0% found this document useful (0 votes)
18 views50 pages

ICTSAS518 Student Workbook

Uploaded by

pardeshikatha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views50 pages

ICTSAS518 Student Workbook

Uploaded by

pardeshikatha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 50

Crown Institute of Business and Technology Pty Ltd ABN 86 116 018 412 National Provider No: 91371

CRICOS Provider Code: 02870D


North Sydney Campus: 116 Pacific Highway North Sydney NSW 2060 P 02 9955 0488 F 02 9955 3888
Sydney CBD Campus: Level 5, 303 Pitt St Sydney NSW 2000 P 02 8959 6340 F 02 9955 3888
Canberra Campus: Suite 1, Level 4, 40 Cameron Avenue, Belconnen, ACT 2617 P 02 6253 5184

ICTSAS518
Install and upgrade operating
systems

Student Workbook
TABLE OF CONTENTS
TABLE OF CONTENTS ........................................................................................................................................1
UNIT INTRODUCTION .......................................................................................................................................4
ABOUT THIS RESOURCE ................................................................................................................................4
ABOUT ASSESSMENT ....................................................................................................................................5
ELEMENT AND PERFORMANCE CRITERIA..........................................................................................................7
PERFORMANCE EVIDENCE AND KNOWLEDGE EVIDENCE ..................................................................................8
PERFORMANCE EVIDENCE ............................................................................................................................8
KNOWLEDGE EVIDENCE ................................................................................................................................8
ASSESSMENT CONDITIONS ...............................................................................................................................9
PRE-REQUISITES ...............................................................................................................................................9
TOPIC 1 – DETERMINE ORGANISATIONAL HELP DESK PROCEDURES ...............................................................10
REVIEW ORGANISATION’S TECHNICAL SUPPORT PROCEDURES......................................................................10
TECHNICAL SUPPORT PROCEDURES ....................................................................................................................... 10
PLANNING AND CONDUCTING REVIEWS ................................................................................................................. 11

INTERROGATE HELP DESK SYSTEM .................................................................................................................12


INTEGRATION IN COMPUTING ............................................................................................................................ 12
HELP DESK ..................................................................................................................................................... 12
communicating effectively with the help desk......................................................................................... 12
HELP DIRECTORY ............................................................................................................................................. 13
DOCUMENTS ACCESSIBLE IN THE HELP DIRECTORY .................................................................................................... 13
ACCESSING AND USING THE HELP DIRECTORY .......................................................................................................... 13

LIAISE WITH CLIENT ........................................................................................................................................15


PROCESS OF LIAISING ........................................................................................................................................ 15

TOPIC 2 – INSTALL OR UPGRADE A DESKTOP OS.............................................................................................16


INSTALL AN OS ...............................................................................................................................................16
OPERATING SYSTEM ......................................................................................................................................... 16
Multi-user .............................................................................................................................................. 16
Multiprocessing ..................................................................................................................................... 16
Multitasking .......................................................................................................................................... 17
Multithreading....................................................................................................................................... 17
Real time ............................................................................................................................................... 17
POPULAR OPERATING SYSTEMS ........................................................................................................................... 17
Linux Operating Systems ........................................................................................................................ 17
Mac Operating Systems (MAC OS).......................................................................................................... 17
Windows Operating Systems .................................................................................................................. 17
Mac ....................................................................................................................................................... 18
Windows ............................................................................................................................................... 18
Legacy Windows .................................................................................................................................... 18
Unix-like operating systems.................................................................................................................... 18
EXPLAIN PROCEDURES AND TECHNIQUES INVOLVED IN THE INSTALLATION AND UPGRADE OF OS .......................................... 18
Check system requirements .................................................................................................................... 19
Obtain operating system and licenses .................................................................................................... 19

1
ICTSAS518 Student Workbook
Follow instructions of operating system.................................................................................................. 19
Install from disc ..................................................................................................................................... 19
Install from digital file ............................................................................................................................ 19
Installing multiple operating systems to run simultaneously ................................................................... 20
Installing multiple operating systems to run one at a time on the same machine .................................... 20
UPGRADE AN EXISTING OS .............................................................................................................................21
BACK UP EXISTING SYSTEM................................................................................................................................. 21
HOW TO UPGRADE .......................................................................................................................................... 22
Clean install ........................................................................................................................................... 22
Install over existing operating system..................................................................................................... 23
RESEARCH AND IMPLEMENT AUTOMATED OS INSTALLATION TECHNIQUES AND PROCEDURES ....................24
EXPLAIN PROCEDURES AND PRINCIPALS INVOLVED IN UNATTENDED OS INSTALLATION ....................................................... 24
Not present............................................................................................................................................ 24
No prompts............................................................................................................................................ 24
Multiple machines ................................................................................................................................. 24
AUTOMATED OS INSTALLATION .......................................................................................................................... 25
INSTALLATION TECHNIQUES AND PROCEDURES ........................................................................................................ 26
MIGRATE FILES ...............................................................................................................................................28
DATA MIGRATION ............................................................................................................................................ 28
DATA THAT MAY NEED TO BE MIGRATED ................................................................................................................ 28
ANALYSING REQUIRED DATA MIGRATION REQRUIEMENTS ........................................................................................... 28
DOCUMENT DATA MIGRATION REQRUIEMENTS ........................................................................................................ 29
CONDUCT THE DATA MIGRATION ACTIVITY ............................................................................................................. 29
TOPIC 3– MANAGE AND TROUBLESHOOT RESOURCE ACCESS ........................................................................30
CONFIGURE LOCAL RESOURCES ACCESS .........................................................................................................30
LOCAL RESOURCE ACCESS .................................................................................................................................. 30
CONFIGURING LOCAL ACCESS ............................................................................................................................. 31
CONFIGURE SHARING OF LOCAL RESOURCES .................................................................................................32
WORKGROUPS ............................................................................................................................................... 32
HOMEGROUPS ............................................................................................................................................... 32
DOMAINS ..................................................................................................................................................... 33
CONFIGURATION IN SERVER ............................................................................................................................... 33
CONFIGURATION FROM WORKSTATION ................................................................................................................. 33
ASSIGN ACCESS RIGHTS TO SHARED RESOURCES............................................................................................34
AUTHENTICATION ............................................................................................................................................ 34
PERMISSIONS ................................................................................................................................................. 35
Read only............................................................................................................................................... 35
Read and write ...................................................................................................................................... 35
TOPIC 4 - CONFIGURE AND TROUBLESHOOT HARDWARE DEVICES AND DRIVERS ..........................................36
DETERMINE AND RESOLVE PROBLEMS WITH HARDWARE RESOURCES ..........................................................36
TROUBLE SHOOTING ......................................................................................................................................... 36
COMMON HARDWARE PROBLEMS ....................................................................................................................... 37
RESEARCH AND INSTALL APPROPRIATE DEVICE DRIVERS ...............................................................................38
RESEARCH APPROPRIATE DEVICE DRIVERS ............................................................................................................... 38
INSTALL DEVICE DRIVERS ................................................................................................................................... 38

