1. Bryan is an
employee of Simple System Solutions Inc. He works on the Windows platform. He
notices that some of his computer applications take a long time to execute. In
addition, his computer's hard disk responds in an unreasonably slow manner
while retrieving data. Sometimes, Bryan finds that data files get corrupt when
he tries to access the same from the hard disk. How will you help Bryan in
troubleshooting the problems?
To troubleshoot the stated problems,
you need perform the following tasks:
Task 1. Use the Disk Cleanup utility to free up disk space.
Task 2. Defragment the C: drive.
Task 1. Use the Disk Cleanup utility to free up disk space.
let us now Use the Disk Cleanup utility to free up disk space.
1. the Windows+I click.
2. Click the search charm.
3. type disk cleanup in the Apps text box, and then click the SUBMIT button to continue.
4. click setting.
5. click in the empty area of the screen.
6. click the free up disk space by deleting unnecssary files app in the search results.
7. select the offline webpages, Recycle Bin, and setup log files check boxes.
8. click the scroll down button.
9. select the Temprorary file and per user archived windows error report check boxes.
10. click the ok button.
11. click the delete files button.
Task 2. Defragment the C: drive.
1. click the search charm.
2. type defragment in the Apps text box, and then click the SUBMIT button to continue.
3. Click setting.
4. select the Deframnt and optimize your drives app in the search result.
5. click the otimize button.
6. click the close button after the defragmentation is complete.
Task 1. Use the Disk Cleanup utility to free up disk space.
Task 2. Defragment the C: drive.
Task 1. Use the Disk Cleanup utility to free up disk space.
let us now Use the Disk Cleanup utility to free up disk space.
1. the Windows+I click.
2. Click the search charm.
3. type disk cleanup in the Apps text box, and then click the SUBMIT button to continue.
4. click setting.
5. click in the empty area of the screen.
6. click the free up disk space by deleting unnecssary files app in the search results.
7. select the offline webpages, Recycle Bin, and setup log files check boxes.
8. click the scroll down button.
9. select the Temprorary file and per user archived windows error report check boxes.
10. click the ok button.
11. click the delete files button.
Task 2. Defragment the C: drive.
1. click the search charm.
2. type defragment in the Apps text box, and then click the SUBMIT button to continue.
3. Click setting.
4. select the Deframnt and optimize your drives app in the search result.
5. click the otimize button.
6. click the close button after the defragmentation is complete.
2. Alex works as a PC technician at Contoso technologies. The company
has purchased 20 new systems. All these systems have the Windows 8 operating
system installed. Now, the IT Manager wants these computers to be added to the
company network so that the employees can access shared resources, such as
printers and databases. In addition, the IT Manager wants that the Network
Administrator should be able to control the security settings and resource
permissions for all the computers from a central server. You have been assigned
the task to provide solutions for the preceding requirements. How will you
accomplish the same?
To accomplish the desired objectives,
you need to add the computers to the company domain.
Let us now add a computer to the company domain.
1. Click the search charm.
2. Click setting.
3. type system in the setting text box, and then click SUBMIT button to continue.
4. Click the system app in the search results.
5. click the change setting link.
6. click the change butting.
7. select the Domain option.
8. typr contoso.com in the text box below the Domain option, and then click the SUBMIT button to continue.
9. click the ok button.
10. type user name, such as administrator, in the user name text, box, and then click the SUBMIT. button to continue.
11. Type password@123, in the password text box, and then click the SUBMIT button to continue.
12. click the ok button.
13. click the ok button.
14. click the ok button.
15. Click the close button.
16. Click the Restart now button.
17. click the lock screen.
18. Click the switch user button.
19. click the other user icon.
20. type domain name\user name, such as contoso\administrator in the user name, text box, and then click the SUBMIT button the continue.
21. type password, such as password@123 in the password text box, and then click the SUBMIT button to continue.
22. click the submit button.
23. click the Desktop tile.
Let us now add a computer to the company domain.
