Windows XP 3 Windows 1.X

Total Page:16

File Type:pdf, Size:1020Kb

Windows XP 3 Windows 1.X Unit 3 A Brief Look at the History of Windows Copyright © 2005 Heathkit Company, Inc. All rights reserved. Constitution Week • Freedom of speech • Freedom from unreasonable search and seizure 2 Windows Evolution • Windows 1.x • Windows 2.x • Windows 3.x • Windows for Workgroups • Windows NT • Windows 95 • Windows 98 • Windows 2000 • Windows Me • Windows XP 3 Windows 1.x • Enhanced version of MS-DOS shell. • Supported cooperative multitasking. 4 Windows 2.x • Added icons to represent files. • Allowed application windows to overlap. • Supported PIFs for DOS mode. • Windows/386 allowed multiple DOS sessions in extended memory. 5 Windows 3.0 • Added the Program and File managers to the display. • Allowed Windows to take full advantage of the Intel 80386 processor features. • Supports virtual memory on the hard disk drive. 6 Windows 3.1 • Improved the graphical display capabilities. • Added full multimedia support. 7 Windows 3.11 • Added a full 32-bit application environment. • Not a true 32-bit operating system. 8 Windows for Workgroups • Added limited network support to both Windows 3.1 and Windows 3.11. • Only Windows for Workgroups 3.11 widely used because of its support for 32-bit applications. 9 Windows NT 3.x • 32-bit Windows operating system. • True network operating system. • Comes in two flavors, server and workstation. • Uses Windows 3.1-style GUI. • Somewhat compatible with DOS and earlier versions of Windows. 10 Windows NT 4 • Uses Windows 95-style GUI. • Provides preemptive multitasking. • System completely protected from errant 16-bit and 32-bit Windows- based applications. • Unlimited system resources. • Business oriented operating system. 11 Windows 95a, Windows in Transition • A bridge from the 16-bit world of Windows 3.X to the 32-bit world of Windows NT • Runs Windows 3.11 and MS-DOS programs. • Runs most 32-bit Windows NT programs. 12 Windows 95 Expands the World of Computing • 32-bit operating system. • Relies on MS-DOS to support a portion of the hardware interface. • Supports long file names. • Adds Internet capabilities. 13 Windows 98 • Updated version of Windows 95 • Many new features • Fixes many of the bugs in Windows 95 • Better hardware support • Better Internet integration 14 Windows 2000 • Updated version of Windows NT 4 • Many new features • Fixes many of bugs in Windows NT4 • Better hardware support • Better Internet integration 15 The Registry Copyright © 2005 Heathkit Company, Inc. All rights reserved. The Registry • A collection of database files containing configuration and preference information. 17 The Registry Contains • Information formerly stored in several places, including: –CONFIG.SYS –AUTOEXEC.BAT –WIN.INI, and other .INI files –Other config files created by applications 18 Editing the Registry • Regedit 19 There is no Undo • No “Save As” • No “Exit without Saving” 20 The system could crash • Some changes occur now! • Some changes require reboot 21 Most adjustments can be done at the GUI • Control Panel • TweakUI • Properties tabs 22 Registry Editing Rules: Don’t attempt to edit the registry before you: 1. Make a backup. 2. Can restore from a backup. 3. Test the backup mechanism. 23 Registry Editing Rules: Don’t edit the registry if you can make the change in a dialog box. The GUI watches out for you… …but Regedit doesn’t care. 24 Registry Editing Rules: Don’t fool with the registry on an important computer. 25 The Registry is Critical! • If the registry fails, Windows fails • The registry can be corrupted • The registry can be backed-up • The registry can be restored 26 Registry Backups • Win 95 is manual • Win 98 is automatic • Win Me is automatic • Win 2000/XP are manual/automatic 27 Windows 95: No workable backup scheme • The backup scheme doesn’t work well • Make manual backups ASAP! • Use regedit commands to backup and repair 28 Windows 95 Emergency Preparation • Make registry backups ASAP • Copy them to a safe place • Not if, but when 29 Windows 98 makes five backups • A backup a day… • Recovery is almost automatic 30 Windows 98 Emergency Preparation • Copy one of the rb00*.cab files to a safe place 31 WindowsMe makes five backups • Auto-Recovery is questionable • System Recovery is designed to fix problems 32 Windows Me Emergency Preparation • Create “restore points” in System Restore • Copy one of the rb00*.cab files to a safe location 33 Windows 2000 • Last Known Good startup • Inherently more secure 34 Windows 2000 Emergency Prep • Create an Emergency Repair Disk (ERD) using Backup 35 36 Windows XP • Last Known Good Startup • Driver Rollback • System Restore • Other Tools 37 38 Windows 98 Registry Files Location Files 39 Hives Location Files/Hives 40 The Registry 41 Subtrees Subtrees 42 Keys Keys 43 Subkeys Subkeys 44 Value Entry 45 Binary Data 46 Typical Subkey Data 47 •Hive File –Registry • Subtree – Key » Subkey -Value Entry 48 The Windows Desktop Copyright © 2005 Heathkit Company, Inc. All rights reserved. The Windows Desktop 50 51 The Taskbar 52 53 Control Button (left mouse) 54 The Maximize Icon 55 Full Screen Icon Icon to select full screen display 56 Windowed Icon Icon to select windowed display 57 The Minimize Icon 58 59 60 61 Tabs Tabs 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85.