2
ICTSAS518 Student Workbook
CONFIGURE HARDWARE RESOURCES .............................................................................................................39
HARDWARE RESOURCES .................................................................................................................................... 39
INSTRUCTIONS FOR CONFIGURING THE RESOURCE SETTINGS FOR HARDWARE................................................................... 39
DESCRIBE OS CONFIGURATION ISSUES THAT MAY ARISE WITH HARDWARE AND DESKTOP ENVIRONMENTS .............................. 39
insufficiENt hardware............................................................................................................................. 39
driver issues ........................................................................................................................................... 40
software incompatibility ........................................................................................................................ 40
hardware incompatibilltiy ...................................................................................................................... 40
CONFIGURE DEVICE DRIVERS..........................................................................................................................41
DEVICE DRIVERS .............................................................................................................................................. 41
instalL device drivers ....................................................................................Error! Bookmark not defined.
Configure device drivers ......................................................................................................................... 41
TOPIC 5 - CONFIGURE AND TROUBLESHOOT THE DESKTOP AND USER ENVIRONMENTS ................................42
CONSTRUCT PROFILES FOR USERS ..................................................................................................................42
USER PROFILES ................................................................................................................................................ 42
Registry Hive.......................................................................................................................................... 42
Profile folder set..................................................................................................................................... 42
PROFILE TYPES ................................................................................................................................................ 43
local profiles .......................................................................................................................................... 43
mandatory profiles................................................................................................................................. 43
roaming profiles..................................................................................................................................... 43
ORGANISE SHORTCUTS...................................................................................................................................44
DESKTOP SHORTCUTS ....................................................................................................................................... 44
purpose of desktop shortcuts ................................................................................................................. 44
components of desktop shortcuts ........................................................................................................... 45
create desktop shortcuts ........................................................................................................................ 45
Arrange desktop shortcuts items ............................................................................................................ 45
ARRANGE SCREEN MANAGEMENT .................................................................................................................46
SCREEN MANAGEMENT ..................................................................................................................................... 46
Data projectors ...................................................................................................................................... 46
Multiple screens..................................................................................................................................... 46
Screen frequency.................................................................................................................................... 47
Screen resolution ................................................................................................................................... 47
SUMMARY......................................................................................................................................................48
REFERENCES ...................................................................................................................................................49

3
ICTSAS518 Student Workbook
UNIT INTRODUCTION
This resource covers the unit ICTSAS518 - Install and upgrade operating systems.

This unit describes the skills and knowledge required to maintain, install new and
upgrade existing operating systems (OS) in a medium to large organisation.

It applies to individuals who apply technical and specialised knowledge to undertake


complex support operations.

No licensing, legislative, or certification requirements apply to this unit at the time of


publication.

ABOUT THIS RESOURCE

This resource brings together information to develop your knowledge about this unit.
The information is designed to reflect the requirements of the unit and uses headings to
makes it easier to follow.

Read through this resource to develop your knowledge in preparation for your
assessment. You will be required to complete the assessment tools that are included in
your program. At the back of the resource are a list of references you may find useful to
review.

As a student it is important to extend your learning and to search out text books,
internet sites, talk to people at work and read newspaper articles and journals which
can provide additional learning material.

Your trainer may include additional information and provide activities, slide
presentations, and assessments in class to support your learning.

4
ICTSAS518 Student Workbook
ABOUT ASSESSMENT

Throughout your training we are committed to your learning by providing a training


and assessment framework that ensures the knowledge gained through training is
translated into practical on the job improvements.

You are going to be assessed for:

• Your skills and knowledgeusingwritten and observation activities that apply


to your workplace.
• Your ability to apply your learning.
• Your ability to recognise common principles and actively use these on the job.

You will receive an overall result of Competent or Not Yet Competent for the assessment
of this unit. The assessment is a competency based assessment, which has no pass or
fail. You are either competent or not yet competent. Not Yet Competent means that you
still are in the process of understanding and acquiring the skills and knowledge required
to be marked competent.The assessment process is made up of a number of assessment
methods. You are required to achieve a satisfactory result in each of these to be deemed
competent overall.

All of your assessment and training is provided as a positive learning tool. Your assessor
will guide your learning and provide feedback on your responses to the assessment.For
valid and reliable assessment of this unit, a range of assessment methods will be used to
assess practical skills and knowledge.

Your assessment may be conducted through a combination of the following methods:

• Written Activity
• Case Study
• Observation
• Questions
• Third Party Report

The assessment tool for this unit should be completed within the specified time period
following the delivery of the unit. If you feel you are not yet ready for assessment,
discuss this with your trainer and assessor.

