ICTSAS518 Student Workbook
ICTSAS518 Student Workbook
ICTSAS518
Install and upgrade operating
systems
Student Workbook
TABLE OF CONTENTS
TABLE OF CONTENTS ........................................................................................................................................1
UNIT INTRODUCTION .......................................................................................................................................4
ABOUT THIS RESOURCE ................................................................................................................................4
ABOUT ASSESSMENT ....................................................................................................................................5
ELEMENT AND PERFORMANCE CRITERIA..........................................................................................................7
PERFORMANCE EVIDENCE AND KNOWLEDGE EVIDENCE ..................................................................................8
PERFORMANCE EVIDENCE ............................................................................................................................8
KNOWLEDGE EVIDENCE ................................................................................................................................8
ASSESSMENT CONDITIONS ...............................................................................................................................9
PRE-REQUISITES ...............................................................................................................................................9
TOPIC 1 – DETERMINE ORGANISATIONAL HELP DESK PROCEDURES ...............................................................10
REVIEW ORGANISATION’S TECHNICAL SUPPORT PROCEDURES......................................................................10
TECHNICAL SUPPORT PROCEDURES ....................................................................................................................... 10
PLANNING AND CONDUCTING REVIEWS ................................................................................................................. 11
1
ICTSAS518 Student Workbook
Follow instructions of operating system.................................................................................................. 19
Install from disc ..................................................................................................................................... 19
Install from digital file ............................................................................................................................ 19
Installing multiple operating systems to run simultaneously ................................................................... 20
Installing multiple operating systems to run one at a time on the same machine .................................... 20
UPGRADE AN EXISTING OS .............................................................................................................................21
BACK UP EXISTING SYSTEM................................................................................................................................. 21
HOW TO UPGRADE .......................................................................................................................................... 22
Clean install ........................................................................................................................................... 22
Install over existing operating system..................................................................................................... 23
RESEARCH AND IMPLEMENT AUTOMATED OS INSTALLATION TECHNIQUES AND PROCEDURES ....................24
EXPLAIN PROCEDURES AND PRINCIPALS INVOLVED IN UNATTENDED OS INSTALLATION ....................................................... 24
Not present............................................................................................................................................ 24
No prompts............................................................................................................................................ 24
Multiple machines ................................................................................................................................. 24
AUTOMATED OS INSTALLATION .......................................................................................................................... 25
INSTALLATION TECHNIQUES AND PROCEDURES ........................................................................................................ 26
MIGRATE FILES ...............................................................................................................................................28
DATA MIGRATION ............................................................................................................................................ 28
DATA THAT MAY NEED TO BE MIGRATED ................................................................................................................ 28
ANALYSING REQUIRED DATA MIGRATION REQRUIEMENTS ........................................................................................... 28
DOCUMENT DATA MIGRATION REQRUIEMENTS ........................................................................................................ 29
CONDUCT THE DATA MIGRATION ACTIVITY ............................................................................................................. 29
TOPIC 3– MANAGE AND TROUBLESHOOT RESOURCE ACCESS ........................................................................30
CONFIGURE LOCAL RESOURCES ACCESS .........................................................................................................30
LOCAL RESOURCE ACCESS .................................................................................................................................. 30
CONFIGURING LOCAL ACCESS ............................................................................................................................. 31
CONFIGURE SHARING OF LOCAL RESOURCES .................................................................................................32
WORKGROUPS ............................................................................................................................................... 32
HOMEGROUPS ............................................................................................................................................... 32
DOMAINS ..................................................................................................................................................... 33
CONFIGURATION IN SERVER ............................................................................................................................... 33
CONFIGURATION FROM WORKSTATION ................................................................................................................. 33
ASSIGN ACCESS RIGHTS TO SHARED RESOURCES............................................................................................34
AUTHENTICATION ............................................................................................................................................ 34
PERMISSIONS ................................................................................................................................................. 35
Read only............................................................................................................................................... 35
Read and write ...................................................................................................................................... 35
TOPIC 4 - CONFIGURE AND TROUBLESHOOT HARDWARE DEVICES AND DRIVERS ..........................................36
DETERMINE AND RESOLVE PROBLEMS WITH HARDWARE RESOURCES ..........................................................36
TROUBLE SHOOTING ......................................................................................................................................... 36
COMMON HARDWARE PROBLEMS ....................................................................................................................... 37
RESEARCH AND INSTALL APPROPRIATE DEVICE DRIVERS ...............................................................................38
RESEARCH APPROPRIATE DEVICE DRIVERS ............................................................................................................... 38
INSTALL DEVICE DRIVERS ................................................................................................................................... 38
2
ICTSAS518 Student Workbook
CONFIGURE HARDWARE RESOURCES .............................................................................................................39
HARDWARE RESOURCES .................................................................................................................................... 39
INSTRUCTIONS FOR CONFIGURING THE RESOURCE SETTINGS FOR HARDWARE................................................................... 39
DESCRIBE OS CONFIGURATION ISSUES THAT MAY ARISE WITH HARDWARE AND DESKTOP ENVIRONMENTS .............................. 39
insufficiENt hardware............................................................................................................................. 39
driver issues ........................................................................................................................................... 40
software incompatibility ........................................................................................................................ 40
hardware incompatibilltiy ...................................................................................................................... 40
CONFIGURE DEVICE DRIVERS..........................................................................................................................41
DEVICE DRIVERS .............................................................................................................................................. 41
instalL device drivers ....................................................................................Error! Bookmark not defined.
