Computer Maintenance Technology

Total Page:16

File Type:pdf, Size:1020Kb

Computer Maintenance Technology SkillsUSA 2013 Contest Projects Computer Maintenance Technology Click the “Print this Section” button above to automatically print the specifications for this contest. Make sure your printer is turned on before pressing the button. Please Identify (in Windows registry) Where the value data would be present for object C:\WINDOWS\system32\odbcjt32.dll Answer: HKEY_LOCAL_MACHINE\SOFTWARE\ODBC\ODBCINST.INI\Driver do Microsoft dBase (*.dbf) Please Identify (in Windows registry) Where the value would be present for object "LegalNoticeCaption" HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Please Identify (in Windows registry) where you would locate the registry entries for installed Hotfixes HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\HotFix Please Identify (in Windows registry) where you would locate the current users "Wallpapaer" setting HKEY_CURRENT_USER\Control Panel\Desktop Please Identify (in Windows registry) where you would locate the Data Value "exefile" HKEY_CLASSES_ROOT\.exe file:///Users/craigmoore/Desktop/Contest%20Projects%202013/Raw/Computer%20Maintenance/Answer%20Key.txt[8/7/13 10:11:04 AM] Boot Issue Scoring Rubric Contestant Number Recorded # # # # # Correct the boot issue and successfully boot the Windows Operating system. (25 Points) Removal of the Operating System from diagnostic mode. (15 Points) In system properties, set performance for the visual effects to “Let Windows chose what’s best for my computer”. (12 Points) In system properties, Set memory usage to “Adjust for the performance of:” “Programs”. (12 Points) In explorer, set (By Check Mark) the following folder option: “Hide extensions for known file types” (12 Points) In explorer, set (By Check Mark) the following folder option: “Hide protected operating system files” (12 Points) In explorer, set (By Radio Button) the following folder option: “Do not show hidden files and folders” (12 Points) Total Score SkillsUSA 2013-2014 Computer Maintenance Technology State Contest Boot Issue: Contest Tech Chair Document Overview: Boot Issue is designed to ensure that students recognize and correct the most common causes of operating system startup failures. Summary: There are many common causes to operating system failures. In this module, we simulate a hard disk that has a bad sector in an area that directly affects NTDETECT.COM The NTDETECT.COM passes essential hardware configuration to the operating system loader “ntdlr”. As this system file (ntdetect) resides root of the system partition, damage to the file will cause constant rebooting. Other issue(s) will be introduced to test a student’s skill in navigating the operating system to correct basic startup issues. Disclaimer: We are attempting to simulate an issue that can occur at a hardware and software level. These concepts have been proven by being reproduced in labs however, we are not reproducing the issue directly for you. It is recommended that you follow the prerequisites and all instructions. When navigating control panel, we assume your have it set to “Classic View”. We recommend that all students be allowed familiarize themselves with their briefing document shortly before beginning the module. Prerequisites: (For Tech Chair) XP Professional Service Pack 3 Installed with “Recovery Mode” Contestant workstation with CD/DVD Readable (Recommend 5 stations for redundancy) Matching number of Windows Operating System Boot Disks (For the students to repair the OS. Timer Workstation or Stopwatch Problem Configurations: 1.) Select “Start > Control Panel > System”. Select “Advanced” and click the “Performance” radio button. 2.) Select the “Visual Effects Tab” Tab. Set for “Adjust for Best Performance” 3.) Select the “Advanced” Tab Set the memory usage field to “System Cashe”. 4.) Click “OK”. 5.) Select Start > Run > , then type “MSCONFIG” in the run. 6.) Once System Configuration Utility opens select the general tab. Problem Configurations (continued): 7.) Select Diagnostic Startup. Apply but, do not restart then system. Additional Problem Configuration 1.) Open Windows Explorer and from “Tools” context menu select “Folder Options” 2.) Under hidden files and folders, select “Show hidden files and folders” 3.) Uncheck “Hide extensions for know file types” and “Hide Protected operating system files”. 