1. Click the search charm.
2. Click setting.
3. type system in the setting text box, and then click SUBMIT button to continue.
4. Click the system app in the search results.
5. click the change setting link.
6. click the change butting.
7. select the Domain option.
8. typr contoso.com in the text box below the Domain option, and then click the SUBMIT button to continue.
9. click the ok button.
10. type user name, such as administrator, in the user name text, box, and then click the SUBMIT. button to continue.
11. Type password@123, in the password text box, and then click the SUBMIT button to continue.
12. click the ok button.
13. click the ok button.
14. click the ok button.
15. Click the close button.
16. Click the Restart now button.
17. click the lock screen.
18. Click the switch user button.
19. click the other user icon.
20. type domain name\user name, such as contoso\administrator in the user name, text box, and then click the SUBMIT button the continue.
21. type password, such as password@123 in the password text box, and then click the SUBMIT button to continue.
22. click the submit button.
23. click the Desktop tile.
3. Alex Francis works in an e-learning development company. He reports
to the Network Administrator of the company that he is unable to connect his
computer to the local network as well as to the Internet. He needs to access
the www.niit.com website for some course-related information. The Network
Administrator rules out general network and server errors because other users
are able to connect to the network. What steps will you perform to troubleshoot
the problem and connect Alex's computer to the local network as well as to the
Internet?
To solve the stated problems, you
need to perform the following tasks:
task 1. Check the satus of the network adapter.
task 2. View the TCP/IP confoguration of the network adapter.
task 3. Tast network connectivity.
task 4. Release and renew the IP configuration.
task 5. Verify the TCP/IP properties of the network adapter.
task 1. Check the satus of the network adapter.
1. Click the setting charm.
2. click control panel.
3. click the Network and internet link.
4. click the network and sharing center link.
5. click the Ethernet link.
6. click the close button.
7. close the network and sharing center window.
task 2. View the TCP/IP confoguration of the network adapter.
1. click the search charm.
2. type cmd in the apps text box, and then click the sumit button to continue.
3. click the command prompt app in the search results.
4. type ipconfig /all at the command prompt, and then press the enter key.
task 3. Tast network connectivity.
1. type ping 192.168.1.10 at command prompt,and then press the enter key.
2. type ping 192.168.1.2 at the command prompt, and then press the enter key.
3. type ping 192.168.1.1 at the command prompt. and then press the enter key.
4. type ping www.niit.com at the command prompt, and then ress the enter key.
task 4. Release and renew the IP configuration.
1. type iconfig / release at the command prompt, and then press the enter key.
2. Type ipconfig /renew at the command prompt, and then press the enter key.
3. close the adminitrator: command prompt window.
task 5. Verify the TCP/IP properties of the network adapter.
1. clcik the settings charm.
2. click conrtol panel.
3. click the network and internet link.
4. click the Network and charing center link.
5. click the change adapter setting link.
6. select properties.
7. click the scroll down button.
8. click the properties.
9. click the ok button.
10. click the close button.
11. close the network commection window.
12. close the network and sharing center window.
task 1. Check the satus of the network adapter.
task 2. View the TCP/IP confoguration of the network adapter.
task 3. Tast network connectivity.
task 4. Release and renew the IP configuration.
task 5. Verify the TCP/IP properties of the network adapter.
task 1. Check the satus of the network adapter.
1. Click the setting charm.
2. click control panel.
3. click the Network and internet link.
4. click the network and sharing center link.
5. click the Ethernet link.
6. click the close button.
7. close the network and sharing center window.
task 2. View the TCP/IP confoguration of the network adapter.
1. click the search charm.
2. type cmd in the apps text box, and then click the sumit button to continue.
3. click the command prompt app in the search results.
4. type ipconfig /all at the command prompt, and then press the enter key.
task 3. Tast network connectivity.
1. type ping 192.168.1.10 at command prompt,and then press the enter key.
2. type ping 192.168.1.2 at the command prompt, and then press the enter key.