Configure device drivers ......................................................................................................................... 41
TOPIC 5 - CONFIGURE AND TROUBLESHOOT THE DESKTOP AND USER ENVIRONMENTS ................................42
CONSTRUCT PROFILES FOR USERS ..................................................................................................................42
USER PROFILES ................................................................................................................................................ 42
Registry Hive.......................................................................................................................................... 42
Profile folder set..................................................................................................................................... 42
PROFILE TYPES ................................................................................................................................................ 43
local profiles .......................................................................................................................................... 43
mandatory profiles................................................................................................................................. 43
roaming profiles..................................................................................................................................... 43
ORGANISE SHORTCUTS...................................................................................................................................44
DESKTOP SHORTCUTS ....................................................................................................................................... 44
purpose of desktop shortcuts ................................................................................................................. 44
components of desktop shortcuts ........................................................................................................... 45
create desktop shortcuts ........................................................................................................................ 45
Arrange desktop shortcuts items ............................................................................................................ 45
ARRANGE SCREEN MANAGEMENT .................................................................................................................46
SCREEN MANAGEMENT ..................................................................................................................................... 46
Data projectors ...................................................................................................................................... 46
Multiple screens..................................................................................................................................... 46
Screen frequency.................................................................................................................................... 47
Screen resolution ................................................................................................................................... 47
SUMMARY......................................................................................................................................................48
REFERENCES ...................................................................................................................................................49
3
ICTSAS518 Student Workbook
UNIT INTRODUCTION
This resource covers the unit ICTSAS518 - Install and upgrade operating systems.
This unit describes the skills and knowledge required to maintain, install new and
upgrade existing operating systems (OS) in a medium to large organisation.
This resource brings together information to develop your knowledge about this unit.
The information is designed to reflect the requirements of the unit and uses headings to
makes it easier to follow.
Read through this resource to develop your knowledge in preparation for your
assessment. You will be required to complete the assessment tools that are included in
your program. At the back of the resource are a list of references you may find useful to
review.
As a student it is important to extend your learning and to search out text books,
internet sites, talk to people at work and read newspaper articles and journals which
can provide additional learning material.
Your trainer may include additional information and provide activities, slide
presentations, and assessments in class to support your learning.
4
ICTSAS518 Student Workbook
ABOUT ASSESSMENT
You will receive an overall result of Competent or Not Yet Competent for the assessment
of this unit. The assessment is a competency based assessment, which has no pass or
fail. You are either competent or not yet competent. Not Yet Competent means that you
still are in the process of understanding and acquiring the skills and knowledge required
to be marked competent.The assessment process is made up of a number of assessment
methods. You are required to achieve a satisfactory result in each of these to be deemed
competent overall.
All of your assessment and training is provided as a positive learning tool. Your assessor
will guide your learning and provide feedback on your responses to the assessment.For
valid and reliable assessment of this unit, a range of assessment methods will be used to
assess practical skills and knowledge.
• Written Activity
• Case Study
• Observation
• Questions
• Third Party Report
The assessment tool for this unit should be completed within the specified time period
following the delivery of the unit. If you feel you are not yet ready for assessment,
discuss this with your trainer and assessor.
5
ICTSAS518 Student Workbook
To be successful in this unit you will need to relateyour learning to your workplace. You
may be required to demonstrate your skills and be observed by your assessor in
yourworkplaceenvironment. Some units provide for a simulated work environment and
your trainer and assessor will outline the requirements in these instances.
6
ICTSAS518 Student Workbook
ELEMENT AND PERFORMANCE
CRITERIA
1. Determine 1.1 Review organisation’s technical support procedures
organisational help desk
procedures 1.2 Interrogate help desk system
7
ICTSAS518 Student Workbook
PERFORMANCE EVIDENCE AND
KNOWLEDGE EVIDENCE
This describes the essential knowledge and skills and their level required for this unit.
