SlideShare une entreprise Scribd logo
1  sur  50
Managing Applications, Services, Folders,Managing Applications, Services, Folders,
and Librariesand Libraries
Lesson 4
ObjectivesObjectives
Objective Domain Matrix
Technology Skill Objective Domain Description Objective Domain
Number
Understanding Local versus Network
Applications
Understanding Local versus Network
Applications
3.1.1
Removing or Uninstalling an Application Removing or Uninstalling Applications 3.1.3
Understanding Group Policy and Application
Installation
Understanding Group Policy 3.1.2
Understanding Service Startup Types Understanding Service Startup Types 3.4.1
Understanding Service Accounts Understanding Service Accounts 3.4.2
Understanding Service Dependencies Understanding Service Dependencies 3.4.3
Understanding MSCONFIG Understanding MSCONFIG 1.3.5
Understanding FAT, FAT32, and NTFS Understanding FAT, FAT32, and NTFS 4.1.1
Adding Multiple Local Locations to a Library Adding Multiple Local Locations to a Library 4.4.2
Adding Networked Locations Adding Networked Locations 4.4.3
Understanding Encrypting File System (EFS) Understanding Encrypting File System (EFS) 4.3.2
Understanding Security (Encryption) Understanding Security (Encryption) 5.2.2
Understanding Compression Understanding Compression 4.3.3
Understanding BitLocker Understanding BitLocker 4.3.1
Installing and Managing ApplicationsInstalling and Managing Applications
• An application is a program that:
– Runs “on top” of the operating system or
from a server
– Helps a user perform a specific task, such as
word processing, appointment scheduling, or
accounting
Installing and Managing ApplicationsInstalling and Managing Applications
• Applications installed at the local level or the
network level
– Local installation = software files running
directly from a computer
– Network installation = software files are
made available from an application server on
a network
Uninstalling Local ApplicationsUninstalling Local Applications
Applications Installed over a NetworkApplications Installed over a Network
• Group Policy
• Active Directory
• Group Policy objects (GPOs)
Assigning/Publishing ApplicationsAssigning/Publishing Applications
• Windows 2008 R2 Active Directory Domain
Services (AD DS) uses Group Policy to push
applications to users or computers.
• Using Group Policy, you can assign or
publish an application to all users or
computers in a designated site, domain,
organizational unit (OU), or to a local,
individual user or computer.
Assigning ApplicationsAssigning Applications
• If Group Policy assigns software on each
computer, the software is installed the next
time the computer starts and any users with
the correct permissions who log on to the
computer may run the software.
• If Group Policy assigns software to users, the
next time an authorized user clicks the
Microsoft Office shortcut or menu item (for
example), the software installs on the user’s
computer and Office opens.
Publishing ApplicationsPublishing Applications
• Group Policy can publish an application to
users.
– The next time a user logs on, he can choose
to install the software from a dialog box that
appears.
ServicesServices
• Run in the background on a Windows
system to help the operating system run
other programs
• Services console is the central management
point of services in Windows Vista and
Windows 7
ServicesServices
The General TabThe General Tab
The Log On TabThe Log On Tab
The Recovery TabThe Recovery Tab
The Dependencies TabThe Dependencies Tab
The Print Spooler Service in the ServicesThe Print Spooler Service in the Services
ConsoleConsole
Selecting a Startup TypeSelecting a Startup Type
MSCONFIGMSCONFIG
• Also known as the System Configuration
Utility
• Lets you:
– Enable or disable startup services
– Set boot options such as booting into Safe
Mode
– Access tools like Action Center and Event
Viewer
– More
The General TabThe General Tab
The Boot TabThe Boot Tab
Checking the Safe Boot Option onChecking the Safe Boot Option on
the Boot Tabthe Boot Tab
The Services TabThe Services Tab
Disabling an Unneeded ServiceDisabling an Unneeded Service
The Startup TabThe Startup Tab
Disabling an Unneeded Startup ItemDisabling an Unneeded Startup Item
Selective Startup EnabledSelective Startup Enabled
The Tools TabThe Tools Tab
File SystemsFile Systems
• FAT, FAT32, and NTFS
• NTFS-formatted disks best for Windows 7
• Can convert from one file system to another
• Some conversions destroy existing data
File SystemsFile Systems
File
System
Maximum
Partition
Size
Maximum File Size
FAT 2 GB 2 GB
FAT32 32 GB 4 GB
NTFS 256 TB Limited by size of volume on
which it resides
File SystemsFile Systems
Windows 7 LibrariesWindows 7 Libraries
• A virtual folder that can display content from
different locations (folders, for example) on
your computer or an external drive
• Looks like an ordinary folder but simply
points to files and folders that are located
elsewhere
Windows 7 LibrariesWindows 7 Libraries
Selecting a Library in WhichSelecting a Library in Which
to Include a Folderto Include a Folder
The Locations HyperlinkThe Locations Hyperlink
The Pictures Library Locations Dialog BoxThe Pictures Library Locations Dialog Box
The Pictures Library Locations DialogThe Pictures Library Locations Dialog
Box with a Newly Added FolderBox with a Newly Added Folder
Creating a New LibraryCreating a New Library
EncryptionEncryption
• Encrypted data is “scrambled” but still
readable and usable by the user who
encrypted the file
• That user and other authorized users can
open and change the file as necessary
• Unauthorized users who try to open the file
or copy it receive “Access Denied” message
EncryptionEncryption
• Only the original owner and the computer’s
designated recovery agent can access
encrypted files
• Encryption uses:
– Encryption keys
– Certificates
Encrypting Files and Folders in Windows 7Encrypting Files and Folders in Windows 7
• Encrypting File System (EFS)
– Encrypts information on hard disks, external
flash disks, CDs, DVDs, backup tapes, and
other types of physical media
• Users can enforce encryption on data files,
folders, and entire drives
Encrypting Files and Folders in Windows 7Encrypting Files and Folders in Windows 7
• Advanced Attributes dialog box enables
users to encrypt files and folders
Encrypting Files and Folders in Windows 7Encrypting Files and Folders in Windows 7
• Encrypted (EFS) files and folders are
displayed in green in Windows Explorer
Personal Certificates in Certificate ManagerPersonal Certificates in Certificate Manager
Using the Certificate Export WizardUsing the Certificate Export Wizard
CompressionCompression
• The process of decreasing the size of files or
folders without affecting the files’ content
• Decreases large files that would otherwise
use a lot of storage space
• Compressing files replaces repeated data
with pointers to the data; pointers take up
much less space than the repeated data, so
the size of the file is reduced
Compressing Files and Folders in Windows 7Compressing Files and Folders in Windows 7
• Advanced Attributes dialog box enables
users to compress files and folders
BitLocker Drive EncryptionBitLocker Drive Encryption
• Encrypts an entire fixed disk to prevent
access by unauthorized users
• BitLocker To Go protects removable drives,
such as external flash drives
• BitLocker is available in Windows Ultimate
and Enterprise editions only
Turning on BitLockerTurning on BitLocker
SummarySummary
• You install applications, or programs, at the local
level or the network level.
• Use Control Panel to uninstall a local application.
• Group Policy lets you control who can install
software, and on which computers, and helps you
push software updates and security configurations
across the network.
• Services run in the background on a Windows
system to help the operating system run other
programs.
SummarySummary
• Use MSCONFIG (System Configuration utility) to
troubleshoot and diagnose startup problems.
• The three primary types of file systems for Windows
are FAT, FAT32, and NTFS.
• A library is a virtual folder that points to resources.
• Encrypting files and folders protects them from
unwanted access. Microsoft uses the Encrypting
File System (EFS) and BitLocker.
• Compression reduces the size of files and folders
without affecting their content.

