Premium Essay

Identifying Operating Systems

In:

Submitted By kingblacc
Words 635
Pages 3
Identifying the Operating System
Alonzo Colbert
ITT Technical Institute
NT1110: Computer Structure and Logic_V1.0
Identifying the Operating System
Identify the operating system in your home or lab computer.
The operating system that I am currently using is Windows 10 Education-Copyright 2015 Microsoft Corporation. There are several features that the Windows 10 operating system features; I will talk about the ones I use most. Personally, the Snap feature is my favorite (Windows 10 Features). I love that I am able to use simple commands to size windows next to each other quickly. This is helpful in school when I need to look at multiple screens at once. The 64-bit support is another useful feature for my school purposes (Windows 10 Features). As a student I will need to be able to access information quickly. According to the Windows website it simply describes the 64-bit system as better equipped to handle information (Windows 10 Features). Cortana feature is a close first place in my favorites (Windows 10 Features). I love the fact that I can use her like SIRI on apple products. There is so much you can do with Cortana (Windows 10 Features). Can ask her just about anything on your personal computer or online and she will find it for you. the new photo feature scheme is something i also enjoy (Windows 10 Features). It makes things so much easier to find. When it comes to my family photos. No more searching around my personal computer to find my photos (Windows 10 Features). I am glad they have brought back the new and improved start menu (Windows 10 Feature). instead having to go in a search down a long list of programs and features. You can put your most used programs on the improves start menu (windows 10 Features). All Desktops and Notebooks come with Service Packages. Most of them to make sure that your Personal Computer runs smooth. There is a few that I

Similar Documents

Premium Essay

Identifying the Operating System

...Identifying the Operating System The operating system for my computer is Windows 7 Enterprise. It was installed with Service Pack 1. Some of the features included with Windows 7 are Direct access, Branch Cache, Federated Search, BitLocker and BitLocker To Go, AppLocker, Virtual desktop infrastructure (VDI) optimizations and Multilingual user interface. Here is a list I found on the Microsoft website stated below. * DirectAccess:  Give mobile users seamless access to corporate networks without a need to VPN. * BranchCache:  Decrease the time branch office users spend waiting to download files across the network. * Federated Search:  Find information in remote repositories, including SharePoint sites, with a simple user interface. * BitLocker and BitLocker To Go:  Help protect data on PCs and removable drives, with manageability to enforce encryption and backup of recovery keys. * AppLocker:  Specify what software is allowed to run on a user's PCs through centrally managed but flexible Group Policies. * Virtual desktop infrastructure (VDI) optimizations:  Improved user experience for VDI with multimon and microphone support, which have the ability to reuse virtual hard drive (VHD) images to boot a physical PC. * Multilingual user interface: Create a single OS image for deployment to users worldwide. My computer has the following for processor, ram, and system type, and disc space: * Processor: Intel® Celeron® 2957U @...

Words: 318 - Pages: 2

Premium Essay

Identifying the Operating System

...Identifying the Operating System The operating system that I will be identifying will be from my lab computer. It already comes installed with Windows 7 Enterprise Service Pack 1. Before it can be upgraded to Windows 8.1, the firmware and the USB would need to be updated because it is not compatible. Windows 8.1 is the latest version of Microsoft windows and has a completely new appearance from the prior versions. There are five features that will be discussed that comes with the installed service pack. The first one will be direct access which allows you to connect to a corporate network that you work at through internet access and without having to be connected to a virtual private network (VPN). It provides increased productivity for mobile work force. Because of this, you are not required to be in the office, you could be at home or traveling somewhere and still is able to have access to your work as if you are at the desk. Even with this access, it doesn’t stop the IT Administrators from being able to update software or policy settings provided by the company. Another feature is Federated search and enterprise search scopes which enables the user to search files through Windows explorer and be able to open it and work with the file no matter where it is located. Sharepoint portals were created to enable migration of important content to centralized content stores. The App locker provides the ability to control what software can be run which reduces risk...