PERFORMANCE EVIDENCE
KNOWLEDGE EVIDENCE
To complete the unit requirements safely and effectively, the individual must:
8
ICTSAS518 Student Workbook
ASSESSMENT CONDITIONS
Gather evidence to demonstrate consistent performance in conditions that are safe and
replicate the workplace. Noise levels, production flow, interruptions and time variances
must be typical of those experienced in the systems administration and support field of
work, and include access to:
PRE-REQUISITES
This unit must be assessed after the following pre-requisite unit:
9
ICTSAS518 Student Workbook
TOPIC 1 – DETERMINE
ORGANISATIONAL HELP DESK
PROCEDURES
When preparing to install and upgrade operating systems within an organisation, it will
be necessary to determine the operational help desk procedures.
Technical support procedures are the procedures within an organisation that are used
to provide technical support to users and other stakeholders within the organisation.
• Hardware
• Software
• Networking devices
It is important that all personnel that are to be involved in the installation and
upgrading of operating systems are aware of the technical support options that are
available to them and that can be utilised throughout the process of completing work
tasks.
10
ICTSAS518 Student Workbook
PLANNING AND CONDUCTING REVIEWS
The planning and conducting of reviews on reports or other data sources can be
conducted by the following of these actions:
• Assess all existing documents and data for their availability and relevance to
the questions that need to be answered
• Access the documents and data sources following organisational procedures
• Ensure that the confidentiality and security of all documentation and data
sources through the review
• Verify the authenticity and accuracy of documentation and data sources
through investigative procedures
• Extract and summarise all data that is relevant to the questions being asked
by the review
Once all information that was sought and collected during the review has been collected,
it will be necessary to ensure that the information is sorted into manageable sections
and presented so that it can be used to inform on decision-making processes.
11
ICTSAS518 Student Workbook
INTERROGATE HELP DESK SYSTEM
It will be necessary to interrogate the help desk system in order to obtain all required
information.
INTEGRATION IN COMPUTING
HELP DESK
The help desk is a chat or phone support service that many organisations will run for
their networking equipment.
Help desk professionals will utilise issue tracking software to aid them in effective:
• Troubleshooting
• Solving problems
• Identifying causes of issues
• Pinpointing problems
• Answering questions
• Providing support information
When communicating with the help desk in order to quickly identify network problems,
it will be necessary to ensure that:
12
ICTSAS518 Student Workbook
Effective help desk communication revolves around the following of the help desk
professionals question tree and process. It is important to concisely provide all initial
information and then answer all questions put forward by the help desk professional in
order to allow them to follow a clear path to an answer.
HELP DIRECTORY
Helpdesk documentation can include written guides or instructions that are either
electronic or hard copy. Helpdesk documentation is a form of support documentation
that is written to enable the help desk personnel to troubleshoot issues and provide
advice and guidance to the client on how to use the software application correctly and to
its full potential. Helpdesk documentation will need to be created to agreed
organisational and help desk personnel requirements.
The help directory can be accessed in most cases from within the application that is
being used, although in some cases the help directory for a specific program will be a
separate application or need to be accessed online or in hard copy. It will be necessary
to read the user manual to determine the location and usage of the help directory for the
specific application.
13
ICTSAS518 Student Workbook
Once the help directory is opened, it will be necessary to navigate its features in order to
determine the answer to your issue or anomaly by:
14
ICTSAS518 Student Workbook
LIAISE WITH CLIENT
It will be necessary to ensure that the client is liaised with regarding a range of factors
including the help and support options held by the organisation and the installation and
upgrade of operating systems.
PROCESS OF LIAISING
• Face to face
• Via the telephone
• Over email
• Conducted by formal reports
• Formal
• Informal
• Scheduled
• Unplanned
It is essential that all client liaisons are conducted in a professional and clear manner in
order to make sure that the client is consistently updated on the progress and
requirements of a work project.
15
ICTSAS518 Student Workbook
TOPIC 2 – INSTALL OR UPGRADE A
DESKTOP OS
INSTALL AN OS
OPERATING SYSTEM
An operating system is the single most important program that is run on all general-
purpose computers. It is a software platform that runs on a computer that allows other
applications to run within the environment that it creates.
There are a large variety of operating systems. They are chosen based upon Hardware
and software requirements for their intended uses. Applications are written to work
with certain operating systems. In order to use the desired program, one can only install
it on the operating system to which it was written to work within. Some operating
systems only work with specific hardware. If a user wants to use a specific piece or
hardware, they can only use it in conjunction with operating systems that allow the
hardware to work properly within the OS. If a user wants to use a specific operating
system, they can only use hardware that works with that operating system.
MULTI-USER
Multi-user operating systems allow more than one user to run programs at the same
time. Some multi-user operating systems allow thousands of users to use programs
concurrently.
MULTIPROCESSING
16
ICTSAS518 Student Workbook
MULTITASKING
Multitasking operating systems allow more than one program to be run simultaneously.