Contenu connexe

Tendances

Oracle 12c RAC On your laptop Step by Step Implementation Guide 1.0
Oracle 12c RAC On your laptop Step by Step Implementation Guide 1.0Oracle 12c RAC On your laptop Step by Step Implementation Guide 1.0
Oracle 12c RAC On your laptop Step by Step Implementation Guide 1.0Yury Velikanov
 
12c (12.1) Database installation on Solaris 11(11.2)
12c (12.1) Database  installation on Solaris 11(11.2)12c (12.1) Database  installation on Solaris 11(11.2)
12c (12.1) Database installation on Solaris 11(11.2)K Kumar Guduru
 
FSlogix Profiles POC Guide (version 1.0)
FSlogix Profiles POC Guide (version 1.0)FSlogix Profiles POC Guide (version 1.0)
FSlogix Profiles POC Guide (version 1.0)Michael Baars
 
Linux Initialization Process (1)
Linux Initialization Process (1)Linux Initialization Process (1)
Linux Initialization Process (1)shimosawa
 
Windows 10 vs Windows 7
Windows 10 vs Windows 7Windows 10 vs Windows 7
Windows 10 vs Windows 7Jonathan Min
 
How to install windows 7
How to install windows 7How to install windows 7
How to install windows 7elboob2025
 
Evolution of Microsoft windows operating systems
Evolution of Microsoft windows operating systemsEvolution of Microsoft windows operating systems
Evolution of Microsoft windows operating systemsSai praveen Seva
 