Words: 362 - Pages: 2

Premium Essay

Identifying the Operating System

...Identifying the Operating System * NT1110 Module 1 My home computer is a new Dell Inspiron 15 3000 series. It has the Windows 7 edition with a Service Pack 1. The Windows 7 edition brings a more responsive and lively feel, and the start menu is just right. With this edition, Microsoft has also recognized the need for improved desktop responsiveness, which gives the impression that the computer is responding to the user and that they are in control. Compatibility on Windows 7 is definently far better than that of Vista. And many programs that were used on Windows XP did not work immediately and required updates, but with Windows 7 almost all applications that work on Vista should still run. In this regard, Windows Vista has definently paved the way for Windows 7. Lower hardware requirements is also a plus for Windows 7 because due to the reputation that Vista gained, making the more sophisticated hardware seem rather ordinary, will run well on lower end hardware, making the transition from Windows XP less painful. Windows 7 also has an improved search tool, which now rivals Mac OS X’s spotlight to be able to find what you need quickly and easily. For example, typing a word in the start menu will display it and split it up neatly into files, folders and applications, or typing “keyboard” will bring up the keyboard options within the control panel. Taskbar options are a lot more powerful since Vista. The taskbar icons are now larger and items are grouped together...

Words: 369 - Pages: 2

Premium Essay

Identifying the Operating System

...I currently own a Dell laptop computer which currently uses Windows 8.1 for the operating system. There are a few new features to this service pack. From some of the people that I have talked to about this I have been told that there really isn’t much difference but here is what I have found. The Power and Search buttons on the Start screen are now a little bit different. “These buttons appear in the upper-right corner of the Start screen next to your account picture. You'll be able to quickly and easily shut down your PC or search for things right from Start (Some types of PCs don't have the Power button on Start. You can shut down your PC using the Power button in the Settings charm instead.)” (http://windows.microsoft.com/en-us/windows-8/whats-new). “All open and pinned apps appear in the taskbar. If you like using the desktop, you'll see both desktop apps and apps from the Windows Store in your taskbar when they're running. You can also pin any app to the taskbar so you can quickly open or switch between apps from the desktop.” (http://windows.microsoft.com/en-us/windows-8/whats-new). You can also get to the taskbar from anywhere or go to the desktop to sign in instead of the Start screen.” If you spend more time in the desktop, you can sign in (boot) directly to the desktop instead of the Start screen. And if you want to sign in to Start instead, you can change this setting at any time.” (http://windows.microsoft.com/en-us/windows-8/whats-new). One of the other features...

Words: 656 - Pages: 3

Premium Essay

Identifying Diffferent Operating Systems

...Identifying the operating system In this lab I will be discussing how I identified my home PC’s operating system. I will provide different features of my operating system, provide the processor speed, amount of RAM and, disk space on my PC. I will finally determine if I can upgrade my software or not. Now I will identify the processor and speed of my operating system. I currently have a Intel Pentium CPU G645, the speed of the processor runs at 290 GHz. I am currently running Windows 10 home edition which is the latest version, the operating system runs at 64 bits. Next I will provide the amount of RAM in my operating PC. The amount of internal storage that I have is not much its only 4 GB, but I have a 2 TB external hard drive that I run on both my XBOX one and my PC. I don’t believe I can upgrade my operating system anymore due to the fact that I recently did the windows 10 update, I previously had windows 8. Windows 10 is significantly different and has a ton of new features which I will get into a few of them right now. The source where I got the information on the five features that I will discuss is www.windows.microsoft.com. First of the five features that I am discussing is that windows 10 came out with there own browser called Microsoft edge which is far more superior the previous web browser internet explorer. The windows 10 has improved their photo images and made it easier to navigate photo folders and sub folders easier from your hard drive and external...

Words: 503 - Pages: 3

Free Essay

Spur

...Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * Solid state vs. magnetic | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * Optical drives | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * CD / DVD / RW / Blu-Ray | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * Removable storage | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * Tape drive | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * Solid state (e.g. thumb drive, flash, SD cards, USB) | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * External CD-RW and hard drive | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * Hot swappable devices and non-hot swappable devices | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices...

Words: 6966 - Pages: 28

Premium Essay

Vulnerability Scanniing

...Vulnerability scanning Lab #2 1. Zenmap is a tool used for scanning remote computers. Zenmap can retrieve the following information from the target machine: Type of operating system List of open ports Mac Address A hacker plans to carry out an attack on a company network. In order to carry out the attack, the attacker will require some basic information about the target machine on the company network. Zenmap could be used to probe the network and target machine and retrieve basic information needed to stage an attack. 2. Nessus 3. Before the reconnaissance step it is important to formulate a plan. You would also require some information such as host IP address in order to probe the target machine using tools like Nessus. 4. CVE listing is a publicly available and free list of standardized identifiers for common computer vulnerabilities. MITRE is a not-for-profit organization responsible for hosting CVE. MITRE operates research and development centers sponsored by the federal government. 5. Zenmap is capable of identifying operating systems that are present on IP server and workstation. This can be achieved by using the Intense Scan option. 6. Knowing that the target host is running Windows XP workstation gives better sense of what kind of vulnerabilities to expect. You can focus the scan on Windows using some plugins in Nessus and concentrate on services that run on the windows workstation. You can also look out for unpatched and outdated...