4.) Click Apply and Ok. 5.) Navigate to C: drive and in the root of C: and “Cut” off “NTDETECT.COM” (Copy to a flash drive to save for testing) 6.) Right click in the explorer window and create a new text document. Note: when you create, verify that is saved as NTDETECT.COM. (We include a copy of a faulty NTDETECT.com file if you would prefer to copy it in. 7.) The station may now be rebooted to test the failure state. When restarting the computer will continue to reboot when the ntldr request hardware information from NTDETECT.COM. Remember to test all of your configurations multiple times and adjust any of the scenarios for an inclusions or exclusions. For additional information on understanding the Windows Startup Process, refer to: http://technet.microsoft.com/en-us/library/bb457123.aspx SkillsUSA 2013-2014 Computer Maintenance Technology State Contest Boot Issue Briefing: This module is designed to test your knowledge of understanding and troubleshooting the Windows Startup Process. Your Task: The computer was reviewed by a technician whom was unable to resolve the issue. During the troubleshooting process, the technician placed the system in a diagnostic mode prior to restarting. Following the restart, the computer is unable to boot to the operating system. You are expected to get the operating system to boot with several tasks that will be accompanied following removing the system from diagnostic mode in Windows. Scoring Criteria: 25 Points Correct the boot issue and successfully boot the Windows Operating system. 15 Points Removal of the Operating System from diagnostic mode. 12 Points In system properties, set performance for the visual effects to “Let Windows chose what’s best for my computer”. 12 Points In system properties, Set memory usage to “Adjust for the performance of:” “Programs”. 12 Points In explorer, set (By Check Mark) the following folder option: “Hide extensions for known file types” 12 Points In explorer, set (By Check Mark) the following folder option: “Hide protected operating system files” 12 Points In explorer, set (By Radio Button) the following folder option: “Do not show hidden files and folders” 100 Points Possible Total Points Command Line Scoring Rubric Contestant Number Recorded # # # # # Use MKDIR Command to create the directory “Apps”: (15 Points) Using move.exe the file “delprof.exe” from C:\Resources folder to C:\Apps (25 Points) Use the “Start” command to install Delete Profile with a switch to delay until the installation completes (25 Points) Using "xcopy.exe" add a host blocker C:\Windows\System32\Drivers\Etc (15 Points) Using help from a Command Prompt identify the command that is used to display or modify access control lists of files. (document in your included worksheet) (5 Points) Using help from a Command Prompt identify the command that is used to change a FAT partition to NTFS. (document in your included worksheet) (5 Points) Using help from a Command Prompt identify the command that is used to call one batch file from another. (document in your included worksheet) (5 Points) Using help from a Command Prompt identify the command that is used to display differences between files. (document in your included worksheet) (5 Points) LEFT BLANK INTENTIONALLY Totals (100 Points) SkillsUSA 2013-2014 Computer Maintenance Technology State Contest Module: Command Line: Contest Tech Chair Document Overview: Command Line is designed to gets students working outside the Graphical user interface. The role of this is to teach the students that the functions performed outside the GUI also are used for a variety Summary: Each contestant will use a pre-configure script to put in the command they will need to complete the task. This includes: • Make a directory • Copy files • Install a program In addition, they will need to identify 4 commands using help files. • CACLS (Access List) • CONVERT (Change non-system partition formats) • FC (Compare files differences) • CALL (Request one batch file within a batch) We recommend that all students be given a station setup with MS Steady State so the station is instantly “sanitized” after reboot. All work should be completed and save to a thumb drive. Prerequisites: (For Tech Chair) XP Professional Service Pack 3 (50% free disk space required to load set/steady state) For more information on steady state please refer to: http://technet.microsoft.com/en-us/magazine/2008.01.desktopfiles.aspx Contestant workstation (Recommend 5 stations for redundancy) 5 USB Drives to save work to (Must be cleaned at the end of scoring to return drive to the next student) Timer Workstation or Stopwatch Tech Chair Required Configuration Steps: 1.) Verify that you have enough disk space over 50% free so that MS Steady State can be loaded and configured. 