3. type ping 192.168.1.1 at the command prompt. and then press the enter key.
4. type ping www.niit.com at the command prompt, and then ress the enter key.
task 4. Release and renew the IP configuration.
1. type iconfig / release at the command prompt, and then press the enter key.
2. Type ipconfig /renew at the command prompt, and then press the enter key.
3. close the adminitrator: command prompt window.
task 5. Verify the TCP/IP properties of the network adapter.
1. clcik the settings charm.
2. click conrtol panel.
3. click the network and internet link.
4. click the Network and charing center link.
5. click the change adapter setting link.
6. select properties.
7. click the scroll down button.
8. click the properties.
9. click the ok button.
10. click the close button.
11. close the network commection window.
12. close the network and sharing center window.
4. Praxis Corp. is an IT organization that frequently implements new
hardware and software technologies to fulfill the latest requirements of its
customers. For this, the management of the company often decides to upgrade the
computer systems. As a result, some of the hardware components need to be
replaced. These replaced hardware components must be properly managed and
disposed of to ensure minimum risk of environmental damage. You have been
assigned the task to device an appropriate solution for the preceding
challenges. How will you accomplish the task?
Identifying Green ways of Disposing
E-waste
Computer components can be difficult the dispose of. A number of computer components, such as CMOS battery.
cannot be easily disposed of. you need to task extreme precaution ans disose of computer components as per
the guidelines suggested by the manufacturer.
Computer components can be either disposed of or recycled. Depending on the type of computer component, you
need to task appropriate actions. For example, a monitor can be recyled by the computer manufacturer However, a CMOS
bettery cannot be recycled. therefore it needs to be properly disposed of.
Disposing computer Components
The life cycle of computer componenets is usually less then two years. thereafter. the parts become obsolete and are usually
discaeded. these obsolete computers, when dismantled. genrate E-waste in the form of hundreds of componenets.
Heavy metels, such as mercury and lead. and other toxic compounds in the e-waste to get into the environment and create health
problems, such as cancer. A proper way to dispose of E-waste is to drop it in specific E-Wastecollection centers set up by the
govemment agencies of equipment manufacturers. you can also donate them to some educational organizations where students can work
on these computer. the educations and Non-Govermmental Organizations (NGOs) do not require high-end equipment as compaered of those of
compared to those of companies. therefore, large companies donate old equipment to such organizations.
the united states Envinment protcation Agency (US EPA) encourages recycling and reusing of used electronic products by imposing less strigent
regulations for recycled and reused products. in contrast, the products disposed of in a hazardous manner face stingent regulations. in several
state that either the manufacturers provision for recovery programs are mandatory. in the US, the E-Waste laws state that either the manufacturers
provision for recycling programs or specifie items are not considered trash.
The European Umon and a few states in the Umted States, through legislation have made manutecturers of electronic equipment
responsible foe the recycling of these products. organizations must ensure that the their e-waste disposal process is in
accordance with the local laws and regulations to related to the disposal of e-waste some of the green disposal considerations for computer components are:
1. Laptop batteries deserve extra considerations while being disposed of as they contain toxic elements that are harmful to human health
some electronic stores offer battery recycling programs.
2. Printer components, such as cartridges toner and ribbons deserve extra caution during disosal as they may contain residual ink particles. the priter ink
particles may contain harmful chemicals and may be inflammable. Reusable cartridges and toners should be used to reduce wastage.
3. The disposal of CRL monitors is federally regulated because of the amount of lead they contain Disposing of more then a certain amount of CRL monitors
can become costly because of the documentating required. state environmental laws also come into factor into disposal decisions and costs.
Computer components can be difficult the dispose of. A number of computer components, such as CMOS battery.
cannot be easily disposed of. you need to task extreme precaution ans disose of computer components as per
the guidelines suggested by the manufacturer.
Computer components can be either disposed of or recycled. Depending on the type of computer component, you
need to task appropriate actions. For example, a monitor can be recyled by the computer manufacturer However, a CMOS
bettery cannot be recycled. therefore it needs to be properly disposed of.