Recommended publications
  • What Is an Operating System III 2.1 Compnents II an Operating System
    Page 1 of 6 What is an Operating System III 2.1 Compnents II An operating system (OS) is software that manages computer hardware and software resources and provides common services for computer programs. The operating system is an essential component of the system software in a computer system. Application programs usually require an operating system to function. Memory management Among other things, a multiprogramming operating system kernel must be responsible for managing all system memory which is currently in use by programs. This ensures that a program does not interfere with memory already in use by another program. Since programs time share, each program must have independent access to memory. Cooperative memory management, used by many early operating systems, assumes that all programs make voluntary use of the kernel's memory manager, and do not exceed their allocated memory. This system of memory management is almost never seen any more, since programs often contain bugs which can cause them to exceed their allocated memory. If a program fails, it may cause memory used by one or more other programs to be affected or overwritten. Malicious programs or viruses may purposefully alter another program's memory, or may affect the operation of the operating system itself. With cooperative memory management, it takes only one misbehaved program to crash the system. Memory protection enables the kernel to limit a process' access to the computer's memory. Various methods of memory protection exist, including memory segmentation and paging. All methods require some level of hardware support (such as the 80286 MMU), which doesn't exist in all computers.
    [Show full text]
  • Mac OS X: an Introduction for Support Providers
    Mac OS X: An Introduction for Support Providers Course Information Purpose of Course Mac OS X is the next-generation Macintosh operating system, utilizing a highly robust UNIX core with a brand new simplified user experience. It is the first successful attempt to provide a fully-functional graphical user experience in such an implementation without requiring the user to know or understand UNIX. This course is designed to provide a theoretical foundation for support providers seeking to provide user support for Mac OS X. It assumes the student has performed this role for Mac OS 9, and seeks to ground the student in Mac OS X using Mac OS 9 terms and concepts. Author: Robert Dorsett, manager, AppleCare Product Training & Readiness. Module Length: 2 hours Audience: Phone support, Apple Solutions Experts, Service Providers. Prerequisites: Experience supporting Mac OS 9 Course map: Operating Systems 101 Mac OS 9 and Cooperative Multitasking Mac OS X: Pre-emptive Multitasking and Protected Memory. Mac OS X: Symmetric Multiprocessing Components of Mac OS X The Layered Approach Darwin Core Services Graphics Services Application Environments Aqua Useful Mac OS X Jargon Bundles Frameworks Umbrella Frameworks Mac OS X Installation Initialization Options Installation Options Version 1.0 Copyright © 2001 by Apple Computer, Inc. All Rights Reserved. 1 Startup Keys Mac OS X Setup Assistant Mac OS 9 and Classic Standard Directory Names Quick Answers: Where do my __________ go? More Directory Names A Word on Paths Security UNIX and security Multiple user implementation Root Old Stuff in New Terms INITs in Mac OS X Fonts FKEYs Printing from Mac OS X Disk First Aid and Drive Setup Startup Items Mac OS 9 Control Panels and Functionality mapped to Mac OS X New Stuff to Check Out Review Questions Review Answers Further Reading Change history: 3/19/01: Removed comment about UFS volumes not being selectable by Startup Disk.