2.) Load the Windows XP SP3 operating system with all appropriate drivers. Tech Chair Required Configuration Steps (continued): 3.) Copy the Student command script to “C:\Documents and Settings\All Users” 4.) Copy Delprof.exe and host to C:\Resources folder 5.) When loading steady state, remove the following check boxes when setting computer restrictions: • Remove the Shutdown and Turnoff options • Prevent users from creating folders and files on C:\ • Prevent write access to USB Storage Devices 6.) For protecting the hard disk: • Switch to On • Remove all changes at restart 7.) From this point, the image is complete, the student may restart the workstation to clean it. Note: Remind them to save their work to the USB drive. SkillsUSA 2013-2014 Computer Maintenance Technology State Contest Module: Command Line: Briefing: This module is designed to us your skill at command line. We expect for entry level technicians to be familiar with navigating an operating system to perform tasks without having to use the Graphical User Interface (GUI). Your Task: You have been given a command line script with 4 tasks that you are required to script out.
Recommended publications
  • Windows Speed Secrets Unleashed
    Windows Speed Secrets Unleashed Free E -book Top 10 Ways to Speed Up Windows XP or Vista W W W . T U N E - Y O U R - P C . C O M Table of Contents Windows XP XP Speed Tip #1: Disable Startup Programs ..........................................................................2 XP Speed Tip #2: Increase Virtual Memory ............................................................................5 XP Speed Tip #3: Remove Spyware and Adware ...................................................................8 XP Speed Tip #4: Optimize Visual Effects ..............................................................................9 XP Speed Tip #5: Speed Up File Browsing ..........................................................................12 XP Speed Tip #6: Clean Your Windows Registry .................................................................13 XP Speed Tip #7: Enable Direct Memory Access (DMA) ......................................................14 XP Speed Tip #8: Cleanup Your Hard Disk ..........................................................................17 XP Speed Tip #9: Defrag Your Hard Disk .............................................................................19 XP Speed Tip #10: Disable File Indexing..............................................................................21 Windows Vista Vista Speed Tip #1: Disable Startup Programs .....................................................................22 Vista Speed Tip #2: Increase Virtual Memory .......................................................................25
    [Show full text]
  • Supporting Operating System Installation | 3
    cc01SupportingOperatingSystemInstallation.indd01SupportingOperatingSystemInstallation.indd PagePage 1 08/10/1408/10/14 4:334:33 PMPM martinmartin //208/WB01410/XXXXXXXXXXXXX/ch01/text_s208/WB01410/XXXXXXXXXXXXX/ch01/text_s Supporting Operating LESSON 1 System Installation 70-688 EXAM OBJECTIVE Objective 1.1 – Support operating system installation. This objective may include but is not limited to: Support Windows To Go; manage boot settings, including native virtual hard disk (VHD) and multi-boot; manage desktop images; customize a Windows installation by using Windows Preinstallation Environment (PE). LESSON HEADING EXAM OBJECTIVE Using a Troubleshooting Methodology Viewing System Information Using the Event Viewer Supporting Windows To Go Support Windows To Go Creating and Deploying a Windows To Go Workspace Drive Booting into a Windows To Go Workspace Managing Boot Settings Manage boot settings, including native virtual hard disk (VHD) and multi-boot Using BCDEdit and BCDBoot Configuring a Multi-Boot System Manage boot settings, including native virtual hard disk (VHD) and multi-boot Configuring a Native VHD Boot File Manage boot settings, including native virtual hard disk (VHD) and multi-boot Understanding VHD Formats Installing Windows 8.1 on a VHD with an Operating System Present Installing Windows 8.1 on a VHD Without an Operating SystemCOPYRIGHTED Present MATERIAL Managing Desktop Images Manage desktop images Capturing Images Modifying Images using DISM Customizing a Windows Installation by Using Windows PE Customize a Windows
    [Show full text]
  • Introducing Windows 10 for IT Professionals Technical Overview