Words: 493 - Pages: 2

Free Essay

Application Activity 1

...Application Activity 1: Interview someone at the company of your choice who handles network administration or a help desk professional who handles the administration of any of the operating systems identified in this course. It is important to select an individual that has a functional knowledge of identifying types of cyber-attacks, designing and implementing measures to respond to such an event, and understands different forms of malicious code. While an in-person interview is preferred, you can also conduct this interview by phone or e-mail. During your interview be sure to inquire as to the individual’s job title and daily responsibilities. Also, be sure to discuss the problems that exist with monitoring network activity, to include access controls, cryptography, and identifying malicious code. In addition, note the features of operating systems that typically benefit organizations in terms of security benefits. Lastly, inquire as to the career potential that exists in network security and related fields. Feel free to ask many additional questions, as these questions are given to ensure key areas are identified. Once you have concluded your interview, gather your data and draft a report detailing the information gained as a result of the interview. Your report should be a minimum of 5 pages excluding the title page and references. There must be a minimum of 5 peer-reviewed sources included. • Interviewee’s job title and daily responsibilities are included. • What problems...

Words: 370 - Pages: 2

Free Essay

Comparison of Some Os Booting

...Windows, Linux and Mac Operating system Booting Process: a Comparative Study Prof. Amar Rajendra Mudiraj Assistant Professor MIT (E), Aurangabad,Maharashtra, India. Email:amarmudiraj@gmail.com Abstract This paper presents a comparative study of Booting Paradigm of Windows, Linux and Mac, the three popular operating systems. Booting process is the essential and first step perform by the OS after this process execution all other processes can get the chance to execute , so we may say that booting is the first process because of which all other OS processes can execute. This experimental study gives an overview on the similarity and difference in Booting Process. As every operating system have to initially do the booting and as every OS providing different feature of each others, the paper is highlighting those micro and essential similarities and differences having by the operating systems during the Booting Process. Keywords: Booting, Cold booting, Worm booting, Linux Booting, Windows Booting, Mac Booting. In Worm Booting the computer get restart without shutdown the system, in which the system application and memory just get cleared and then reloading the operating system in primary memory. With the above two booting types we also have some other flavor in the computer booting like Sleep, Hibernate. Power - ON Load Instruction from ROM Detect OS from HDD 1. Introduction Find Attached H/W Booting Process is the first step gets happened in the computer system when you switch on...

Words: 2846 - Pages: 12

Free Essay

Operarting Systems

...Operating Systems Section A Part one 1. a. Heap 2. c. An execution of program 3. a. without a break irrespective of size 4. C. Page replacement 5. b. To execute a procedure in another compute in the distributed system 6. b. High performance by serving several processes simultaneously 7. b. To execute a procedure in another compute in the distributed system 8. c. Multi-site transaction 9. c. Both a & b 10. d. 1 or more CPU True and False 1. false 2. True 3. True 4. True 5. True 6. True 7. False 8. False 9. False 10. True Section B Answer 1) It is a secure means to recognize a user when accessing government services online. The user remains anonymous, and the authentication process just confirms that the credential is valid and is in the hands of the owner of the credential. Credential authentication does not reveal or confirm identity to the government website. It receives only a message confirming that your credential (username/password) was successfully validated by your bank or by the government. Answer 2) File system a. Directory system for convenient grouping of files b. Protection of files against illegal access c. File sharing semantics d. Reliable storage of files IOCS a. Effecient operation of I/O devices b. Effecient access to records in file c. Invokes facilities through kernel d. Perform I/O operations without knowing the...

Words: 2202 - Pages: 9

Premium Essay

Cyber Security

...System Administrators are the ones responsible for ensuring computers work in the business world. Along with that responsibility, comes the accountability when the operating systems (OS) fail to meet business needs. Maintaining the security of e-commerce and business processes is a major concern for system administrators. Protecting the operating systems is the main component when it comes to shielding all the information systems. The software scripts of the OS are what enable network devices, servers and desktops to communicate as a whole. OS is the glue that keeps all the files, hardware, and software together. The OS role includes managing files, processing controls of computer programs, and serving as GUI between the computer and user. With all the responsibility an OS is bound to have weaknesses. Typically, security vulnerabilities are usually rooted from glitches/bugs in the scripts that run beneath the OS. The most commonly used OS are Unix, Mac OS, and Microsoft Windows. With Windows being the leading OS, security patches have to be downloaded constantly. With out identifying a specific OS, there are advantages and disadvantages that can be implemented to protect the OS. Advantages of Securing OS Mitigating internal security threats is a common practice that should have a plan of action to protect business systems as a whole. Securing the physical hardware; servers, consoles routers etc. is essential. The actual system it self should be physically protected and authorized...