5
ICTSAS518 Student Workbook
To be successful in this unit you will need to relateyour learning to your workplace. You
may be required to demonstrate your skills and be observed by your assessor in
yourworkplaceenvironment. Some units provide for a simulated work environment and
your trainer and assessor will outline the requirements in these instances.

6
ICTSAS518 Student Workbook
ELEMENT AND PERFORMANCE
CRITERIA
1. Determine 1.1 Review organisation’s technical support procedures
organisational help desk
procedures 1.2 Interrogate help desk system

1.3 Liaise with client

2. Install or upgrade a 2.1 Install an OS


desktop OS
2.2 Upgrade an existing OS

2.3 Research and implement automated OS installation


techniques and procedures

2.4 Migrate files

3. Manage and 3.1 Configure local resources access


troubleshoot resource
access 3.2 Configure sharing of local resources

3.3 Assign access rights to shared resources

4. Configure and 4.1 Determine and resolve problems with hardware


troubleshoot hardware resources
devices and drivers
4.2 Research and install appropriate device drivers

4.3 Configure hardware resources

4.4 Configure device drivers

5. Configure and 5.1 Construct profiles for users


troubleshoot the desktop
and user environments 5.2 Organise shortcuts

5.3 Arrange screen management

7
ICTSAS518 Student Workbook
PERFORMANCE EVIDENCE AND
KNOWLEDGE EVIDENCE
This describes the essential knowledge and skills and their level required for this unit.

PERFORMANCE EVIDENCE

Evidence of the ability to:

• Determine organisation operating systems (OS) requirements


• Install or upgrade OS
• Customise OS to user requirements
• Manage and configure hardware devices
• Manage and configure desktop

Note: Evidence must be provided for at least TWO operating systems.

KNOWLEDGE EVIDENCE

To complete the unit requirements safely and effectively, the individual must:

• Explain procedures and techniques involved in the installation and upgrade


of OS
• Explain procedures and principals involved in unattended OS installation
• Describe OS configuration issues that may arise with hardware and desktop
environments

8
ICTSAS518 Student Workbook
ASSESSMENT CONDITIONS
Gather evidence to demonstrate consistent performance in conditions that are safe and
replicate the workplace. Noise levels, production flow, interruptions and time variances
must be typical of those experienced in the systems administration and support field of
work, and include access to:

• Special purpose tools, equipment and materials


• Industry software packages
• Stand-alone or networked personal computers
• Appropriate OS installation compact disk or recovery boot disks
• Drivers for connected devices
• Helpdesk system
• OS service packs

Assessors must satisfy NVR/AQTF assessor requirements.

PRE-REQUISITES
This unit must be assessed after the following pre-requisite unit:

There are no pre-requisites for this unit.

9
ICTSAS518 Student Workbook
TOPIC 1 – DETERMINE
ORGANISATIONAL HELP DESK
PROCEDURES

REVIEW ORGANISATION’S TECHNICAL SUPPORT PROCEDURES

When preparing to install and upgrade operating systems within an organisation, it will
be necessary to determine the operational help desk procedures.

TECHNICAL SUPPORT PROCEDURES

Technical support procedures are the procedures within an organisation that are used
to provide technical support to users and other stakeholders within the organisation.

Technical support procedures aim to provide assistance and support to a range of


products and items within an organisation including:

• Hardware
• Software
• Networking devices

There is a range of technical support delivery methods including:


• Email support
• Live support
• Software and utilities
• Helpdesk

It is important that all personnel that are to be involved in the installation and
upgrading of operating systems are aware of the technical support options that are
available to them and that can be utilised throughout the process of completing work
tasks.

10
ICTSAS518 Student Workbook
PLANNING AND CONDUCTING REVIEWS

The planning and conducting of reviews on reports or other data sources can be
conducted by the following of these actions:

• Assess all existing documents and data for their availability and relevance to
the questions that need to be answered
• Access the documents and data sources following organisational procedures
• Ensure that the confidentiality and security of all documentation and data
sources through the review
• Verify the authenticity and accuracy of documentation and data sources
through investigative procedures
• Extract and summarise all data that is relevant to the questions being asked
by the review

Once all information that was sought and collected during the review has been collected,
it will be necessary to ensure that the information is sorted into manageable sections
and presented so that it can be used to inform on decision-making processes.

11
ICTSAS518 Student Workbook
INTERROGATE HELP DESK SYSTEM

It will be necessary to interrogate the help desk system in order to obtain all required
information.

INTEGRATION IN COMPUTING

The process of interrogation of computer systems or software includes the:

• Counting and assessment of files and resources


• Assessment of contents
• Assessment of functions

HELP DESK

The help desk is a chat or phone support service that many organisations will run for
their networking equipment.

Help desk professionals will utilise issue tracking software to aid them in effective:

• Troubleshooting
• Solving problems
• Identifying causes of issues
• Pinpointing problems
• Answering questions
• Providing support information

COMMUNICATING EFFECTIVELY WITH THE HELP DESK

When communicating with the help desk in order to quickly identify network problems,
it will be necessary to ensure that:

• Network components are known


• Network configuration is known
• Symptoms are listed and defined clearly
• Any error messages or codes have been recorded

12
ICTSAS518 Student Workbook
Effective help desk communication revolves around the following of the help desk
professionals question tree and process. It is important to concisely provide all initial
information and then answer all questions put forward by the help desk professional in
order to allow them to follow a clear path to an answer.

HELP DIRECTORY

Helpdesk documentation can include written guides or instructions that are either
electronic or hard copy. Helpdesk documentation is a form of support documentation
that is written to enable the help desk personnel to troubleshoot issues and provide
advice and guidance to the client on how to use the software application correctly and to
its full potential. Helpdesk documentation will need to be created to agreed
organisational and help desk personnel requirements.