    Introducing Windows 8.1 for IT Professionals Introducing Introducing Windows 10 for IT Professionals Technical Overview ED BOTT 9780735696976_IntroWin10_eBook_cover.indd 1 11/30/2015 9:24:00 AM PUBLISHED BY Microsoft Press A Division of Microsoft Corporation One Microsoft Way Redmond, Washington 98052-6399 Copyright 2016 © Microsoft Corporation All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or by any means without the written permission of the publisher. ISBN: 978-0-7356-9697-6 Printed and bound in the United States of America. First Printing Microsoft Press books are available through booksellers and distributors worldwide. If you need support related to this book, email Microsoft Press Support at [email protected]. Please tell us what you think of this book at http://aka.ms/tellpress. This book is provided “as-is” and expresses the author’s views and opinions. The views, opinions and information expressed in this book, including URL and other Internet website references, may change without notice. Some examples depicted herein are provided for illustration only and are fictitious. No real association or connection is intended or should be inferred. Microsoft and the trademarks listed at http://www.microsoft.com/about/legal/en/us/IntellectualProperty/ Trademarks/EN-US.aspx are trademarks of the Microsoft group of companies. All other marks are property of their respective owners. Acquisitions Editor: Rosemary Caperton Project Editor: Christian Holdener; S4Carlisle Publishing
    [Show full text]
  • Regrun? Regrun Is an Excellent Tool Kit for Protecting Your Computer Against Viruses Or Trojans/Spyware/ Adware Parasites Or Rootkits
    What is RegRun? RegRun is an excellent tool kit for protecting your computer against viruses or Trojans/Spyware/ Adware parasites or Rootkits. The RegRun uses the newest technology in the world. Fight with the bad guys by the most powerful weapon. What you should know about RegRun? RegRun is not an antivirus in a common sense. It does not scan your disk and detect/cure using signature database. There are a lot of antiviral programs that you can choose. RegRun checks all Windows startup holes and it can detect and remove any UNKNOWN virus. The modern viruses spreads to the millions computers in the world for a pair days. First, a virus kills an antivirus and disables a way to update the antiviral databases. RegRun prevents a virus auto start. Later you can clean your computer by antivirus to remove virus according files and registry records. RegRun resolves three main tasks: 1. Makes backups of the registry and important files. Restores a computer even if it does not boot. 2. Detects a virus in your computer. 3. Removes a virus from your computer. Hope you enjoy it! Who needs RegRun? If you are a user who is exposed to sources of viruses and Trojans (e.g. you are an Internet surfer, E-mail recipient, one who buys "safe" software on CD's, or one who receives data on floppy disks), or if you are an experienced user who needs to adjust your startup configuration as a function of testing and debugging new software, you need RegRun. RegRun is the best choice for users who wants to get maximum security, for power users and computer professionals.
    [Show full text]
  • Emulex Drivers for Windows User Guide Table of Contents
    Emulex® Drivers for Windows User Guide Release 12.4 Broadcom DRVWin-LPE-UG124-100 August 27, 2019 Broadcom, the pulse logo, Connecting everything, Avago Technologies, Avago, the A logo, Emulex, LightPulse, OneCommand, and OneConnect are among the trademarks of Broadcom and/or its affiliates in the United States, certain other countries, and/or the EU. The PowerPC name and logo are registered trademarks of IBM Corp. and used under license therefrom. Copyright © 2003–2019 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. For more information, please visit www.broadcom.com. Broadcom reserves the right to make changes without further notice to any products or data herein to improve reliability, function, or design. Information furnished by Broadcom is believed to be accurate and reliable. However, Broadcom does not assume any liability arising out of the application or use of this information, nor the application or use of any product or circuit described herein, neither does it convey any license under its patent rights nor the rights of others. Emulex Drivers for Windows User Guide Table of Contents Chapter 1: Introduction ...................................................................................................................... 5 1.1 Abbreviations ............................................................................................................................................................5 Chapter 2: Installation .......................................................................................................................