Words: 2482 - Pages: 10

Premium Essay

Nc 11

...|COMPETENCY-BASED CURRICULUM |[pic] | |[pic] | |Sector: | |INFORMATION AND COMMUNICATION TECHNOLOGY | |Qualification: | |COMPUTER HARDWARE SERVICING NC II | |[pic] |Technical Education and Skills Development Authority | | |East Service Road, South Superhighway, Taguig City, Metro Manila | TABLE OF CONTENTS Page A. COURSE DESIGN 1-5 B. MODULES OF INSTRUCTION 6-73 • Basic Competencies 6 o Participating in workplace communication ………………… 7-10 o Working in a team environment ……………….... 11-13 o Practicing...

Words: 8634 - Pages: 35

Premium Essay

Kkhkhk

...M1: Comparing two different operating systems Name | Windows | MAC OS X | Sources | * http://en.wikipedia.org/wiki/Windows | * http://en.wikipedia.org/wiki/OS_X | Image | | | Versions | Windows 8` | Mac OS | Pros | * Compatibility–The programs when you were using an original version of windows, you will also work with a newer version of Windows. * Technical Support- Almost all windows manufacturers will support for a recent version of Windows when they go to market with a new product. * Ease of use – people who use windows will know that windows is easy to use compared to other operating systems like the mac os x. * Games - An excess amount of gaming titles are offered for Windows, also there is so much gaming hardware which is supported. * Plug & Play – at the moment Windows has an edge over the competition and is working well in the area of Plug & Play support for PC hardware. Windows normally does a good job at making people identifying a different hardware. | * Reliability- Apple controls production from the beginning to the end the parts of a Mac is made to function together. * Security - Mac OS is a two-layered system: the GUI sits on top a UNIX core, and UNIX is known for its safety features. It's very difficult to connect a virus without the user who allows it. * Stability – mac is steadier and more constant then than Windows because of Apple’s control over the formation options as well as UNIX base. * Price – people don’t spend...

Words: 603 - Pages: 3

Premium Essay

Operating System

...Identifying the Operating System RAM (random access memory) is a temporary holding area for data, application program instructions, and the operating system. The RAM information can be found in the control panel. RAM holds the data on the computer until the user process that data so it can be stored permanently on a hard disk, CD or flash drive. A hard disk drive is a storage device and can retrieve digital information. Optical disk drivers contains a spindle that rotates the disc over a laser lens. An optical disk drive is a disk drive that use a laser light so it can read or write data on an optical disk. Optical disk are CD, DVD, and Blu-ray the data on any optical disk can be stored into the RAM. My home laptop use Windows 7 home premium I will view the RAM to see if it is able to be upgraded to Windows 8.Sevice pack 1. The rating: 3.7 Windows experience index. Processor: AMD E- 450 with Radeon™ HD Graphics 1.65GHz. Installed memory (RAM): 4.00GB (3.60GB usable) system type: 64-bit operating system. Pen and touch: No pen or touch input is available for this display. Hard disk drive space 128GB. The requirements for Window 8 are process: 1 gigahertz (GHz) or faster with support of PAE, and SSE2.RAM:1 gigabyte (GB) (32bit) or 2GB (64-bit). Hard disk space: 16GB (32-bit) or 20GB (64bit) Graphics card: Microsoft X9 graphics device with WDDM driver. My home laptop meet all the requirement to be upgraded to Windows 8. The requirements for Window 7 are the same as Windows 8. My...

Words: 534 - Pages: 3

Premium Essay

Computer Hardware Servicing Ncii

...COMPETENCY-BASED CURRICULUM |[pic] | | |[pic] | |Sector: | |INFORMATION AND COMMUNICATION TECHNOLOGY | |Qualification: | |COMPUTER HARDWARE SERVICING NC II | |[pic] |Technical Education and Skills Development Authority | | |East Service Road, South Superhighway, Taguig City, Metro Manila | TABLE OF CONTENTS Page A. COURSE DESIGN 1-5 B. MODULES OF INSTRUCTION 6-73 • Basic Competencies 6 o Participating in workplace communication ………………… 7-10 o Working in a team environment ……………….... 11-13 o Practicing career professionalism .……………. 14-17 o Practicing occupational health and safety procedures...

Words: 8633 - Pages: 35