BAS011_VMware資料中心虛擬化-基礎_v190418
BAS011_VMware資料中心虛擬化-基礎_v190418BAS011_VMware資料中心虛擬化-基礎_v190418
BAS011_VMware資料中心虛擬化-基礎_v190418rwp99346
 
Xen and the Art of Virtualization
Xen and the Art of VirtualizationXen and the Art of Virtualization
Xen and the Art of VirtualizationSusheel Thakur
 
How Safe is Asynchronous Master-Master Setup?
 How Safe is Asynchronous Master-Master Setup? How Safe is Asynchronous Master-Master Setup?
How Safe is Asynchronous Master-Master Setup?Sveta Smirnova
 
How to Make Partition on Windows 10
How to Make Partition on Windows 10How to Make Partition on Windows 10
How to Make Partition on Windows 10Jaff Tiger
 
Block I/O Layer Tracing: blktrace
Block I/O Layer Tracing: blktraceBlock I/O Layer Tracing: blktrace
Block I/O Layer Tracing: blktraceBabak Farrokhi
 
MySQL Group Replication - HandsOn Tutorial
MySQL Group Replication - HandsOn TutorialMySQL Group Replication - HandsOn Tutorial
MySQL Group Replication - HandsOn TutorialKenny Gryp
 
Device Tree for Dummies (ELC 2014)
Device Tree for Dummies (ELC 2014)Device Tree for Dummies (ELC 2014)
Device Tree for Dummies (ELC 2014)Thomas Petazzoni
 
DB2 Systems Programming Tools of the Trade NA07B03
DB2 Systems Programming Tools of the Trade NA07B03DB2 Systems Programming Tools of the Trade NA07B03
DB2 Systems Programming Tools of the Trade NA07B03Linda Hagedorn
 
Introduction to systemd
Introduction to systemdIntroduction to systemd
Introduction to systemdYusaku OGAWA
 

Tendances (20)

Oracle 12c RAC On your laptop Step by Step Implementation Guide 1.0
Oracle 12c RAC On your laptop Step by Step Implementation Guide 1.0Oracle 12c RAC On your laptop Step by Step Implementation Guide 1.0
Oracle 12c RAC On your laptop Step by Step Implementation Guide 1.0
 
Linux memory
Linux memoryLinux memory
Linux memory
 
Boot process: BIOS vs UEFI
Boot process: BIOS vs UEFIBoot process: BIOS vs UEFI
Boot process: BIOS vs UEFI
 
12c (12.1) Database installation on Solaris 11(11.2)
12c (12.1) Database  installation on Solaris 11(11.2)12c (12.1) Database  installation on Solaris 11(11.2)
12c (12.1) Database installation on Solaris 11(11.2)
 
FSlogix Profiles POC Guide (version 1.0)
FSlogix Profiles POC Guide (version 1.0)FSlogix Profiles POC Guide (version 1.0)
FSlogix Profiles POC Guide (version 1.0)
 
Linux Initialization Process (1)
Linux Initialization Process (1)Linux Initialization Process (1)
Linux Initialization Process (1)
 
Windows 10 vs Windows 7
Windows 10 vs Windows 7Windows 10 vs Windows 7
Windows 10 vs Windows 7
 
Actividad servidor wsus
Actividad servidor wsusActividad servidor wsus
Actividad servidor wsus
 
How to install windows 7
How to install windows 7How to install windows 7
How to install windows 7
 
Evolution of Microsoft windows operating systems
Evolution of Microsoft windows operating systemsEvolution of Microsoft windows operating systems
Evolution of Microsoft windows operating systems
 
BAS011_VMware資料中心虛擬化-基礎_v190418
BAS011_VMware資料中心虛擬化-基礎_v190418BAS011_VMware資料中心虛擬化-基礎_v190418
BAS011_VMware資料中心虛擬化-基礎_v190418
 
Xen and the Art of Virtualization
Xen and the Art of VirtualizationXen and the Art of Virtualization
Xen and the Art of Virtualization
 
4. linux file systems
4. linux file systems4. linux file systems
4. linux file systems
 
How Safe is Asynchronous Master-Master Setup?
 How Safe is Asynchronous Master-Master Setup? How Safe is Asynchronous Master-Master Setup?
How Safe is Asynchronous Master-Master Setup?
 