DOCUMENTS ACCESSIBLE IN THE HELP DIRECTORY

Documentation that may be accessible in the help directory includes:

• Copies of User Manuals


• Copies of Technical Manuals
• Copies of Teaching Manuals
• Detailed explanations of the content of User Manuals and user advice
• Detailed explanations of the content of Technical Manuals and user advice
• Detailed explanations of the content of Teaching Manuals and user advice
• Thorough and comprehensive troubleshooting advice on all possible issues
that may arise due to systems, application or user error
• Copies of all templates included within the customised software application
• Lists of all Macros codes that have been included in the software application

ACCESSING AND USING THE HELP DIRECTORY

The help directory can be accessed in most cases from within the application that is
being used, although in some cases the help directory for a specific program will be a
separate application or need to be accessed online or in hard copy. It will be necessary
to read the user manual to determine the location and usage of the help directory for the
specific application.

13
ICTSAS518 Student Workbook
Once the help directory is opened, it will be necessary to navigate its features in order to
determine the answer to your issue or anomaly by:

• Searching within the help directory using keywords or questions


• Scrolling through the sections of the directory
• Reading tips and pointers
• Following trouble-shooter information

14
ICTSAS518 Student Workbook
LIAISE WITH CLIENT

It will be necessary to ensure that the client is liaised with regarding a range of factors
including the help and support options held by the organisation and the installation and
upgrade of operating systems.

PROCESS OF LIAISING

The process of liaising is the process of working together in a professional manner


during which both parties will keep each other informed of the actions that are
occurring throughout the work.

When liaising with clients, it will be necessary to:

• Maintain professional communication


• Share and update the client with a range of information on work tasks

Client liaisons may be:

• Face to face
• Via the telephone
• Over email
• Conducted by formal reports
• Formal
• Informal
• Scheduled
• Unplanned

It is essential that all client liaisons are conducted in a professional and clear manner in
order to make sure that the client is consistently updated on the progress and
requirements of a work project.

15
ICTSAS518 Student Workbook
TOPIC 2 – INSTALL OR UPGRADE A
DESKTOP OS

INSTALL AN OS

Installing an Operating System (OS) onto a computer or network is the process of


installing software that acts as the system that allows all hardware and software on a
computer to function properly. The software is programs that are installed directly onto
a computer’s internal hard drive or booted from external hard drives.

OPERATING SYSTEM

An operating system is the single most important program that is run on all general-
purpose computers. It is a software platform that runs on a computer that allows other
applications to run within the environment that it creates.

There are a large variety of operating systems. They are chosen based upon Hardware
and software requirements for their intended uses. Applications are written to work
with certain operating systems. In order to use the desired program, one can only install
it on the operating system to which it was written to work within. Some operating
systems only work with specific hardware. If a user wants to use a specific piece or
hardware, they can only use it in conjunction with operating systems that allow the
hardware to work properly within the OS. If a user wants to use a specific operating
system, they can only use hardware that works with that operating system.

There are five classifications of operating systems:

MULTI-USER

Multi-user operating systems allow more than one user to run programs at the same
time. Some multi-user operating systems allow thousands of users to use programs
concurrently.

MULTIPROCESSING

Multiprocessing operating systems support the running of a single program on more


than one Central Processing Unit (CPU).

16
ICTSAS518 Student Workbook
MULTITASKING

Multitasking operating systems allow more than one program to be run simultaneously.

MULTITHREADING

Multithreading operating systems allow multiple parts of the same program to run at
the same time.

REAL TIME

Real-time operating systems can respond to input instantly.

POPULAR OPERATING SYSTEMS

The three most popular operating systems for business and personal computing are:

LINUX OPERATING SYSTEMS

Linux is freely distributed and open source. It is able to run on a number of hardware
platforms.

MAC OPERATING SYSTEMS (MAC OS)

Mac OS is the official name for the operating systems used on Apple Macintosh
computers. It features the use of windows, icons in its Graphic User Interface (GUI).
Most applications that run on Mac OS have similar user interfaces.

WINDOWS OPERATING SYSTEMS

Microsoft Windows is a family of operating systems used on personal and business


computers. Windows is the most widely used operating system. Most hardware and
software is compatible with Windows operating systems.

17
ICTSAS518 Student Workbook
The following are examples of most available operating systems for business and
personal computers:

MAC

• OS 9
• OSX

WINDOWS

• Windows 2000
• Windows Vista
• Windows XP
• Windows 10

LEGACY WINDOWS

• DOS
• Windows 95/98
• Windows ME
• Windows NT 4.0

UNIX-LIKE OPERATING SYSTEMS

• BSD and derivations


• GNU and Linux
• NextStep
• Suse Linux
• Available open Source OS

EXPLAIN PROCEDURES AND TECHNIQUES INVOLVED IN THE INSTALLATION


AND UPGRADE OF OS

The procedures and techniques involved in the installation of an operating system differ
depending upon the type of installation that personal installing an OS chooses to use.
There are some procedures and techniques that are constant regardless of the
18
ICTSAS518 Student Workbook
installation type that is chosen. The steps that must be taken when installing any
operating system are:

CHECK SYSTEM REQUIREMENTS

All hardware and software systems have operational requirements that must be met by
the operating system that they are used in. It is vital that all requirements are checked
prior to installation to avoid incompatibility issues.

OBTAIN OPERATING SYSTEM AND LICENSES

Many operating systems require thepurchase of the system and licenses to install them
onto computers. Some operating systems are available for free and do not require
licenses to install them onto computers. A copy of the operating system must be
obtained as a physical copy on disc or as a file downloaded from the internet or
contained on a digital media storage device.

FOLLOW INSTRUCTIONS OF OPERATING SYSTEM

Most operating systems contain installation programs that automate the process of
installing them. It is only required that a few steps be completed by personnel as the
installation program handles the installation.