Disposing computer Components
The life cycle of computer componenets is usually less then two years. thereafter. the parts become obsolete and are usually
discaeded. these obsolete computers, when dismantled. genrate E-waste in the form of hundreds of componenets.
Heavy metels, such as mercury and lead. and other toxic compounds in the e-waste to get into the environment and create health
problems, such as cancer. A proper way to dispose of E-waste is to drop it in specific E-Wastecollection centers set up by the
govemment agencies of equipment manufacturers. you can also donate them to some educational organizations where students can work
on these computer. the educations and Non-Govermmental Organizations (NGOs) do not require high-end equipment as compaered of those of
compared to those of companies. therefore, large companies donate old equipment to such organizations.
the united states Envinment protcation Agency (US EPA) encourages recycling and reusing of used electronic products by imposing less strigent
regulations for recycled and reused products. in contrast, the products disposed of in a hazardous manner face stingent regulations. in several
state that either the manufacturers provision for recovery programs are mandatory. in the US, the E-Waste laws state that either the manufacturers
provision for recycling programs or specifie items are not considered trash.
The European Umon and a few states in the Umted States, through legislation have made manutecturers of electronic equipment
responsible foe the recycling of these products. organizations must ensure that the their e-waste disposal process is in
accordance with the local laws and regulations to related to the disposal of e-waste some of the green disposal considerations for computer components are:
1. Laptop batteries deserve extra considerations while being disposed of as they contain toxic elements that are harmful to human health
some electronic stores offer battery recycling programs.
2. Printer components, such as cartridges toner and ribbons deserve extra caution during disosal as they may contain residual ink particles. the priter ink
particles may contain harmful chemicals and may be inflammable. Reusable cartridges and toners should be used to reduce wastage.
3. The disposal of CRL monitors is federally regulated because of the amount of lead they contain Disposing of more then a certain amount of CRL monitors
can become costly because of the documentating required. state environmental laws also come into factor into disposal decisions and costs.
5. Acme Corp. is an IT organization that is facing stiff competition
from its competitors. To succeed in such a competitive environment, the
organization needs to ensure that it spends a minimum amount of resources on:
Infrastructure investment Electrical power Operating expenses In addition, the
organization wants to implement an environment-friendly solution as a social
gesture. The Administrator of the organization has been assigned the task to
find an appropriate solution to meet the preceding requirements. How will the
Administrator accomplish the task?
Understanding Virtualization
Virtualization is a technology that helps in adstracting computer resources in a virtual form. It creates an
environment similar to a host mechine. It helps in saving both, hardware and software resources, by utilizaing the
same resource usedby the host machine. in virtualization, when you abstract the hardware resource by using an
application, the hardware resources become available to another computer that the runs the virtual state.
Virtualization is achieved by using an application or technology, such as VMware Workstation. virtual BOX, or
Hyper-V.
The virtual form of a computer is known as a virtual machine. A virtual machine operates like a physical
machine, but dose not require its own separate physical hardware. Depending on the hardware resources, such as
microprocessor, memory, and haed disk space, you can run multiple virtual mechine within a single physical
computer. therefore, depending on the hardware capabilities of a physical machine or a host machine, you may
be able to run a single vitual machine or simultaneously run multiple vtual machine on a comuter.
To understand this concept better. consider an example. Assume that you have a computer that has 8 GB of
RAM 500 gb of haed disk space, and a network adapter card. you run a client operating system, such as
Windows 7, on this computer, Now, you need to experiment with Linux. In the absence of vtialization. you can
format the existing Windows insallation and insall Linux or dual-boot with Windows and Linux Dual-bool
can enable you to have two or more operating systems on a single computer, but you can run only one of these
operating systems at a time.
However, by using vitualazation siftware, such as vitual box, you can run Linux in a vitual machine within Windows.