How to Make Partition on Windows 10
How to Make Partition on Windows 10How to Make Partition on Windows 10
How to Make Partition on Windows 10
 
Block I/O Layer Tracing: blktrace
Block I/O Layer Tracing: blktraceBlock I/O Layer Tracing: blktrace
Block I/O Layer Tracing: blktrace
 
MySQL Group Replication - HandsOn Tutorial
MySQL Group Replication - HandsOn TutorialMySQL Group Replication - HandsOn Tutorial
MySQL Group Replication - HandsOn Tutorial
 
Device Tree for Dummies (ELC 2014)
Device Tree for Dummies (ELC 2014)Device Tree for Dummies (ELC 2014)
Device Tree for Dummies (ELC 2014)
 
DB2 Systems Programming Tools of the Trade NA07B03
DB2 Systems Programming Tools of the Trade NA07B03DB2 Systems Programming Tools of the Trade NA07B03
DB2 Systems Programming Tools of the Trade NA07B03
 
Introduction to systemd
Introduction to systemdIntroduction to systemd
Introduction to systemd
 

En vedette

Lesson 6 - Understanding File and Print Sharing
Lesson 6 - Understanding File and Print SharingLesson 6 - Understanding File and Print Sharing
Lesson 6 - Understanding File and Print SharingGene Carboni
 
Basic networking
Basic networkingBasic networking
Basic networkingajeeshr3
 
Css Major computer systems and networks
Css Major computer systems and networksCss Major computer systems and networks
Css Major computer systems and networksRhenan Belisario
 
Computer systems servicing cbc
Computer systems servicing cbcComputer systems servicing cbc
Computer systems servicing cbcHanzel Metrio
 
computer systems servicing cbc ncii for vtvs
computer systems servicing cbc ncii for vtvs computer systems servicing cbc ncii for vtvs
computer systems servicing cbc ncii for vtvs Rogelio Alvarez
 
Installing computer systems and networks Module
Installing computer systems and networks ModuleInstalling computer systems and networks Module
Installing computer systems and networks ModuleMyra Ramos
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS Kak Yong
 

En vedette (10)

Lesson 6 - Understanding File and Print Sharing
Lesson 6 - Understanding File and Print SharingLesson 6 - Understanding File and Print Sharing
Lesson 6 - Understanding File and Print Sharing
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Css Major computer systems and networks
Css Major computer systems and networksCss Major computer systems and networks
Css Major computer systems and networks
 
Computer systems servicing cbc
Computer systems servicing cbcComputer systems servicing cbc
Computer systems servicing cbc
 
TMC1
TMC1TMC1
TMC1
 
Final cblm
Final cblmFinal cblm
Final cblm
 
computer systems servicing cbc ncii for vtvs
computer systems servicing cbc ncii for vtvs computer systems servicing cbc ncii for vtvs
computer systems servicing cbc ncii for vtvs
 
Installing computer systems and networks Module
Installing computer systems and networks ModuleInstalling computer systems and networks Module
Installing computer systems and networks Module
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 

Similaire à Lesson 4 - Managing Applications, Services, Folders, and Libraries

Poking The Filesystem For Fun And Profit
Poking The Filesystem For Fun And ProfitPoking The Filesystem For Fun And Profit
Poking The Filesystem For Fun And Profitssusera432ea1
 
Microsoft Offical Course 20410C_10
Microsoft Offical Course 20410C_10Microsoft Offical Course 20410C_10
Microsoft Offical Course 20410C_10gameaxt
 
Description Of A Network Administrator
Description Of A Network AdministratorDescription Of A Network Administrator
Description Of A Network AdministratorGina Alfaro
 
Course 102: Lecture 27: FileSystems in Linux (Part 2)
Course 102: Lecture 27: FileSystems in Linux (Part 2)Course 102: Lecture 27: FileSystems in Linux (Part 2)
Course 102: Lecture 27: FileSystems in Linux (Part 2)Ahmed El-Arabawy
 
Vmware thin app architecture
Vmware thin app architectureVmware thin app architecture
Vmware thin app architecturesolarisyougood
 
Vista Presentation
Vista PresentationVista Presentation
Vista Presentationsdrayin
 
Windows Operating System.pptx
Windows Operating System.pptxWindows Operating System.pptx
Windows Operating System.pptxOnyemaobiAmarachi
 
File System Implementation & Linux Security
File System Implementation & Linux SecurityFile System Implementation & Linux Security
File System Implementation & Linux SecurityGeo Marian
 
Linux Installation
Linux InstallationLinux Installation
Linux InstallationBIT DURG
 
OfficeBox User Guide
OfficeBox User GuideOfficeBox User Guide
OfficeBox User GuideDirectReader
 
Operating system and installation
Operating system and  installationOperating system and  installation
Operating system and installationIshworKhatiwada
 