Installation methods of OS’s and their installation procedures and methods include:

INSTALL FROM DISC

Operating systems that are contained on discs can be installed on a computer via disc
drives. It is important that the type of disc that contains the operating system is
readable by a disc drive located within the computer or connected by a peripheral cable.
Installers should be aware that when a drive is connected peripherally that some system
functions, including connectivity ports, may be unavailable if specific steps are not
taken.

INSTALL FROM DIGITAL FILE

Operating systems can be installed from digital files located on external storage devices
or downloaded from a network. Installers should be aware that when an

19
ICTSAS518 Student Workbook
externalstorage is connected peripherally that some system functions, including
connectivity ports, may be unavailable if specific steps are not taken.

INSTALLING MULTIPLE OPERATING SYSTEMS TO RUN SIMULTANEOUSLY

In the event of two separate operating systems being installed that run side by side on a
machine, the operating systems must be installed in the correct order. Installation may
not be possible or may produce intermittent errors if not installed in the correct order.

INSTALLING MULTIPLE OPERATING SYSTEMS TO RUN ONE AT A TIME ON THE SAME


MACHINE

Operating systems that are to be run one at a time on the same machine can be installed
via disc or digital files. They must be installed in the correct order in order to achieve
functionality. During installation one program is given priority to boot when the
machine is powered up. Separate instructions are given within the default program or in
computers pre-boot menu to allow for one operating system or the other to be booted.

20
ICTSAS518 Student Workbook
UPGRADE AN EXISTING OS

Upgrading a computer's operating system is the process of installing an updated version


of the operating system that is currently being used on the machine. Computer
hardware and software technologies are constantly being developed.

The developments result in increased performance capabilities and software demands


being placed on computers. Those demands create a need for computer operating
systems also to be developed in order to meet the application and hardware demands.

Advancements that exist in updated operating systems include:

• Support for new hardware and software


• Discontinued support for legacy hardware and software
• Updated GUI
• Increased processing power handling
• Additional accessibility options
• Augmented user experience

It is worth noting that operating systems simply provide an environment for other
applications to function within. All other applications are separate and often need to be
installed individually after an OS has been installed on a machine.

BACK UP EXISTING SYSTEM

An important step that should be taken prior to updating a computer's OS is backing up


the computer's drives. Backing up the drives of a computer is the action of making
duplicate copies of the information found on a machine's hard drives. The primary
purpose of creating backups is to prevent the accidental loss of data found on computer
hard drives. In the event of data being lost or corrupted, a backup can be used to
retrieve data that was copied prior to the loss or corruption. Backing up the drives of a
computer is easily accomplished using backup software that is designed to simplify and
streamline the process of copying all files on a machine in a manner that allows them to
be reinstalled or booted on any compatible computer easily.

21
ICTSAS518 Student Workbook
Backups can be created and stored in a variety of locations, including:

• External hard drives


• Cloud services
• Servers
• Within a computer’s internal storage alongside the existing system

HOW TO UPGRADE

There are several methods of upgrading a computer's operating system.

The method used to conduct an upgrade depends on several factors, which include:

• Available resources (budget, hardware, time)


• Backup software used
• Importance of data being backed up
• The size of thebackup, i.e., 1TB or 500GB

There are advantages and disadvantages to each method. Personnel should evaluate
their given situations and requirements to decide which method will be most effective
for their purposes.

The two categories that all backup methods fit into are:

CLEAN INSTALL

A clean install is an action of deleting all information from a computers’ hard drives then
installing a new operating system onto the blank drive. Many people choose this option
because it reduces the risk of corruption of files due to errors that may occur during the
upgrade process. This method is more time consuming but often provides for smoother
and cleaner computer function after an upgrade has been completed.

The steps involved in a clean install are:

1. Back up computers hard drives


2. Delete all information on existing drives
3. Format hard drives to allow for installation of updated OS

22
ICTSAS518 Student Workbook
4. Install updated OS onto formatted drive
5. Load user profiles and system settings from backup of theprevious system

Steps 5 and 6 are often combined into one step. Automated installation applications
typically allow for backups of previous systems to be used during the installation
process. Prompts within the application, direct personnel, as to when and how to
introduce data from backups.

INSTALL OVER EXISTING OPERATING SYSTEM

Installing over and existing operating system is the action of installing an operating
system directly onto a computer without deleting the previous operating system or user
profiles and system settings. This method is preferred by some because it eliminates
some steps of the process, thus making the process faster and more streamlined.

The steps involved in updating an operating system over an existing operating system
are:

1. Backup Hard Drives


2. Install update directly to existing system

23
ICTSAS518 Student Workbook
RESEARCH AND IMPLEMENT AUTOMATED OS INSTALLATION
TECHNIQUES AND PROCEDURES

EXPLAIN PROCEDURES AND PRINCIPALS INVOLVED IN UNATTENDED OS


INSTALLATION

Automated OS installations are also known as unattended installations. The driving


principals of unattended installations are:

NOT PRESENT

The person installing the OS doesn’t need to be physically present at the location where
the OS is being installed. Installations and upgrades can be scheduled to take place
automatically.

NO PROMPTS

All prompts typically associated with the installation of an OS have been configured
prior to the installation process.

MULTIPLE MACHINES

Multiple computers can have OS’s installed from one command given from a server or
controller computer.

Deployment of multiple operating system installations can be costly, complicated and


difficult to obtain consistent results when the installations are performed manually.

Some problems that may arise as a result of manual OS installations to multiple


machines are:

• Difficulty downloading and maintaining current operating systems,


application files and drivers to perform system deployment to all computers
and devices throughout an organisation
• Difficulty creating bootable images of drives and installing applications one at
a time to each device or computer
• Limited ability to test each machine that operating systems have been
deployed to manually perform configuration changes to machines

24
ICTSAS518 Student Workbook
• Difficulty tracking what machines need updating
• Being put at risk due to repeatedly performing all tasks manually
• Difficulty in accurately reporting OS deployment and issues that coincide with
it

ITC professionals should research and implement automated installation systems,


techniques and procedures to alleviate such problems.

