfactory Essays

    System Developer

    • 681 Words
    • 3 Pages

    * Currently working as Software Engineer Bureau Veritas Consumer Products Services (India) Pvt. Ltd.,Noida from July 2011 to Till Date. * Worked as Software Engineer Integrated Learning Solution Private Ltd, Gurgaon from March 2009 to June 2011.…

    • 681 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    This chapter contains Name, Address and Size of the Company, History of the Company, Nature of the Business, Vision and Mission, Critical Business System, Strategic Concerns for Use and Organizational Chart.…

    • 1660 Words
    • 7 Pages
    Powerful Essays