An operating system is essential software that enables a computer to run by managing the computer’s processes and memory (Korkishko, 2017). It is an interface between the computer hardware and the computer user. It also supports the running of various software and hardware components of the machine. It is the work of the Operating System of a machine to ensure compatibility of any software being installed in the machine. Software running in a computer is housed by the operating system. Amongst other functions, the operating system performs memory management, device management, file management, processor management, security of the computer, taking control of the system performance, detecting errors and software-user coordination.
When preparing to install any software, it is important to take into consideration safety precautions both for the computer and the important data. Therefore, before starting the installation process, I will first ensure that the operating system software that I want to install is legit. I will access the product key and the activation key codes to ascertain if they are genuine. As a network administrator, I will also refer keenly to Dallas Technical center’s work and safety policies. I will go ahead and ask the Center’s Information Technology office to serve me with legit driver packs, reliable anti-virus software and the general information on the specifications of the computers, which is basically the manual containing factory information regarding the computers.
A file system is a scheme of organizing and storing computer files and information contained for simple and efficient retrieval (Pudipeddi, 2017). I will ensure proper configuration of the files in order to allow security configuration. For instance I will configure the file system as NTFS and not as FAT, FAT makes the computer less secure. I will check whether the operating is to be installed from CD-ROM, boot disks or from the network. I will also examine the service that the operating system will be required to offer, for example, if the installation will be server installation, then I will take keen interest on the DNS, DHCP and the computers Active Directory.
The operating system will have a license key in order for it to be acceptable. Actually all operating systems will require a license key for it to operate, it is also important to that I ensure that they product and activation key are not counterfeit. I will use data models for easy identification of which data should be migrated, for example the Data Flow Diagrams. I will test the migration technique more than once for purposes of proper functioning.
I will ensure data security by seeking external back up mechanism with enough space and virus proof. Another option I will consider is partitioning the internal disk so that I can install the operating system one partition while the other houses the data. I will show my client how and where he/she can access the operating system upon authentication, the user will be required to enter password in order to access the site. I will also inform the client that the system may at times be sluggish, especially when running more than one software at a time, many programs executing at the same time will bring about system deadlock hence slow performance of the computer.
Installing the desktop operating system should be carefully done to avoid unnecessary mistakes that can lead to poor performance of the computer (Wang, 2017). When choosing an installation method, I will consider the most efficient, secure and one with fast installation speed. It is also important to note that over the internet download and installation method is a no option.
As a network administrator for Dallas technical center, I will choose installation from the bootable CD-ROM. This method is easier and fastest compared to other installation options like over the network method. I will disconnect the computer from the network to the time of complete installation. Repairing the software is necessary since software breakdown cannot be ruled out in any system. I will run a vulnerability test on the software to fix any error in the operating system. I also will be conducting periodical recovery consoles to ensure reliability and security.
After a successive installation, it is now time to restore data from the back up location to the previous stations. I will first install an antivirus in the computer to clean up any unnecessary applications that might be risky to data security, after which I will transfer the data to their workstations.
Dallas technical center has large data storage units and several files that need to be properly stored. Since in the center we are using windows, I will create files and directories using windows explorer
It is therefore my responsibility to create a structure that can enhance easy access of the files. I will put the data into segments on different files so that the storage load is shared amongst smaller disks hence easy retrieval. I will use windows Explorer program, I will achieve this by creating folders, which are the directory structures. Below is what I will create for Dallas Technical center using windows explorer copywhiz
Step 1
I will open the program, windows explorer and select files, then m right-click and choose copywhiz than copy from menu. This is shown below:
Figure 1 showing open windows explorer
Step 2
I will navigate to the destination directory/ folder, right-click the folder inside and select copywhiz then paste. This is also shown below
Figure 2 showing windows explorer activity
Step 3
After I am done with copywhiz pasting, a copywhiz window will appear, I will again click on ‘advanced settings’ and select create folder only and click ok as shown below
Figure 3 showing how to create a folder (directory)
The above steps demonstrate how I will create the directories and files using windows explorer.
On configuring access to externally stored information:
When configuring desktop applications, I will need to carry out the following exercise
Figure 4 showing file association modification
A Command Line Interface (CLI) is a user interface to an operating system or any other software running in a computer, the user responds to a prompt by keying in commands on specific lines, where he/she receives a reply from the system, then the user enters successive commands and so on. Nowadays, users have a taste for graphical user interface (GUI) which is actually offered by popular operating systems such as Windows, Mac and BeOS.
Step 1
I will click on ‘start’ menu, then type ‘cmd’ and enter. The command prompt pops up. The command prompt looks as below
Figure 5 showing open command prompt
Step 2
I will give commands such as moving into the current directory, creating files and directories
My command on moving into a directory, I just type ‘dir’ in the command prompt and press enter.
In the above window, there are 7 directories
Creating a directory, I will key in a command ‘mkdir test’ then I will move into the directory by typing ‘cd command’.
Creating a file using the command prompt, I will type ‘edit techn.txt’ techn.txt is my file name, then ‘enter’ a blank window open meaning my file techn is ready for editing. I will type various commands like, ‘copy con techn.txt’ for copying the file contents.
Configuring user settings so as to be compatible with the organizations regulations is a requirement for any network administrator; various organizations have different rules that need incorporation into the network to offer better services to their clients.
I will Set default programs to match the business requirements by getting in the control panel then to set default programs and then set program associations. Here I will configure the program to be business oriented and select the relevant options. On passwords configuration, I will introduce new password formats for the institution by changing the static password enabling tool in the global configuration mode, ‘router (config)#’ then ‘password’
It is important to ensure security to any applications in an organization or network. I will ensure only licensed applications are installed at a price. Setting the desktop applications secure will be done by creating an administrator account in the computers with a different password.
A good desktop environment includes ease of access to applications and simple naming of the applications for the client not to struggle locating the applications. It is a strategy that needs usability testing and frequent fixing of undesirable changes.
I will conduct training and awareness to my fellow staff and users about our user standards. I will also carry out regular synchronization of the network to ensure no malicious entries are being dared. I will use the App Builder tool to develop common desktop applications. This application makes work easier on ‘help, Tool-Talk, Drag and drop’ activities. I will also develop a common desktop environment product glossary in order to enhance ‘source and reference’ method. This strategy will ensure proper usage of the graphical user interfaces.
Reference
KorkishICTNWK408 Configure a Desktop Environmentko, T. &. (2017). Method and system for providing security policy for Linux-based security operating system.
Pudipeddi, R. V. (2017). U.S. Patent No. 9,575,988. Patent and Trademark office.
Wang, X. W. (2017). Improved rule installation for real-time query service in software-defined enternet of vehicles. IEEE Transactions on intelligent Transportation systems, 225-235.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download