    [Show full text]
  • ETS4P4 Terminal Server
    ETS4P4 Terminal Server Installation Guide Thank you for purchasing this Lantronix ETS Ethernet Terminal Server. As the newest addition to our successful Ethernet terminal server family, the ETS uses software for multiprotocol Ethernet connections that has over 5 years of real-world feedback and de- velopment behind it. Lantronix is constantly improving the capabilities of our prod- ucts, and we encourage you to take advantage of new features through our FREE software upgrades (available via ftp over the Internet or BBS.) Our Flash ROM products, including this ETS, provide the sim- plest means for upgrades and installation. I hope you find this manual easy to use, and thorough in its explanation of the power- ful features you can now access on your network. Brad Freeburg President Contents 1 Introduction Overview...........................................................................1-1 Configuration ................................................1-1 Software ..........................................................1-2 About the Manuals ..........................................................1-2 2 Installation Overview...........................................................................2-1 ETS Components..............................................................2-1 Installation ........................................................................2-2 Selecting a Location for the ETS ..................2-2 Connecting to the Ethernet...........................2-2 Connecting a Terminal..................................2-3
    [Show full text]
  • CS 151: Introduction to Computers
    Information Technology: Introduction to Computers Handout One Computer Hardware 1. Components a. System board, Main board, Motherboard b. Central Processing Unit (CPU) c. RAM (Random Access Memory) SDRAM. DDR-RAM, RAMBUS d. Expansion cards i. ISA - Industry Standard Architecture ii. PCI - Peripheral Component Interconnect iii. PCMCIA - Personal Computer Memory Card International Association iv. AGP – Accelerated Graphics Port e. Sound f. Network Interface Card (NIC) g. Modem h. Graphics Card (AGP – accelerated graphics port) i. Disk drives (A:\ floppy diskette; B:\ obsolete 5.25” floppy diskette; C:\Internal Hard Disk; D:\CD-ROM, CD-R/RW, DVD-ROM/R/RW (Compact Disk-Read Only Memory) 2. Peripherals a. Monitor b. Printer c. Keyboard d. Mouse e. Joystick f. Scanner g. Web cam Operating system – a collection of files and small programs that enables input and output. The operating system transforms the computer into a productive entity for human use. BIOS (Basic Input Output System) date, time, language, DOS – Disk Operating System Windows (Dual, parallel development for home and industry) Windows 3.1 Windows 3.11 (Windows for Workgroups) Windows 95 Windows N. T. (Network Technology) Windows 98 Windows N. T. 4.0 Windows Me Windows 2000 Windows XP Home Windows XP Professional The Evolution of Windows Early 80's IBM introduced the Personal PC using the Intel 8088 processor and Microsoft's Disk Operating System (DOS). This was a scaled down computer aimed at business which allowed a single user to execute a single program. Many changes have been introduced over the last 20 years to bring us to where we are now.
    [Show full text]
  • Real-Time Operating Systems with Example PICOS18
    Real-Time Operating Systems With Example PICOS18 Sebastian Fischmeister 1 What is an Operating System? . A program that acts as an intermediary between a user of a computer and the computer hardware . Operating system goals: o Execute user programs and make solving user problems easier. o Make the computer system convenient to use . Use the computer hardware in an efficient manner CSE480/CIS700 S. Fischmeister 2 1 Computer System Components 1. Hardware – provides basic computing resources (CPU, memory, I/O devices) 2. Operating system – controls and coordinates the use of the hardware among the various application programs for the various users 3. Applications programs – define the ways in which the system resources are used to solve the computing problems of the users (compilers, database systems, video games, business programs) 4. Users (people, machines, other computers) CSE480/CIS700 S. Fischmeister 3 Abstract View of System Components CSE480/CIS700 S. Fischmeister 4 2 What is an RTOS? . Often used as a control device in a dedicated application such as controlling scientific experiments, medical imaging systems, industrial control systems, and some display systems . Well-defined fixed-time constraints CSE480/CIS700 S. Fischmeister 5 More Precisely? . The system allows access to sensitive resources with defined response times. o Maximum response times are good for hard real-time o Average response times are ok for soft real-time . Any system that provides the above can be classified as a real-time system o 10us for a context switch, ok? o 10s for a context switch, ok? CSE480/CIS700 S. Fischmeister 6 3 Taxonomy of RTOSs .
    [Show full text]
  • CS 450: Operating Systems Michael Lee <[email protected]>
    The Process CS 450: Operating Systems Michael Lee <[email protected]> Agenda - The Process: what is it and what’s in it? - Forms of Multitasking - Tracking processes in the OS - Context switches and Scheduling - Process API a process is a program in execution - its behavior is largely defined by the program being executed - but a process is much more than just a program! Multitasking - Modern general-purpose OSes typically run dozens to hundreds of processes simultaneously - May collectively exceed capacity of hardware - Recall: virtualization allows each process to ignore physical hardware limitations and let OS take care of details CPU/Memory Virtualization - Time-slicing of CPU(s) is performed to simulate concurrency - Memory is partitioned and shared amongst processes - But per-process view is of a uniform address space - Lazy/On-demand loading of processes lowers total burden vs. “Batch” processing - Without multitasking, each program is run from start to finish without interruption from other processes - Including any I/O operations (which may be lengthy!) - Ensures minimal overhead (but at what cost?) - Is virtualization still necessary? Pros/Cons of Multitasking - Pro: may improve resource utilization if we can run some processes while others are blocking - Pro: makes process interaction possible - Con: virtualization introduces overhead (examples?) - Con: possibly reduced overall throughput Forms of Multitasking - Cooperative multitasking: processes voluntarily cede control - Preemptive multitasking: OS polices transitions (how?) - Real-time systems: hard, fixed time constraints (late is wrong!) What’s in a process? - Program (“text”) and data - Static/Stack/Heap memory contents - Registers (e.g., PC, SP, FP) - Open files and devices (e.g., network) - What else? Data vs.