    [Show full text]
  • Computer Operating Systems: (Windows 7)
    SYLLABUS DATE OF LAST REVIEW: 11/6/2018 CIP CODE: 52.0104 SEMESTER: Departmental Syllabus COURSE TITLE: Computer Operating Systems: (Windows 7) COURSE NUMBER: CIST0147 CREDIT HOURS: 4 INSTRUCTOR: Departmental Syllabus OFFICE LOCATION: Departmental Syllabus OFFICE HOURS: Departmental Syllabus TELEPHONE: Departmental Syllabus EMAIL: Departmental Syllabus KCKCC-issued email accounts are the official means for electronically communicating with our students. PREREQUISITES: CIST 0117 (Local Area Networking) REQUIRED TEXT AND MATERIALS: Please check with the KCKCC bookstore, http://www.kckccbookstore.com for the required text for your particular class. COURSE DESCRIPTION: This class covers a microcomputer operating system used by personal and/or workstation computer. With new computer systems being introduced, this class will introduce students to the most current “version” and to a specific operating system. The specific operating system name will be provided in the class schedule after “CPU O/S=Win 7” and may vary in credit hours. Preparation MCP for Exam 70-680 METHOD OF INSTRUCTION: A variety of instructional methods may be used depending on content area. These include but are not limited to: lecture, multimedia, cooperative/collaborative learning, labs and demonstrations, projects and presentations, speeches, debates, and panels, conferencing, performances, and learning experiences outside the classroom. Methodology will be selected to best meet student needs. COURSE OUTLINE: I. Introducing Windows 7 A. List the new features in Windows 7. B. Name the various editions of Windows 7, their intended markets, and the differences between them. C. Understand the Windows 7 system requirements. D. Determine whether an existing computer is capable of running Windows 7. E. Explain the upgrade paths to Windows 7.
    [Show full text]
  • Eeye Bootroot.Pdf
    Derek Soeder Ryan Permeh b l eEye BootRoot a This presentation will cover the eEye BootRoot project, an exploration of technology that boot sector code can use to subvert the Windows NT-family kernel and retain the potential for c execution, even after Windows startup—a topic made apropos by the recent emergence of Windows rootkits into mainstream k awareness. We will provide some brief but technical background on the Windows startup process, then discuss BootRoot and related technology, including a little-known stealth technique for h low-level disk access. Finally, we will demonstrate the proof-of- concept BootRootKit, loaded from a variety of bootable media. a t b r i e f Derek Soeder is a Software Engineer and after-hours researcher at eEye Digital Security. In addition to i participating in the ongoing development of eEye's Retina Network Security Scanner product, Derek has also produced n a number of internal technologies and is responsible for the discovery of multiple serious security vulnerabilities. His main areas of interest include operating system internals and machine code-level manipulation. g Ryan Permeh is a Senior Software Engineer at eEye Digital Security. He focuses mainly on the Retina and SecureIIS product lines. He has worked in the porting of nmap and s libnet to Windows, as well as helping with disassembly and reverse engineering, and exploitation efforts within the eEye research team. b l a c k eEye BootRoot: h CLICKA Basis TO for ADD Bootstrap-Based MASTER Windows TITLE Kernel ALL Code CAPS a Derek Soeder, Software
    [Show full text]
  • TECHNOLOGY LIVELIHOOD EDUCATION (ICT) Computer System Servicing (CSS) Quarter 1- Module 2
    TECHNOLOGY LIVELIHOOD EDUCATION (ICT) Computer System Servicing (CSS) Quarter 1- Module 2 CONFIGURE COMPUTER SYSTEM AND NETWORKS Prepare Computer Systems, tools, devices, equipment and materials for configuration. TLE –ICT -CSS Grade 10 Alternative Delivery Mode Quarter 1 – Module 1: Configure Computer System and Networks First Edition, 2020 Republic Act 8293, section 176 states that: No copyright shall subsist in any work of the Government of the Philippines. However, prior approval of the government agency or office wherein the work is created shall be necessary for exploitation of such work for profit. Such agency or office may, among