Research and implementation of automated OS installation techniques and procedures


can help to solve problems by providing the following outcomes:

• Allowing for the management of OS, driver and application files in one
centralised file system
• Easily create images of operating system for testing prior to deployment
• OS’s, software applications and updates can be rapidly deployed to multiple
machines in a reliable, timely and consistent manner
• Ease of OS deployment and reporting software on all machines within an
organisation

AUTOMATED OS INSTALLATION

Automated installation of OS’s is a term that refers to the practice of installing operating
systems onto multiple computers and devices by means of an automated system from a
central location. ITC professionals use automated installer toolkits to perform OS
installations onto more than one machine that sharessimilar uses. Toolkits are
applications or collections of applications that allow multiple installations to be
deployed from a single location, such as a server or machines networked through a
server or other means.

Many hardware and software providers have produced toolkits that are designed
specifically to work with their products. It is suggested that ITC personnel consult the
documentation or technical support from the product manufacturer to help determine
what toolkit might work best for their needs. It is often best to use toolkits made by the
producer of the OS that is being installed. A very popular Toolkit that works for many
automated OS installations is the Microsoft Deployment Toolkit (MDT).

25
ICTSAS518 Student Workbook
MDT and other toolkits contain applications that assist with the following:

• Drive cloning (BackUps)


• Monitoring of multiple machines
• testing OS for issues
• scheduling tasks such as updates or debugging

INSTALLATION TECHNIQUES AND PROCEDURES

The installation techniques and procedures for automated installation of OS’s can be
divided into two stages:

• Testing
• Production

The steps for testing are often as follows:

1. Review hardware and software requirements of all devices and computers


2. Obtain appropriately automated OS installation toolkits
3. Verify that all network connections are working properly that will be used
during automated OS deployment
4. Install Toolkit to server or machine that will be used to control deployment
5. Install OS, drivers and other applications to Toolkit application
6. Load boot image of OS that is to be updated if not a clean install
7. Install OS to boot image using the toolkit then run all available testing
software and procedures
8. Fix any issues that may arise

The steps involved in the production of automated OS installation are:

1. Check network connections to ensure that the toolkit is communicating


effectively with all computers and devices
2. Import OS image that has successfully been tested
3. Prepare all configurations and settings to be deployed
4. Deploy OS using toolkit

26
ICTSAS518 Student Workbook
5. Run testing and analysis applications to ensure that deployment did not
encounter any issues

27
ICTSAS518 Student Workbook
MIGRATE FILES

It is essential to ensure that all data migration requirements that will be required for the
installation or upgrading process for the operating system are appropriately analysed
and followed.

DATA MIGRATION

The migration of data involves the transferring of data from one location or system to
another.

Ineffective data migration procedures can result in major network and business issues
including:

• Misconfigured data
• Lost data
• Network failure
• Loss of operational ability
• Financial losses

DATA THAT MAY NEED TO BE MIGRATED

There is a range of data that may need to be migrated during the installation and
upgrade of operating systems,and these may include:

• New operating system data


• Data stored on the machine to be upgraded or updated

ANALYSING REQUIRED DATA MIGRATION REQRUIEMENTS

It will be necessary to analyse all required data migration requirements are analysed
through the collection of:

• Types: It will be necessary to determine the range of different types of data


that will need to be migrated throughout the server process
• Volume: It will be necessary to analyse the amount of each of the different
types of data that need to be migrated

28
ICTSAS518 Student Workbook
• Permissions: In some cases, it will be necessary to obtain a range of
permissions regarding the migration of data as data may be protected or
sensitive
• Impact on the rest of the network: It will be necessary to analyse the impact
that the migration of the data is likely to have on the rest of the network so
that contingency planning is able to be undertaken

DOCUMENT DATA MIGRATION REQRUIEMENTS

Once the data migration requirements have been analysed, it will be necessary to ensure
that they are documented carefully and according to organisational requirements.

The following information regarding the data migration will need to be documented:

• Data to be migrated
• Impact assessments
• Procedures and risks
• Permissions and approvals
• Contingency plans

CONDUCT THE DATA MIGRATION ACTIVITY

The data migration activity can be conducted using the following procedures:

• Prepare the system: It will be necessary to prepare the system for the
copying and moving of files through the cleaning of hard drives and the use of
disk utilities
• Back up data: Prior to a data migration process it will be necessary to back up
the data to be migrated for safety
• Select a migration tool: There is a range of migration tools that can be used to
manage data migration effectively it will be necessary to select a tool that is
compatible with the system
• Conduct data migration: It will be necessary to follow all data migration tool
prompts to complete the migration safely

29
ICTSAS518 Student Workbook
TOPIC 3– MANAGE AND
TROUBLESHOOT RESOURCE ACCESS

CONFIGURE LOCAL RESOURCES ACCESS

ITC professionals must configure many settings to machines and devices in the
networks that they oversee. One of the areas that need to be addressed in that process is
the configuration of local resource access.

LOCAL RESOURCE ACCESS

Configuring local resource access is the collection of actions required to allow users on
the network to access peripherals, applications and other devices on the network. In ITC
terminology, the term local refers to files, devices and other resources that are at a
particular workstation or network node. Files, devices and other resources that located
at other network nodes are referred to as being remote resources.

Having access to devices, files and resources that are located at other nodes are known
as having local access to those nodes. In essence, one can have access to resources that
are at another location without having to physically go to that location or change
workstations.