    [Show full text]
  • Scheduling Techniques for Reducing Processor Energy Use in Macos
    Scheduling Techniques for Reducing Processor Energy Use in MacOS Jacob R. Lorch and Alan Jay Smith Computer Science Division, EECS Department, UC Berkeley Berkeley, CA 94720-1776 Abstract a number of engineering users. We found that, depending on the machine and user, up to 18±34% of total power was at- The CPU is one of the major power consumers in a tributable to components whose power consumption could be portable computer, and considerable power can be saved by reduced by power management of the processor, i.e. the CPU turning off the CPU when it is not doing useful work. In Ap- and logic that could be turned off when the CPU was inactive. ple's MacOS, however, idle time is often converted to busy This high percentage, combined with our intuition that soft- waiting, and generally it is very hard to tell when no use- ware power management could be signi®cantly improved for ful computation is occurring. In this paper, we suggest sev- the processor, led us to conclude that the most important tar- eral heuristic techniques for identifying this condition, and get for further research in software power management was for temporarily putting the CPU in a low-power state. These the processor. techniques include turning off the processor when all pro- Many modern microprocessors have low-power states, in cesses are blocked, turning off the processor when processes which they consume little or no power. To take advantage of appear to be busy waiting, and extending real time process such low-power states, the operating system needs to direct sleep periods.
    [Show full text]
  • Types of Operating System 3
    Types of Operating System 3. Batch Processing System The OS in the early computers was fairly simple. Its major task was to transfer control automatically from one job to the next. The OS was always resident in memory. To speed up processing, operators batched together jobs with similar requirement/needs and ran them through the computer as a group. Thus, the programmers would leave their programs with the operator. The operator would sort programs into batches with similar requirements and, as the computer became available, would run each batch. The output from each job would be sent back to the appropriate programmer. Memory layout of Batch System Operating System User Program Area Batch Processing Operating System JOBS Batch JOBS JOBS JOBS JOBS Monitor OPERATING SYSTEM HARDWARE Advantages: ➢ Batch processing system is particularly useful for operations that require the computer or a peripheral device for an extended period of time with very little user interaction. ➢ Increased performance as it was possible for job to start as soon as previous job is finished without any manual intervention. ➢ Priorities can be set for different batches. Disadvantages: ➢ No interaction is possible with the user while the program is being executed. ➢ In this execution environment , the CPU is often idle, because the speeds of the mechanical I/O devices are intrinsically slower than are those of electronic devices. 4. Multiprogramming System The most important aspect of job scheduling is the ability to multi-program. Multiprogramming increases CPU utilization by organizing jobs so that CPU always has one to execute. The idea is as follows: The operating system keeps several jobs in memory simultaneously.
    [Show full text]
  • I.T.S.O. Powerpc an Inside View
    SG24-4299-00 PowerPC An Inside View IBM SG24-4299-00 PowerPC An Inside View Take Note! Before using this information and the product it supports, be sure to read the general information under “Special Notices” on page xiii. First Edition (September 1995) This edition applies to the IBM PC PowerPC hardware and software products currently announced at the date of publication. Order publications through your IBM representative or the IBM branch office serving your locality. Publications are not stocked at the address given below. An ITSO Technical Bulletin Evaluation Form for reader′s feedback appears facing Chapter 1. If the form has been removed, comments may be addressed to: IBM Corporation, International Technical Support Organization Dept. JLPC Building 014 Internal Zip 5220 1000 NW 51st Street Boca Raton, Florida 33431-1328 When you send information to IBM, you grant IBM a non-exclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. Copyright International Business Machines Corporation 1995. All rights reserved. Note to U.S. Government Users — Documentation related to restricted rights — Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp. Abstract This document provides technical details on the PowerPC technology. It focuses on the features and advantages of the PowerPC Architecture and includes an historical overview of the development of the reduced instruction set computer (RISC) technology. It also describes in detail the IBM Power Series product family based on PowerPC technology, including IBM Personal Computer Power Series 830 and 850 and IBM ThinkPad Power Series 820 and 850.