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"EPAM Systems
 
FP 202 - Chapter 5
FP 202 - Chapter 5FP 202 - Chapter 5
FP 202 - Chapter 5rohassanie
 

Similaire à Lesson 4 - Managing Applications, Services, Folders, and Libraries (20)

Poking The Filesystem For Fun And Profit
Poking The Filesystem For Fun And ProfitPoking The Filesystem For Fun And Profit
Poking The Filesystem For Fun And Profit
 
6421 b Module-10
6421 b  Module-106421 b  Module-10
6421 b Module-10
 
Microsoft Offical Course 20410C_10
Microsoft Offical Course 20410C_10Microsoft Offical Course 20410C_10
Microsoft Offical Course 20410C_10
 
windows.pptx
windows.pptxwindows.pptx
windows.pptx
 
Description Of A Network Administrator
Description Of A Network AdministratorDescription Of A Network Administrator
Description Of A Network Administrator
 
Course 102: Lecture 27: FileSystems in Linux (Part 2)
Course 102: Lecture 27: FileSystems in Linux (Part 2)Course 102: Lecture 27: FileSystems in Linux (Part 2)
Course 102: Lecture 27: FileSystems in Linux (Part 2)
 
INT 1010 04-5.pdf
INT 1010 04-5.pdfINT 1010 04-5.pdf
INT 1010 04-5.pdf
 
Vmware thin app architecture
Vmware thin app architectureVmware thin app architecture
Vmware thin app architecture
 
Vista Presentation
Vista PresentationVista Presentation
Vista Presentation
 
C) ICT Application
C) ICT ApplicationC) ICT Application
C) ICT Application
 
CA_Module_3.pptx
CA_Module_3.pptxCA_Module_3.pptx
CA_Module_3.pptx
 
Windows Operating System.pptx
Windows Operating System.pptxWindows Operating System.pptx
Windows Operating System.pptx
 
File System Implementation & Linux Security
File System Implementation & Linux SecurityFile System Implementation & Linux Security
File System Implementation & Linux Security
 
Linux Installation
Linux InstallationLinux Installation
Linux Installation
 
Hiding files.pptx
Hiding files.pptxHiding files.pptx
Hiding files.pptx
 
OfficeBox User Guide
OfficeBox User GuideOfficeBox User Guide
OfficeBox User Guide
 
Operating system and installation
Operating system and  installationOperating system and  installation
Operating system and installation
 
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
 
FP 202 - Chapter 5
FP 202 - Chapter 5FP 202 - Chapter 5
FP 202 - Chapter 5
 
Expo ciberseguridad
Expo ciberseguridadExpo ciberseguridad
Expo ciberseguridad
 

Plus de Gene Carboni

CarboniGoogleTrainerResume
CarboniGoogleTrainerResumeCarboniGoogleTrainerResume
CarboniGoogleTrainerResumeGene Carboni
 
Chapter 3 - The Adjusting Process
Chapter 3 - The Adjusting ProcessChapter 3 - The Adjusting Process
Chapter 3 - The Adjusting ProcessGene Carboni
 
Lesson 7 - Maintaining, Updating, and Protecting
Lesson 7 - Maintaining, Updating, and ProtectingLesson 7 - Maintaining, Updating, and Protecting
Lesson 7 - Maintaining, Updating, and ProtectingGene Carboni
 
Lesson 8 - Understanding Backup and Recovery Methods
Lesson 8 - Understanding Backup and Recovery MethodsLesson 8 - Understanding Backup and Recovery Methods
Lesson 8 - Understanding Backup and Recovery MethodsGene Carboni
 
CHAPTER 3 Measuring Business Income: The Adjusting Process
CHAPTER 3  Measuring Business Income:  The Adjusting ProcessCHAPTER 3  Measuring Business Income:  The Adjusting Process
CHAPTER 3 Measuring Business Income: The Adjusting ProcessGene Carboni
 
CHAPTER 2 Recording Business Transactions
CHAPTER 2  Recording Business TransactionsCHAPTER 2  Recording Business Transactions
CHAPTER 2 Recording Business TransactionsGene Carboni
 
CHAPTER 1 Accounting and the Business Environment
CHAPTER 1  Accounting and the Business EnvironmentCHAPTER 1  Accounting and the Business Environment
CHAPTER 1 Accounting and the Business EnvironmentGene Carboni
 
Introducing Widows 7
Introducing Widows 7Introducing Widows 7
Introducing Widows 7Gene Carboni
 
Guide to Windows 7 - Managing File Systems
Guide to Windows 7 - Managing File SystemsGuide to Windows 7 - Managing File Systems
Guide to Windows 7 - Managing File SystemsGene Carboni
 