MULTITHREADING
Multithreading operating systems allow multiple parts of the same program to run at
the same time.
REAL TIME
The three most popular operating systems for business and personal computing are:
Linux is freely distributed and open source. It is able to run on a number of hardware
platforms.
Mac OS is the official name for the operating systems used on Apple Macintosh
computers. It features the use of windows, icons in its Graphic User Interface (GUI).
Most applications that run on Mac OS have similar user interfaces.
17
ICTSAS518 Student Workbook
The following are examples of most available operating systems for business and
personal computers:
MAC
• OS 9
• OSX
WINDOWS
• Windows 2000
• Windows Vista
• Windows XP
• Windows 10
LEGACY WINDOWS
• DOS
• Windows 95/98
• Windows ME
• Windows NT 4.0
The procedures and techniques involved in the installation of an operating system differ
depending upon the type of installation that personal installing an OS chooses to use.
There are some procedures and techniques that are constant regardless of the
18
ICTSAS518 Student Workbook
installation type that is chosen. The steps that must be taken when installing any
operating system are:
All hardware and software systems have operational requirements that must be met by
the operating system that they are used in. It is vital that all requirements are checked
prior to installation to avoid incompatibility issues.
Many operating systems require thepurchase of the system and licenses to install them
onto computers. Some operating systems are available for free and do not require
licenses to install them onto computers. A copy of the operating system must be
obtained as a physical copy on disc or as a file downloaded from the internet or
contained on a digital media storage device.
Most operating systems contain installation programs that automate the process of
installing them. It is only required that a few steps be completed by personnel as the
installation program handles the installation.
Installation methods of OS’s and their installation procedures and methods include:
Operating systems that are contained on discs can be installed on a computer via disc
drives. It is important that the type of disc that contains the operating system is
readable by a disc drive located within the computer or connected by a peripheral cable.
Installers should be aware that when a drive is connected peripherally that some system
functions, including connectivity ports, may be unavailable if specific steps are not
taken.
Operating systems can be installed from digital files located on external storage devices
or downloaded from a network. Installers should be aware that when an
19
ICTSAS518 Student Workbook
externalstorage is connected peripherally that some system functions, including
connectivity ports, may be unavailable if specific steps are not taken.
In the event of two separate operating systems being installed that run side by side on a
machine, the operating systems must be installed in the correct order. Installation may
not be possible or may produce intermittent errors if not installed in the correct order.
Operating systems that are to be run one at a time on the same machine can be installed
via disc or digital files. They must be installed in the correct order in order to achieve
functionality. During installation one program is given priority to boot when the
machine is powered up. Separate instructions are given within the default program or in
computers pre-boot menu to allow for one operating system or the other to be booted.
20
ICTSAS518 Student Workbook
UPGRADE AN EXISTING OS
It is worth noting that operating systems simply provide an environment for other
applications to function within. All other applications are separate and often need to be
installed individually after an OS has been installed on a machine.
21
ICTSAS518 Student Workbook
Backups can be created and stored in a variety of locations, including:
HOW TO UPGRADE
The method used to conduct an upgrade depends on several factors, which include:
There are advantages and disadvantages to each method. Personnel should evaluate
their given situations and requirements to decide which method will be most effective
for their purposes.
The two categories that all backup methods fit into are:
CLEAN INSTALL
A clean install is an action of deleting all information from a computers’ hard drives then
installing a new operating system onto the blank drive. Many people choose this option
because it reduces the risk of corruption of files due to errors that may occur during the
upgrade process. This method is more time consuming but often provides for smoother
and cleaner computer function after an upgrade has been completed.
22
ICTSAS518 Student Workbook
4. Install updated OS onto formatted drive
5. Load user profiles and system settings from backup of theprevious system
Steps 5 and 6 are often combined into one step. Automated installation applications
typically allow for backups of previous systems to be used during the installation
process. Prompts within the application, direct personnel, as to when and how to
introduce data from backups.
Installing over and existing operating system is the action of installing an operating
system directly onto a computer without deleting the previous operating system or user
profiles and system settings. This method is preferred by some because it eliminates
some steps of the process, thus making the process faster and more streamlined.
The steps involved in updating an operating system over an existing operating system
are:
23
ICTSAS518 Student Workbook
RESEARCH AND IMPLEMENT AUTOMATED OS INSTALLATION
TECHNIQUES AND PROCEDURES
NOT PRESENT
The person installing the OS doesn’t need to be physically present at the location where
the OS is being installed. Installations and upgrades can be scheduled to take place
automatically.
NO PROMPTS
All prompts typically associated with the installation of an OS have been configured
prior to the installation process.
MULTIPLE MACHINES
Multiple computers can have OS’s installed from one command given from a server or
controller computer.