    [Show full text]
  • The Operating System the Operating System (OS) Is the He Low-Level Software Which Handles the Interface to Peripheral Hardware
    The Operating System The Operating System (OS) is the he low-level software which handles the interface to peripheral hardware, schedules tasks, allocates storage, and presents a default interface to the user when no application program is running. Main functions: - 1. Provides instructions to display the on screen elements with which you interact. Collectively, these elements are known as the user interface. 2. Loads programs into the computers memory so that you can use them. 3. Co-ordinates how programs work with the CPU, RAM, keyboard, mouse, printer and other hardware as well as with software. 4. Manages the way information is stored on and retrieved from disks. The User Interface With an OS you see and interact with a set of items on the screen, the user interface. Graphical User Interface - Most current OS provide a graphical user interface (GUI). Apple computer introduced the first GUI with its Macintosh computer in 1984. GUIs are so called because you use a mouse (or other pointing device) to point at graphical objects on the screen. The Desktop - The coloured area that is seen on the screen. The pictures stand for items you might see on a real desktop such as “my computer”. Icons - Icons are pictures that represent the parts of the computer you work with. Software designers try to design the icons so that they look like what they represent. You interact with your computers resources by activating the icon that represent the resource. This is done by using a pointing device. The Taskbar and the Start Button (windows only) - When you start a program a button appears for it on the taskbar – an area at the bottom of the screen whose purpose is to display the buttons for the programs you are running.
    [Show full text]
  • Mac OS 8 Revealed
    •••••••••••••••••••••••••••••••••••••••••••• Mac OS 8 Revealed Tony Francis Addison-Wesley Developers Press Reading, Massachusetts • Menlo Park, California • New York Don Mills, Ontario • Harlow, England • Amsterdam Bonn • Sydney • Singapore • Tokyo • Madrid • San Juan Seoul • Milan • Mexico City • Taipei Apple, AppleScript, AppleTalk, Color LaserWriter, ColorSync, FireWire, LocalTalk, Macintosh, Mac, MacTCP, OpenDoc, Performa, PowerBook, PowerTalk, QuickTime, TrueType, and World- Script are trademarks of Apple Computer, Inc., registered in the United States and other countries. Apple Press, the Apple Press Signature, AOCE, Balloon Help, Cyberdog, Finder, Power Mac, and QuickDraw are trademarks of Apple Computer, Inc. Adobe™, Acrobat™, and PostScript™ are trademarks of Adobe Systems Incorporated or its sub- sidiaries and may be registered in certain jurisdictions. AIX® is a registered trademark of IBM Corp. and is being used under license. NuBus™ is a trademark of Texas Instruments. PowerPC™ is a trademark of International Business Machines Corporation, used under license therefrom. SOM, SOMobjects, and System Object Model are licensed trademarks of IBM Corporation. UNIX® is a registered trademark of Novell, Inc. in the United States and other countries, licensed exclusively through X/Open Company, Ltd. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and Addison-Wesley was aware of a trademark claim, the designations have been printed in initial capital letters or all capital letters. The author and publisher have taken care in the preparation of this book, but make no express or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein.
    [Show full text]
  • Watchdt User Guide Pitney Bowes1 Is Making This Document Available to You, Free of Charge, for Use with the Software, in Order to Make Your Experience More Convenient
    P/I Enterprise Manager Version: 1.4 WatchDT User Guide Pitney Bowes1 is making this document available to you, free of charge, for use with the software, in order to make your experience more convenient. Every effort has been made to ensure the accuracy and usefulness of this document reflecting our experience. Product information may change after publication without notice. This document is being distributed on an "as is" basis and we make no representations or warranties, express or implied, with respect to its accuracy, reliability or completeness and the entire risk of its use shall be assumed by you. In no event shall we be liable to you or any other person, regardless of the cause, for the effectiveness or accuracy of this document or for any special, indirect, incidental or consequential damages arising from or occasioned by your use, even if advised of the possibility of such damages. All software described in this document is either our software and/or our licensed property. No license either expressed or implied is granted for the use of the software by providing this document and/or content. Under copyright law, neither this document nor the software may be copied, photocopied, reproduced, transmitted, or reduced to any electronic medium or machine-readable form, in whole or in part, without our prior written consent. We will continue to maintain this document and we welcome any clarifications or additional information regarding its content. Address comments concerning the content of this publication to: Pitney Bowes Building 600 6 Hercules Way Leavesden Watford WD25 7GS United Kingdom We may use or distribute the information supplied in any way we deem appropriate without incurring any obligation to the submitter of the information 1 Copyright © Pitney Bowes Software.
    [Show full text]