Resources that may have local access to them granted to users include:

• Disc drives
• Printers
• Line Print Terminal (LPT) Ports
• Serial Communication (COM) ports
• Clipboards
• Audio
• Any supported plug and play device (Cameras, projectors)

30
ICTSAS518 Student Workbook
Making use of resources via local access is known as redirection. This is because, from
the server perspective, control of the resource is being redirected to the workstation
that has been granted access to it. Resources can be accessed through standard
protocols or Media Transfer Protocol (MTP) for media players and Picture Transfer
Protocol (PTP) for cameras.

CONFIGURING LOCAL ACCESS

Configuring local access is in effect making local devices available for use in remote
sessions. That configuration is done from a server or other network control station.
Servers have operating systems that are designed to control networks as opposed to
simply existing within them.

The control features found within applications on the server operating system allow for
system administrators to grant local access to resources by configuring an array of
options. Network administrators give users on their networks the ability to access
remote resources locally simply by selecting them from thedrop-down menus or
through standard folder tree menus.

Network administrators grant access by approving or disapproving access to resources


in a series of menus. The menu layout and specific options differ according to the
particular software that is being used to configure the access. All configuring
applications work on the principle of giving an access granted, or access denied label to
each machine on a network. For large networks with many nodes, usually, group access
is granted to all machines that fit specific criteria. This sort of batch access configuration
saves time and reduces the chance of errors being made when granting local access to
remote resources.

31
ICTSAS518 Student Workbook
CONFIGURE SHARING OF LOCAL RESOURCES

Configuring sharing local resources is the action of allowing resources that are local to a
particular computer with users located at other workstations or nodes on a network.
Access to local resources can be granted from a workstation that contains the resources
to be shared or from a remote location such as a server or network administrators’
workstation.

Local resources can be:

• Files located on a computer’ss hard drives


• Peripherals connected to a workstation
• All other devices that can be controlled from a workstation without the need
for authentication

Computers that share local files can be categorised into three groups:

WORKGROUPS

Workgroups have the following features:

• All computers are peers with no computer having control over any other
computer
• Each machine has user accounts. In order to log into any computer in the
group, users must possess a username and password that is specific to the
machine that they are using
• Workgroups are not password protected
• All computers are on the same local network or subnet
• Management of user accounts, security of resources and providing access to
shared accounts must be done from each machine. As a result, it is time-
consuming and prone to errors

HOMEGROUPS

Homegroups have the following features:

• All computers in a homegroup are also computers that belong to the same
workgroup

32
ICTSAS518 Student Workbook
• Resource sharing is streamlined and easier to configure
• Homegroups are password protected. The password only needs to be entered
once, when a machine is added to the network for the first time

DOMAINS

Domains have the following features:

• Must have at least one server on the network. Network administrators use
servers to control all security and access to the domain. All domain users
have to provide passwords or other credentials each time they access a
domain
• Domain passwords can be used to log onto the domain from any computer on
the domain without having a local account on that computer
• There can be thousands of users in one domain
• Domain users can join existing homegroup but cannot create them

CONFIGURATION IN SERVER

Local resources that are made available to remote computers and devices by means of
theconfiguration of server settings is accomplished by the similar means configuring
local access. All group and individual settings can be configured using this method.
When configuring large numbers of computers or settings, it is most practical and
reliable to configure a server

CONFIGURATION FROM WORKSTATION

Many small networks can be run without the use of a server. The file sharing options
included in most operating systems allows for sharing of local resources without the
need for an external controller or server. Although it is possible to configure sharing
options from a server, it is sometimes required that or more practical to configure from
individual workstations.

33
ICTSAS518 Student Workbook
ASSIGN ACCESS RIGHTS TO SHARED RESOURCES

Shared resources on a network must have access rights assigned to those wishing to
access the resources in order for them to be available. Access rights are typically
assigned through a server or other access granting application. This facilitates the ability
to grant access to large numbers of resources to many users.

In the event of small numbers of resources being granted to a small number of users,
access rights can be granted to individual resources from local settings provided that
network settings do not prevent sharing of the resource.

Shared resources rights can be assigned in a similar manner to the methods used for
configuring local resource access. Server applications are used to allow specified groups
or individuals the ability to access resources. Each user logged onto a network belongs
to a group that is specified by the server that is controlling the network. Administrators
usually assign access rights so that only members of particular groups can access certain
resources on a network.

AUTHENTICATION

Network administrators can configure resources to require authentication when


accessing them. Authentication is the process of access to a resource being granted or
denied based upon an authentication code that is provided.

Authentication is typically done in one of three ways:

• Automatic authentication to users logged into a network


• Users enter their network login and password each time they access shared
resources
• Additional passwords or authentication codes must be presented when
accessing shared resources

Network administrators configure authentication systems where the following steps


take place:

1. When access to a particular resource is attempted the system requests a


passcode
2. The user enters a passcode and sends it to the server

34
ICTSAS518 Student Workbook
3. The server consults theinformation provided by the network administrator to
determine whether or not the passcodeis adequate to grant access to the
resource. This information is based on a grant or deny response that the
administrator has assigned to the resource and passcode
4. The server sends information back to the user conveying granted or denied
access then proceeds to normal function

PERMISSIONS

Permissions are configurable security settings attached to most resources. They


determine who has permission to access the resources. Permissions can be set locally or
remote locations. Most servers and operating systems have built-in functionality for
setting permissions. Permissions configurations are typically the following:

READ ONLY

Users can view a resource, but cannot make any changes to it.

READ AND WRITE

Users can view and make changes to a resource.

Permissions are especially effective at preserving the quality of resources by allowing


only certain users to alter them. In a shared resource environment, it is vital that users
have the ability to view resources without being able to alter them. Granting read only
access allows some users to view files that they do not have full privileges to. Granting
full privileges using a simple access granted assignment, has the potential to result in
resources being altered or corrupted.

35
ICTSAS518 Student Workbook
TOPIC 4 - CONFIGURE AND
TROUBLESHOOT HARDWARE DEVICES
AND DRIVERS

DETERMINE AND RESOLVE PROBLEMS WITH HARDWARE


RESOURCES

Hardware resources resource problems often need to be determined and resolved.