24
ICTSAS518 Student Workbook
• Difficulty tracking what machines need updating
• Being put at risk due to repeatedly performing all tasks manually
• Difficulty in accurately reporting OS deployment and issues that coincide with
it
• Allowing for the management of OS, driver and application files in one
centralised file system
• Easily create images of operating system for testing prior to deployment
• OS’s, software applications and updates can be rapidly deployed to multiple
machines in a reliable, timely and consistent manner
• Ease of OS deployment and reporting software on all machines within an
organisation
AUTOMATED OS INSTALLATION
Automated installation of OS’s is a term that refers to the practice of installing operating
systems onto multiple computers and devices by means of an automated system from a
central location. ITC professionals use automated installer toolkits to perform OS
installations onto more than one machine that sharessimilar uses. Toolkits are
applications or collections of applications that allow multiple installations to be
deployed from a single location, such as a server or machines networked through a
server or other means.
Many hardware and software providers have produced toolkits that are designed
specifically to work with their products. It is suggested that ITC personnel consult the
documentation or technical support from the product manufacturer to help determine
what toolkit might work best for their needs. It is often best to use toolkits made by the
producer of the OS that is being installed. A very popular Toolkit that works for many
automated OS installations is the Microsoft Deployment Toolkit (MDT).
25
ICTSAS518 Student Workbook
MDT and other toolkits contain applications that assist with the following:
The installation techniques and procedures for automated installation of OS’s can be
divided into two stages:
• Testing
• Production
26
ICTSAS518 Student Workbook
5. Run testing and analysis applications to ensure that deployment did not
encounter any issues
27
ICTSAS518 Student Workbook
MIGRATE FILES
It is essential to ensure that all data migration requirements that will be required for the
installation or upgrading process for the operating system are appropriately analysed
and followed.
DATA MIGRATION
The migration of data involves the transferring of data from one location or system to
another.
Ineffective data migration procedures can result in major network and business issues
including:
• Misconfigured data
• Lost data
• Network failure
• Loss of operational ability
• Financial losses
There is a range of data that may need to be migrated during the installation and
upgrade of operating systems,and these may include:
It will be necessary to analyse all required data migration requirements are analysed
through the collection of:
28
ICTSAS518 Student Workbook
• Permissions: In some cases, it will be necessary to obtain a range of
permissions regarding the migration of data as data may be protected or
sensitive
• Impact on the rest of the network: It will be necessary to analyse the impact
that the migration of the data is likely to have on the rest of the network so
that contingency planning is able to be undertaken
Once the data migration requirements have been analysed, it will be necessary to ensure
that they are documented carefully and according to organisational requirements.
The following information regarding the data migration will need to be documented:
• Data to be migrated
• Impact assessments
• Procedures and risks
• Permissions and approvals
• Contingency plans
The data migration activity can be conducted using the following procedures:
• Prepare the system: It will be necessary to prepare the system for the
copying and moving of files through the cleaning of hard drives and the use of
disk utilities
• Back up data: Prior to a data migration process it will be necessary to back up
the data to be migrated for safety
• Select a migration tool: There is a range of migration tools that can be used to
manage data migration effectively it will be necessary to select a tool that is
compatible with the system
• Conduct data migration: It will be necessary to follow all data migration tool
prompts to complete the migration safely
29
ICTSAS518 Student Workbook
TOPIC 3– MANAGE AND
TROUBLESHOOT RESOURCE ACCESS
ITC professionals must configure many settings to machines and devices in the
networks that they oversee. One of the areas that need to be addressed in that process is
the configuration of local resource access.
Configuring local resource access is the collection of actions required to allow users on
the network to access peripherals, applications and other devices on the network. In ITC
terminology, the term local refers to files, devices and other resources that are at a
particular workstation or network node. Files, devices and other resources that located
at other network nodes are referred to as being remote resources.
Having access to devices, files and resources that are located at other nodes are known
as having local access to those nodes. In essence, one can have access to resources that
are at another location without having to physically go to that location or change
workstations.
Resources that may have local access to them granted to users include:
• Disc drives
• Printers
• Line Print Terminal (LPT) Ports
• Serial Communication (COM) ports
• Clipboards
• Audio
• Any supported plug and play device (Cameras, projectors)
30
ICTSAS518 Student Workbook
Making use of resources via local access is known as redirection. This is because, from
the server perspective, control of the resource is being redirected to the workstation
that has been granted access to it. Resources can be accessed through standard
protocols or Media Transfer Protocol (MTP) for media players and Picture Transfer
Protocol (PTP) for cameras.
Configuring local access is in effect making local devices available for use in remote
sessions. That configuration is done from a server or other network control station.
Servers have operating systems that are designed to control networks as opposed to
simply existing within them.