Guide to Windows 7 - Managing Disks
Guide to Windows 7 - Managing DisksGuide to Windows 7 - Managing Disks
Guide to Windows 7 - Managing DisksGene Carboni
 
Guide to Windows 7 - Using the System Utilities
Guide to Windows 7 - Using the System UtilitiesGuide to Windows 7 - Using the System Utilities
Guide to Windows 7 - Using the System UtilitiesGene Carboni
 
Guide To Windows 7 - Installing Windows 7
Guide To Windows 7 - Installing Windows 7Guide To Windows 7 - Installing Windows 7
Guide To Windows 7 - Installing Windows 7Gene Carboni
 
Guide To Windows 7 - Introduction to Windows 7
Guide To Windows 7 - Introduction to Windows 7Guide To Windows 7 - Introduction to Windows 7
Guide To Windows 7 - Introduction to Windows 7Gene Carboni
 
Accounting - Chapter 1
Accounting - Chapter 1Accounting - Chapter 1
Accounting - Chapter 1Gene Carboni
 
Introduction to Hardware
Introduction to HardwareIntroduction to Hardware
Introduction to HardwareGene Carboni
 

Plus de Gene Carboni (20)

CarboniGoogleTrainerResume
CarboniGoogleTrainerResumeCarboniGoogleTrainerResume
CarboniGoogleTrainerResume
 
Chapter 3 - The Adjusting Process
Chapter 3 - The Adjusting ProcessChapter 3 - The Adjusting Process
Chapter 3 - The Adjusting Process
 
Lesson 7 - Maintaining, Updating, and Protecting
Lesson 7 - Maintaining, Updating, and ProtectingLesson 7 - Maintaining, Updating, and Protecting
Lesson 7 - Maintaining, Updating, and Protecting
 
Lesson 8 - Understanding Backup and Recovery Methods
Lesson 8 - Understanding Backup and Recovery MethodsLesson 8 - Understanding Backup and Recovery Methods
Lesson 8 - Understanding Backup and Recovery Methods
 
CHAPTER 3 Measuring Business Income: The Adjusting Process
CHAPTER 3  Measuring Business Income:  The Adjusting ProcessCHAPTER 3  Measuring Business Income:  The Adjusting Process
CHAPTER 3 Measuring Business Income: The Adjusting Process
 
CHAPTER 2 Recording Business Transactions
CHAPTER 2  Recording Business TransactionsCHAPTER 2  Recording Business Transactions
CHAPTER 2 Recording Business Transactions
 
CHAPTER 1 Accounting and the Business Environment
CHAPTER 1  Accounting and the Business EnvironmentCHAPTER 1  Accounting and the Business Environment
CHAPTER 1 Accounting and the Business Environment
 
7th ed ppt ch07
7th ed ppt ch077th ed ppt ch07
7th ed ppt ch07
 
Introducing Widows 7
Introducing Widows 7Introducing Widows 7
Introducing Widows 7
 
Guide to Windows 7 - Managing File Systems
Guide to Windows 7 - Managing File SystemsGuide to Windows 7 - Managing File Systems
Guide to Windows 7 - Managing File Systems
 
Guide to Windows 7 - Managing Disks
Guide to Windows 7 - Managing DisksGuide to Windows 7 - Managing Disks
Guide to Windows 7 - Managing Disks
 
Guide to Windows 7 - Using the System Utilities
Guide to Windows 7 - Using the System UtilitiesGuide to Windows 7 - Using the System Utilities
Guide to Windows 7 - Using the System Utilities
 
Guide To Windows 7 - Installing Windows 7
Guide To Windows 7 - Installing Windows 7Guide To Windows 7 - Installing Windows 7
Guide To Windows 7 - Installing Windows 7
 
Guide To Windows 7 - Introduction to Windows 7
Guide To Windows 7 - Introduction to Windows 7Guide To Windows 7 - Introduction to Windows 7
Guide To Windows 7 - Introduction to Windows 7
 
Accounting - Chapter 1
Accounting - Chapter 1Accounting - Chapter 1
Accounting - Chapter 1
 
Introduction to Hardware
Introduction to HardwareIntroduction to Hardware
Introduction to Hardware
 
7th ed ppt ch10
7th ed ppt ch107th ed ppt ch10
7th ed ppt ch10
 
7th ed ppt ch09
7th ed ppt ch097th ed ppt ch09
7th ed ppt ch09
 
7th ed ppt ch08
7th ed ppt ch087th ed ppt ch08
7th ed ppt ch08
 
7th ed ppt ch06
7th ed ppt ch067th ed ppt ch06
7th ed ppt ch06
 

Dernier

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Dernier (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Lesson 4 - Managing Applications, Services, Folders, and Libraries