Vitualazation helps in green computing because only one physical computer consumes electical energy. Vitual machine
utilize resources from the physical machine, and therfore, do not require a separate energy channel to
be powered on. Due to this, large enterprises have turned to vitualizaion and converted their phusical servers
into vitual machines. Virtualization privider the following key benefits:
1. Reduced space requirements: Virtualization allows organization to consolidate multiple physical machines
into a single physical machine. As a result, organization require less space for setting up comuters.
2. Optimal resource usege: Virtualization can lead to a better usage and distribution of computing resources
among users. in case of multiple physical machine, the computing resources of each physical machine may
not be used completely.
3. Energy conservation: Virtualization can lead to reduction in energy demands due to reduction in the amount
of physical hardware component. the vitual machine. which are simulated on a physical machine. do not
require any additional power. therefore multiple users can be supported by a single physical machine, with
lessr power requirements. In case of multiple physical machine, each machine would require a separate
power supply, and therefore, More power would be consumed pen user.
4. Consolidation of consolidation: Consolidation of servers is the process of adding multiple servers on a single host.
for example, you can add vitual machine that act as a printer server, a Wab server a file server, and an
email server on a single physical host. the consolidation of server also helps in consolidation multiple
Underutilized servers on to a single, High-end, physical host.
Virtualization is a technology that helps in adstracting computer resources in a virtual form. It creates an
environment similar to a host mechine. It helps in saving both, hardware and software resources, by utilizaing the
same resource usedby the host machine. in virtualization, when you abstract the hardware resource by using an
application, the hardware resources become available to another computer that the runs the virtual state.
Virtualization is achieved by using an application or technology, such as VMware Workstation. virtual BOX, or
Hyper-V.
The virtual form of a computer is known as a virtual machine. A virtual machine operates like a physical
machine, but dose not require its own separate physical hardware. Depending on the hardware resources, such as
microprocessor, memory, and haed disk space, you can run multiple virtual mechine within a single physical
computer. therefore, depending on the hardware capabilities of a physical machine or a host machine, you may
be able to run a single vitual machine or simultaneously run multiple vtual machine on a comuter.
To understand this concept better. consider an example. Assume that you have a computer that has 8 GB of
RAM 500 gb of haed disk space, and a network adapter card. you run a client operating system, such as
Windows 7, on this computer, Now, you need to experiment with Linux. In the absence of vtialization. you can
format the existing Windows insallation and insall Linux or dual-boot with Windows and Linux Dual-bool
can enable you to have two or more operating systems on a single computer, but you can run only one of these
operating systems at a time.
However, by using vitualazation siftware, such as vitual box, you can run Linux in a vitual machine within Windows.
Vitualazation helps in green computing because only one physical computer consumes electical energy. Vitual machine
utilize resources from the physical machine, and therfore, do not require a separate energy channel to
be powered on. Due to this, large enterprises have turned to vitualizaion and converted their phusical servers
into vitual machines. Virtualization privider the following key benefits:
1. Reduced space requirements: Virtualization allows organization to consolidate multiple physical machines
into a single physical machine. As a result, organization require less space for setting up comuters.
2. Optimal resource usege: Virtualization can lead to a better usage and distribution of computing resources
among users. in case of multiple physical machine, the computing resources of each physical machine may
not be used completely.
3. Energy conservation: Virtualization can lead to reduction in energy demands due to reduction in the amount
of physical hardware component. the vitual machine. which are simulated on a physical machine. do not
require any additional power. therefore multiple users can be supported by a single physical machine, with
lessr power requirements. In case of multiple physical machine, each machine would require a separate
power supply, and therefore, More power would be consumed pen user.
4. Consolidation of consolidation: Consolidation of servers is the process of adding multiple servers on a single host.
for example, you can add vitual machine that act as a printer server, a Wab server a file server, and an
email server on a single physical host. the consolidation of server also helps in consolidation multiple
Underutilized servers on to a single, High-end, physical host.
No comments:
Post a Comment