other things, impose as a condition the payment of royalties. Borrowed materials (i.e., songs, stories, poems, pictures, photos, brand names, trademarks, etc.) included in this module are owned by their respective copyright holders. Every effort has been exerted to locate and seek permission to use these materials from their respective copyright owners. The publisher and authors do not represent nor claim ownership over them. Published by the Department of Education Secretary: Leonor Magtolis Briones Undersecretary: Diosdado M. San Antonio Development Team of the Module Writers: MYRAH S. ROSALES Editors: Teresita P. Mansueto, Ph. D Reviewers: Mary Jane Y. Cardente Illustrator: MYRAH S. ROSALES Layout Artist: MYRAH S.ROSALES Management Team: Chairperson: Arturo B. Bayocot, PhD, CESO III, Regional Director Assistant Chairperson: Randolph B. Tortola PhD, CESO IV, Schools Division Superintendent Shambaeh A. Usman, PhD, Assistant Schools Division Superintendent Mala Epra B. Magnaong, PhD, CLMD Chief Neil A. Improgo ,PhD Regional EPS LRMS Bienvenido V. Tagolimot,Jr. Regional ADM Coordinator Members: Elbert R.
    [Show full text]
  • Final Exam Review
    COM153 - FARRIS Final Exam Review 1. This type of small integrated circuit is central for a desktop computer, performing the processing for the computer. A. RAM B. ROM BIOS C. motherboard D. microprocessor 2. This is the central circuit board of a computer. A. memory B. motherboard C. ROM BIOS D. video adapter 3. This integrated circuit chip contains the program code that informs the processor of the devices present and how to communicate with them. A. ROM BIOS B. RAM C. video adapter D. motherboard 4. To communicate from your desktop PC to a service on your network and access the features of that service requires special ____________ software. A. driver B. ROM BIOS C. operating system D. client 5. The user communicates with the OS through this software layer. A. jog management B. user interface C. device management D. video adapter 6. What job function is not found in single tasking operating systems? A. user interface B. device management C. memory management D. task management COM153 - FARRIS 7. Without this feature of modern desktop OSs, you would not be able to open a new application after your operating system and currently opened applications and data filled the entire physical RAM. A. RTOS B. device management C. GUI D. virtual memory 8. What is the greatest amount of RAM usable by a 64-bit edition of Windows 7? A. 4 GB B. 128 GB C. 192 GB D. 16 GB 9. What term is used in a GUI to describe a specialized disk file that contains information about other files? A.
    [Show full text]
  • Virus Protection for Windows by Roger A
    Malicious Mobile Code: Virus Protection for Windows By Roger A. Grimes Publisher: O'Reilly Pub Date: August 2001 ISBN: 1-56592-682-X Table of Pages: 542 • Contents • Index • Reviews Reader • Reviews • Errata Copyright Preface About This Book Why Another Book on Viruses? What This Book Doesn't Cover Organization of the Book Conventions Used in This Book Software Covered in This Book Comments and Questions Acknowledgments Chapter 1. Introduction Section 1.1. The Hunt Section 1.2. What Is Malicious Mobile Code? Section 1.3. Malicious Code and the Law Section 1.4. Malicious Code-Writing Subculture Section 1.5. MMC Terminology Section 1.6. Summary Chapter 2. DOS Computer Viruses Section 2.1. Introduction Section 2.2. DOS Technologies Section 2.3. DOS Virus Technologies Section 2.4. Types of DOS Viruses Section 2.5. Virus Defense Mechanisms Section 2.6. Examples of DOS Viruses Section 2.7. Detecting a DOS-Based Computer Virus Section 2.8. Removing a DOS Virus Section 2.9. Protecting Yourself from Viruses Section 2.10. Risk Assessment -- Low Section 2.11. Summary Chapter 3. Windows Technologies Section 3.1. Windows Technologies Section 3.2. New Windows Versions Section 3.3. Summary Chapter 4. Viruses in a Windows World Section 4.1. DOS Viruses on Windows Platforms Section 4.2. Windows Viruses on Windows Platforms Section 4.3. Signs and Symptoms of Windows NT Virus Infections Section 4.4. Windows Virus Examples Section 4.5. Detecting a Windows Virus Section 4.6. Removing Viruses Section 4.7. Removing Infected Files Section 4.8.