  • 1. Managing Applications, Services, Folders,Managing Applications, Services, Folders, and Librariesand Libraries Lesson 4
  • 2. ObjectivesObjectives Objective Domain Matrix Technology Skill Objective Domain Description Objective Domain Number Understanding Local versus Network Applications Understanding Local versus Network Applications 3.1.1 Removing or Uninstalling an Application Removing or Uninstalling Applications 3.1.3 Understanding Group Policy and Application Installation Understanding Group Policy 3.1.2 Understanding Service Startup Types Understanding Service Startup Types 3.4.1 Understanding Service Accounts Understanding Service Accounts 3.4.2 Understanding Service Dependencies Understanding Service Dependencies 3.4.3 Understanding MSCONFIG Understanding MSCONFIG 1.3.5 Understanding FAT, FAT32, and NTFS Understanding FAT, FAT32, and NTFS 4.1.1 Adding Multiple Local Locations to a Library Adding Multiple Local Locations to a Library 4.4.2 Adding Networked Locations Adding Networked Locations 4.4.3 Understanding Encrypting File System (EFS) Understanding Encrypting File System (EFS) 4.3.2 Understanding Security (Encryption) Understanding Security (Encryption) 5.2.2 Understanding Compression Understanding Compression 4.3.3 Understanding BitLocker Understanding BitLocker 4.3.1
  • 3. Installing and Managing ApplicationsInstalling and Managing Applications • An application is a program that: – Runs “on top” of the operating system or from a server – Helps a user perform a specific task, such as word processing, appointment scheduling, or accounting
  • 4. Installing and Managing ApplicationsInstalling and Managing Applications • Applications installed at the local level or the network level – Local installation = software files running directly from a computer – Network installation = software files are made available from an application server on a network
  • 6. Applications Installed over a NetworkApplications Installed over a Network • Group Policy • Active Directory • Group Policy objects (GPOs)
  • 7. Assigning/Publishing ApplicationsAssigning/Publishing Applications • Windows 2008 R2 Active Directory Domain Services (AD DS) uses Group Policy to push applications to users or computers. • Using Group Policy, you can assign or publish an application to all users or computers in a designated site, domain, organizational unit (OU), or to a local, individual user or computer.
  • 8. Assigning ApplicationsAssigning Applications • If Group Policy assigns software on each computer, the software is installed the next time the computer starts and any users with the correct permissions who log on to the computer may run the software. • If Group Policy assigns software to users, the next time an authorized user clicks the Microsoft Office shortcut or menu item (for example), the software installs on the user’s computer and Office opens.
  • 9. Publishing ApplicationsPublishing Applications • Group Policy can publish an application to users. – The next time a user logs on, he can choose to install the software from a dialog box that appears.
  • 10. ServicesServices • Run in the background on a Windows system to help the operating system run other programs • Services console is the central management point of services in Windows Vista and Windows 7
  • 12. The General TabThe General Tab
  • 13. The Log On TabThe Log On Tab
  • 14. The Recovery TabThe Recovery Tab
  • 15. The Dependencies TabThe Dependencies Tab
  • 16. The Print Spooler Service in the ServicesThe Print Spooler Service in the Services ConsoleConsole
  • 17. Selecting a Startup TypeSelecting a Startup Type
  • 18. MSCONFIGMSCONFIG • Also known as the System Configuration Utility • Lets you: – Enable or disable startup services – Set boot options such as booting into Safe Mode – Access tools like Action Center and Event Viewer – More
  • 19. The General TabThe General Tab
  • 20. The Boot TabThe Boot Tab
  • 21. Checking the Safe Boot Option onChecking the Safe Boot Option on the Boot Tabthe Boot Tab
  • 22. The Services TabThe Services Tab
  • 23. Disabling an Unneeded ServiceDisabling an Unneeded Service
  • 24. The Startup TabThe Startup Tab
  • 25. Disabling an Unneeded Startup ItemDisabling an Unneeded Startup Item
  • 27. The Tools TabThe Tools Tab
  • 28. File SystemsFile Systems • FAT, FAT32, and NTFS • NTFS-formatted disks best for Windows 7 • Can convert from one file system to another • Some conversions destroy existing data
  • 29. File SystemsFile Systems File System Maximum Partition Size Maximum File Size FAT 2 GB 2 GB FAT32 32 GB 4 GB NTFS 256 TB Limited by size of volume on which it resides
  • 31. Windows 7 LibrariesWindows 7 Libraries • A virtual folder that can display content from different locations (folders, for example) on your computer or an external drive • Looks like an ordinary folder but simply points to files and folders that are located elsewhere
  • 33. Selecting a Library in WhichSelecting a Library in Which to Include a Folderto Include a Folder
  • 34. The Locations HyperlinkThe Locations Hyperlink
  • 35. The Pictures Library Locations Dialog BoxThe Pictures Library Locations Dialog Box
  • 36. The Pictures Library Locations DialogThe Pictures Library Locations Dialog Box with a Newly Added FolderBox with a Newly Added Folder
  • 37. Creating a New LibraryCreating a New Library
  • 38. EncryptionEncryption • Encrypted data is “scrambled” but still readable and usable by the user who encrypted the file • That user and other authorized users can open and change the file as necessary • Unauthorized users who try to open the file or copy it receive “Access Denied” message
  • 39. EncryptionEncryption • Only the original owner and the computer’s designated recovery agent can access encrypted files • Encryption uses: – Encryption keys – Certificates
  • 40. Encrypting Files and Folders in Windows 7Encrypting Files and Folders in Windows 7 • Encrypting File System (EFS) – Encrypts information on hard disks, external flash disks, CDs, DVDs, backup tapes, and other types of physical media • Users can enforce encryption on data files, folders, and entire drives
  • 41. Encrypting Files and Folders in Windows 7Encrypting Files and Folders in Windows 7 • Advanced Attributes dialog box enables users to encrypt files and folders
  • 42. Encrypting Files and Folders in Windows 7Encrypting Files and Folders in Windows 7 • Encrypted (EFS) files and folders are displayed in green in Windows Explorer
  • 43. Personal Certificates in Certificate ManagerPersonal Certificates in Certificate Manager
  • 44. Using the Certificate Export WizardUsing the Certificate Export Wizard
  • 45. CompressionCompression • The process of decreasing the size of files or folders without affecting the files’ content • Decreases large files that would otherwise use a lot of storage space • Compressing files replaces repeated data with pointers to the data; pointers take up much less space than the repeated data, so the size of the file is reduced
  • 46. Compressing Files and Folders in Windows 7Compressing Files and Folders in Windows 7 • Advanced Attributes dialog box enables users to compress files and folders
  • 47. BitLocker Drive EncryptionBitLocker Drive Encryption • Encrypts an entire fixed disk to prevent access by unauthorized users • BitLocker To Go protects removable drives, such as external flash drives • BitLocker is available in Windows Ultimate and Enterprise editions only
  • 49. SummarySummary • You install applications, or programs, at the local level or the network level. • Use Control Panel to uninstall a local application. • Group Policy lets you control who can install software, and on which computers, and helps you push software updates and security configurations across the network. • Services run in the background on a Windows system to help the operating system run other programs.
  • 50. SummarySummary • Use MSCONFIG (System Configuration utility) to troubleshoot and diagnose startup problems. • The three primary types of file systems for Windows are FAT, FAT32, and NTFS. • A library is a virtual folder that points to resources. • Encrypting files and folders protects them from unwanted access. Microsoft uses the Encrypting File System (EFS) and BitLocker. • Compression reduces the size of files and folders without affecting their content.