The control features found within applications on the server operating system allow for
system administrators to grant local access to resources by configuring an array of
options. Network administrators give users on their networks the ability to access
remote resources locally simply by selecting them from thedrop-down menus or
through standard folder tree menus.
31
ICTSAS518 Student Workbook
CONFIGURE SHARING OF LOCAL RESOURCES
Configuring sharing local resources is the action of allowing resources that are local to a
particular computer with users located at other workstations or nodes on a network.
Access to local resources can be granted from a workstation that contains the resources
to be shared or from a remote location such as a server or network administrators’
workstation.
Computers that share local files can be categorised into three groups:
WORKGROUPS
• All computers are peers with no computer having control over any other
computer
• Each machine has user accounts. In order to log into any computer in the
group, users must possess a username and password that is specific to the
machine that they are using
• Workgroups are not password protected
• All computers are on the same local network or subnet
• Management of user accounts, security of resources and providing access to
shared accounts must be done from each machine. As a result, it is time-
consuming and prone to errors
HOMEGROUPS
• All computers in a homegroup are also computers that belong to the same
workgroup
32
ICTSAS518 Student Workbook
• Resource sharing is streamlined and easier to configure
• Homegroups are password protected. The password only needs to be entered
once, when a machine is added to the network for the first time
DOMAINS
• Must have at least one server on the network. Network administrators use
servers to control all security and access to the domain. All domain users
have to provide passwords or other credentials each time they access a
domain
• Domain passwords can be used to log onto the domain from any computer on
the domain without having a local account on that computer
• There can be thousands of users in one domain
• Domain users can join existing homegroup but cannot create them
CONFIGURATION IN SERVER
Local resources that are made available to remote computers and devices by means of
theconfiguration of server settings is accomplished by the similar means configuring
local access. All group and individual settings can be configured using this method.
When configuring large numbers of computers or settings, it is most practical and
reliable to configure a server
Many small networks can be run without the use of a server. The file sharing options
included in most operating systems allows for sharing of local resources without the
need for an external controller or server. Although it is possible to configure sharing
options from a server, it is sometimes required that or more practical to configure from
individual workstations.
33
ICTSAS518 Student Workbook
ASSIGN ACCESS RIGHTS TO SHARED RESOURCES
Shared resources on a network must have access rights assigned to those wishing to
access the resources in order for them to be available. Access rights are typically
assigned through a server or other access granting application. This facilitates the ability
to grant access to large numbers of resources to many users.
In the event of small numbers of resources being granted to a small number of users,
access rights can be granted to individual resources from local settings provided that
network settings do not prevent sharing of the resource.
Shared resources rights can be assigned in a similar manner to the methods used for
configuring local resource access. Server applications are used to allow specified groups
or individuals the ability to access resources. Each user logged onto a network belongs
to a group that is specified by the server that is controlling the network. Administrators
usually assign access rights so that only members of particular groups can access certain
resources on a network.
AUTHENTICATION
34
ICTSAS518 Student Workbook
3. The server consults theinformation provided by the network administrator to
determine whether or not the passcodeis adequate to grant access to the
resource. This information is based on a grant or deny response that the
administrator has assigned to the resource and passcode
4. The server sends information back to the user conveying granted or denied
access then proceeds to normal function
PERMISSIONS
READ ONLY
Users can view a resource, but cannot make any changes to it.
35
ICTSAS518 Student Workbook
TOPIC 4 - CONFIGURE AND
TROUBLESHOOT HARDWARE DEVICES
AND DRIVERS
• Computers
• Printers
• Scanners
• Monitors
• Modems
• Servers
• Cables
• Projectors
• Cameras
• Audio interfaces
• All other peripheral devices
TROUBLE SHOOTING
Determining what problems exist and their potential causes in order to resolve the
problems are known as troubleshooting. Troubleshooting is a process by which ITC
professionals use a process of elimination to narrow down possible hardware ailments
and determine what solutions might alleviate the problems.
Tracing the signal path is often the best way to troubleshoot a problem. Usually, one
piece of hardware requires another piece of hardware in a chain to be functioning
properly in order for it to function. ITC professionals should start at the beginning of the
36
ICTSAS518 Student Workbook
chain to determine which piece of hardware actually has an issue, then proceed to
diagnose it's aproblem-based on noticeable symptoms.
Hardware problems are often the result of software issues that prevent hardware from
functioning properly. ITC professionals should use diagnostic applications to determine
whether or not a piece of hardware has actually failed or it is simply not working due to
a software issue. In the event of a hardware failure, the solution is almost always to
replace the hardware. Most hardware issues that involve internal computer components
will result in an error code being sent to ITC personnel in the form of an error message
in text, flashing lights or a series of tones.