    [Show full text]
  • The Windows Startup and Shutdown Process
    The Windows Startup and Shutdown Process Introduction Have you ever wondered what Windows does when it starts up, or when it shuts down? In this thread I will be covering and going in-depth (to a certain extent) the process of Windows startup and shutdown. I must warn you, there will be some X rated content – if you faint at the sight of raw, naked technical information, I would advise you do not read this thread. ...who am I kidding, this is Overclock.net after all! This thread covers the Windows startup and shutdown process in Windows NT 6.1 (i.e. Windows 7 and Windows Server 2008 R2). It does not cover the startup and shutdown process of previous or later versions, however with Windows Vista or Windows 8, you can expect minimal changes. Versions prior to Windows Vista (e.g. Windows XP) differ quite a bit, however. I would expect that some of you probably already know much of this, but I am hoping that for those who do there are some extra tidbits that you didn’t know, and perhaps were even curious about. I know I certainly was asking many of the questions a long time ago that if I could go forward in time, would have been able to answer from this thread. Topics covered Windows boot installation BIOS boot process o Windows setup program interaction o Getting up off the ground o The Windows Boot Manager UEFI boot process The Windows Boot Loader Windows startup process o Kernel initialization . Phase zero initialization . Phase one initialization o Subsystem startup and interactive logon Windows shutdown process o Initiating shutdown .
    [Show full text]
  • Introducing Windows 10 for IT Professionals Preview Edition
    Introducing Windows 8.1 for IT Professionals Introducing Introducing Windows 8.1 for IT Professionals Get a head start evaluating Windows 8.1—with early technical Note insights from award-winning journalist and Windows expert Ed This title is also available as a free Bott. This guide introduces new features and capabilities, providing eBook from Microsoft at: a practical, high-level overview for IT professionals ready to begin http://aka.ms/mspressfree deployment planning now. About the Author Preview new features and enhanced capabilities, Ed Bott is an award-winning journalist including: known to millions of readers through two decades of writing for leading • The Windows 8.1 user experience industry publications and more than 25 • Deployment tools and technologies books on Microsoft Office and Windows, • Security features including Windows 7 Inside Out and • Internet Explorer 11 Microsoft Office Inside Out: 2013 Edition. • Delivering Windows Store apps • Recovery options • Networking and remote access • Virtualization Introducing • Windows RT 8.1 • Managing mobile devices Also see Windows 10 for Windows 8.1 Administration Microsoft Office Pocket Consultant Inside Out IT Professionals Essentials & Configuration 2013 Edition ISBN: 9780735682658 ISBN: 9780735669062 Storage, Security, & Networking ISBN: 9780735682610 Preview Edition U.S.A. $9.99 Canada $10.99 [Recommended] Operating Systems/Windows Celebrating 30 years! ED BOTT Introducing Windows 10 for IT Professionals, Preview Edition Ed Bott PUBLISHED BY Microsoft Press A Division of Microsoft Corporation One Microsoft Way Redmond, Washington 98052-6399 Copyright 2015 © Microsoft Corporation All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or by any means without the written permission of the publisher.
    [Show full text]