Notes de l'éditeur

  1. The network method, along with Group Policy, gives an administrator more efficient control over who can use the software and who can remove it.
  2. Explain that in a Windows network in a domain environment, administrators can use Group Policy to ease the burden of administering and managing many users and client computers. Group Policy lets you control who may install software, and on which computers, and helps you push software updates and security configurations across the network. Group policies also exist in Windows 7 and other Windows operating systems. They are referred to as Local Group Policies and affect only the users who log on to a particular computer. This section focuses on Group Policy at the network domain level.
  3. Service startup types: Automatic (Delayed Start): The service starts approximately two minutes after the system has completed starting the operating system. Automatic: The service starts as the operating system starts. Manual: The service must be started manually, by a user, a dependent service, or a program. Disabled: The service is disabled and will not start.
  4. After changing options on the Startup tab, the Selective startup option is enabled on the General tab.
  5. The Disk Management MMC snap-in displays disks and partitions, and the file system in use.
  6. Libraries are accessed in Windows Explorer, just like files and folders. Windows 7 includes several default libraries: Documents, Music, Pictures, and Videos.
  7. When you add new files to a BitLocker-encrypted disk, the files are encrypted automatically. If you copy the files to another drive, BitLocker automatically decrypts the files, which means they’re no longer protected. Some computers have a Trusted Platform Module (TPM) chip on the motherboard. If the chip is present, BitLocker uses the TPM chip to protect the BitLocker keys.