37
ICTSAS518 Student Workbook
RESEARCH AND INSTALL APPROPRIATE DEVICE DRIVERS
Hardware devices will require appropriate drivers to be installed and allocated to them
in order to ensure their operation. In some cases, the device driver that is required may
not be included as a part of the operating system installation package. In this case, it
will be necessary to ensure that the appropriate driver is researched.
There is a range of information sources that can be researched in order to identify the
appropriate driver for particular devices, and these may include:
Once the appropriate device driver has been researched and identified it would be
necessary to ensure that it is able to be installed following approved procedures.
A person with the appropriate administrative access may be able to install device
drivers using a number of methods such as:
• Starting the operating system may result in the drivers being recognised and
installed
• Scanning for devices using wizards and utilities that are used to detect
hardware that has been connected to the computer
• Perform a manual install process for the driver using the associated .ING file
38
ICTSAS518 Student Workbook
CONFIGURE HARDWARE RESOURCES
Once the installation process for the operating system is complete, it will be necessary
to configure the hardware resources to meet the needs of the installed hardware items.
HARDWARE RESOURCES
The hardware resources within an operating system are the resources of the computer
that will be allocated to a particular hardware device. It is essential that these resources
are configured for optimal operations.
Within operating systems, there may be a range of configuration issues that may arise
within hardware and desktop environments, and these may include:
INSUFFICIENT HARDWARE
In some cases when an operating system is upgraded or installed it may require more
hardware than is currently installed on the computer. In the case of this fault, it will be
1https://technet.microsoft.com/en-us/library/cc730702(v=ws.11).aspx
39
ICTSAS518 Student Workbook
necessary to ensure that all required hardware is updated prior to or following the
installation of the new operating system.
DRIVER ISSUES
In some cases when a new operating system is installed or upgraded some of the drivers
required may not have been a part of the new installation. In this case, it will be
necessary to conduct device driver:
• Updates
• Installations
• Configurations
SOFTWARE INCOMPATIBILITY
In some cases, the new or upgraded operating system may not be compatible with the
software that is installed within the desktop environment. In this case, it may be
necessary to upgrade the software or change to a new version of the software that is
compatible.
HARDWARE INCOMPATIBILLTIY
In some cases, the new or upgraded operating system may not be compatible with the
hardware that is installed on the computer, in this case, it may be necessary to ensure
that the hardware is:
• Updated
• Changed
• Reconfigured
40
ICTSAS518 Student Workbook
CONFIGURE DEVICE DRIVERS
It will be necessary to ensure that all device drivers are configured to meet the needs of
the organisation.
DEVICE DRIVERS
The device drivers that have been installed onto a computer will need to configure using
the functions held within the operating systems device manager. It will be necessary to
locate the device manager and select the device driver from installed list that needs to
be configured.
2http://searchenterprisedesktop.techtarget.com/tip/Device-drivers-Installation-and-configuration
41
ICTSAS518 Student Workbook
TOPIC 5 - CONFIGURE AND
TROUBLESHOOT THE DESKTOP AND
USER ENVIRONMENTS
Once the new or upgraded operating system has been installed, it will be necessary to
conduct a range of configuration and troubleshooting of the desktop and user
environments.
USER PROFILES
A user profile is a set of configurations that are made to adesktop environment that is
associated with a specific login and stored within the system for retrieval each time the
same user logs on.
Depending on the user profile type that is created the user profile may be accessed only
on the computer it was created on or on a range of connected computers on a network.
REGISTRY HIVE
A registry hive is a file named “NTuser.dat” This hive file will be loaded every time the
user logs in. The NTuser.dat file will be mapped to the registry key identified as
HKEY_CURRENT_USER. The function of the registry hive is to maintain the registry-
based configurations and preferences entered by the user or the creator of the profile.
The user profiles folder set will be stored in the file system within the “Profiles”
directory. Each time a new user is created a profile folder set will also be created.
These folders will contain the range of information related to the configurations and
settings of each profile.
42
ICTSAS518 Student Workbook
PROFILE TYPES
There is a range of different profile types which may be set up during the installation
and upgrading procedures conducted within the organisation.
LOCAL PROFILES
A local user profile is created each time new user logs onto a computer. When changes
are made to the desktop environment on a local profile, they will be saved to the specific
log on only within the particular computer that was used for the login.
MANDATORY PROFILES
Mandatory user profiles are a type of roaming profile that is able to be pre-configured in
a manner that allows the user profiles to be specified for the users. When a user is
logged into a mandatory profile, they will be able to adjust the desktop experience
settings, but these settings will not be saved once the user logs off.
Mandatory user profiles are an excellent way of organisations maintaining control and
consistency over the desktop configuration environment.
ROAMING PROFILES
A roaming user profile is a feature of the Windows NT family of operating systems that
can facilitate users with a computer that is joined to a Windows Server domain to
conduct log in procedures on any of the computers within the same network and access
their own documents and desktop setup.
Roaming profiles are common within medium to large organisation that require
theflexibility of user login locations.
43
ICTSAS518 Student Workbook
ORGANISE SHORTCUTS
As a part of the setting up of the user and desktop experience on completion of the
installation or upgrade processes conducted it will be necessary to organise the range of
shortcuts that the organisation wishes to have present on the desktop when particular
user profile groups log on.
DESKTOP SHORTCUTS
Desktop shortcuts are logos and links that can be placed on the desktop providing a
quick link to a specific:
• Folder
• Website
• Program
• Email user
3http://www.basiccomputerinformation.ca/desktop-shortcuts/
44
ICTSAS518 Student Workbook
COMPONENTS OF DESKTOP SHORTCUTS
• The icon: The icon is a graphic representation of the item that there is a
shortcut to
• Shortcut Arrow: An arrow is placed on the corner of the icon to show that it
is a shortcut
• Shortcut name: The name of the shortcut on the desktop
• Shortcut path: The path that links the icon to the item and creates the
shortcut
Desktop shortcuts may be created in the properties section of the folder that contains
the program or file that the desktop is created for.
It will be necessary to arrange the desktop shortcuts on the desktop through the use of
the properties and view functions that can be accessed byright-clicking on the desktop.
• Organisational policy
• Efficiency
45
ICTSAS518 Student Workbook
ARRANGE SCREEN MANAGEMENT
The final phase of setting up the user environment and desktop on completion of the
upgrading or installing procedures for operating systems is to arrange the screen
management options.
SCREEN MANAGEMENT
The screen management actions that can be set up within the selected operating system
will define the manner in which the multiple and varied screen viewing options are set
up.
DATA PROJECTORS
Data projectors may be connected to computers and then configured as a part of the
screen display.
These arrangements may be made in the display setting section of the installed or
upgraded display setting.
MULTIPLE SCREENS
There is a range of multiple screen options that may be set up in the display setting on
within the operating system and these arrangements may include:
46
ICTSAS518 Student Workbook
• Showing the desktop on the second screen only
SCREEN FREQUENCY
The screen frequency is the rate at which the buffer on the hardware will update, higher
frequencies will drain a lot of power but will show the most responsive and high-quality
image. Settings may be balanced between cost and quality parameters.
To change the default value for the Refresh Frequency setting of a guest PC, follow these steps:
Note The following steps only apply to guest operating systems that support DirectX 5 and later.
Windows NT only supports versions up to DirectX 3.
Click Start, click Run, type dxdiag in the Open box, and then click OK.
On the More Help tab, click Override.
Set the value to 75 Hz or higher, depending on the monitor. To do this, follow these steps:
Click Start, point to Settings, and then click Control Panel.
Double-click Display.
In the Display Properties box, click the Settings tab, and then click Advanced.
In the Default Monitor Properties box, click the Monitor tab.
On the Refresh Frequency menu, click 75 Hz (or higher, depending on your monitor), and then click
OK.
When you receive a prompt to apply the new settings, click OK, and then click Yes.
Click OK.
4
SCREEN RESOLUTION
The resolution on a screen is the measurement of the number of pixels that the screen
can display; higher setting may result in a clearer picture. It will be necessary to select
the screen resolution based on the needs of the user. The screen resolution setting may
be accessed via the display setting section of the operating system.
It is essential that all elements of the desktop environment and user experience
inf0ormstio is set up to meet the needs of the organisation and the users. In most cases
medium to largeorganisation will then lock these settings so that regular users are not
able to alter then without administrator request.
4https://support.microsoft.com/en-us/help/824570/how-to-change-the-default-refresh-frequency-
setting-of-a-guest-pc-for-windows-full-screen-mode
47
ICTSAS518 Student Workbook
SUMMARY
Now that you have completed this unit, you should have the skills and knowledge
tomaintain, install new and upgrade existing operating systems (OS) in a medium to
large organisation.
If you have any questions about this resource, please ask your trainer. They will be only
too happy to assist you when required.
48
ICTSAS518 Student Workbook
REFERENCES
Technical support Retrieved: 10 June 2017
https://en.wikipedia.org/wiki/Technical_support
WANT TO MOVE YOUR WINDOWS 10 INSTALL TO A NEW HARD DRIVE? HERE’S HOW
Retrieved: 10 June 2017 https://www.digitaltrends.com/computing/how-to-migrate-a-
windows-installation-to-a-different-hard-drive/
Center Red it, the importance of updating your operating system Retrieved: 10 June
2017 http://www.webopedia.com/TERM/O/operating_system.html
49
ICTSAS518 Student Workbook