Hardware refers to all components of a network that are not software.

Network hardware may include:

• Computers
• Printers
• Scanners
• Monitors
• Modems
• Servers
• Cables
• Projectors
• Cameras
• Audio interfaces
• All other peripheral devices

TROUBLE SHOOTING

Determining what problems exist and their potential causes in order to resolve the
problems are known as troubleshooting. Troubleshooting is a process by which ITC
professionals use a process of elimination to narrow down possible hardware ailments
and determine what solutions might alleviate the problems.

Tracing the signal path is often the best way to troubleshoot a problem. Usually, one
piece of hardware requires another piece of hardware in a chain to be functioning
properly in order for it to function. ITC professionals should start at the beginning of the

36
ICTSAS518 Student Workbook
chain to determine which piece of hardware actually has an issue, then proceed to
diagnose it's aproblem-based on noticeable symptoms.

COMMON HARDWARE PROBLEMS

Common hardware problems usually have a corresponding error message or symptom


that can be observed through software interfaces. Some symptoms and messages can be
detected by a computer's operating system, while some can be more accurately detected
and diagnosed using specialised diagnostic applications.

Common symptoms and error messages include:

• Computer screen shows only blue


• Computer fails to boot
• Spontaneous shutdown of computer
• RAID not detected during installation
• Hardware device fails to start
• Slow system performance
• System only boots in safe mode
• No present GUI
• Computer boots but displays do not illuminate

Hardware problems are often the result of software issues that prevent hardware from
functioning properly. ITC professionals should use diagnostic applications to determine
whether or not a piece of hardware has actually failed or it is simply not working due to
a software issue. In the event of a hardware failure, the solution is almost always to
replace the hardware. Most hardware issues that involve internal computer components
will result in an error code being sent to ITC personnel in the form of an error message
in text, flashing lights or a series of tones.

37
ICTSAS518 Student Workbook
RESEARCH AND INSTALL APPROPRIATE DEVICE DRIVERS

It will be necessary as a part of the operating system configuration process following an


installation or upgrade that a range of appropriate device drivers is researched and
installed.

RESEARCH APPROPRIATE DEVICE DRIVERS

Hardware devices will require appropriate drivers to be installed and allocated to them
in order to ensure their operation. In some cases, the device driver that is required may
not be included as a part of the operating system installation package. In this case, it
will be necessary to ensure that the appropriate driver is researched.

There is a range of information sources that can be researched in order to identify the
appropriate driver for particular devices, and these may include:

• Consult the manufactures instructions


• Consult the manufactures website
• Assess driver sites
• Consult chat rooms and forums

Once the appropriate device driver has been researched and identified it would be
necessary to ensure that it is able to be installed following approved procedures.

INSTALL DEVICE DRIVERS

A person with the appropriate administrative access may be able to install device
drivers using a number of methods such as:

• Starting the operating system may result in the drivers being recognised and
installed
• Scanning for devices using wizards and utilities that are used to detect
hardware that has been connected to the computer
• Perform a manual install process for the driver using the associated .ING file

38
ICTSAS518 Student Workbook
CONFIGURE HARDWARE RESOURCES

Once the installation process for the operating system is complete, it will be necessary
to configure the hardware resources to meet the needs of the installed hardware items.

HARDWARE RESOURCES

The hardware resources within an operating system are the resources of the computer
that will be allocated to a particular hardware device. It is essential that these resources
are configured for optimal operations.

INSTRUCTIONS FOR CONFIGURING THE RESOURCE SETTINGS FOR


HARDWARE

To change resource settings for a device


Open Device Manager.
Double-click the type of device you want to change.
Double-click the specific device you want to change. If the device has resources settings that you
can change, the Resources tab will appear in the dialog box.
Click the Resources tab, and then clear the Use automatic settings check box. This check box might
be unavailable if you cannot assign a specific resource to the device.
In Setting based on, click the hardware configuration you want to change.
In Resource settings, under Resource type, click the resource type you want to change. Your choices
are as follows:
Direct memory access (DMA)
Interrupt request (IRQ)
Input/output (I/O) port
Memory address
Click Change Setting, and then type a new value for the resource type.
Repeat steps 2 through 7 as necessary.
1

DESCRIBE OS CONFIGURATION ISSUES THAT MAY ARISE WITH HARDWARE


AND DESKTOP ENVIRONMENTS

Within operating systems, there may be a range of configuration issues that may arise
within hardware and desktop environments, and these may include:

INSUFFICIENT HARDWARE

In some cases when an operating system is upgraded or installed it may require more
hardware than is currently installed on the computer. In the case of this fault, it will be

1https://technet.microsoft.com/en-us/library/cc730702(v=ws.11).aspx

39
ICTSAS518 Student Workbook
necessary to ensure that all required hardware is updated prior to or following the
installation of the new operating system.

DRIVER ISSUES

In some cases when a new operating system is installed or upgraded some of the drivers
required may not have been a part of the new installation. In this case, it will be
necessary to conduct device driver:

• Updates
• Installations
• Configurations

SOFTWARE INCOMPATIBILITY

In some cases, the new or upgraded operating system may not be compatible with the
software that is installed within the desktop environment. In this case, it may be
necessary to upgrade the software or change to a new version of the software that is
compatible.

HARDWARE INCOMPATIBILLTIY

In some cases, the new or upgraded operating system may not be compatible with the
hardware that is installed on the computer, in this case, it may be necessary to ensure
that the hardware is:

• Updated
• Changed
• Reconfigured

40
ICTSAS518 Student Workbook
CONFIGURE DEVICE DRIVERS

It will be necessary to ensure that all device drivers are configured to meet the needs of
the organisation.

DEVICE DRIVERS

A device driver is asoftware program that can be added to an operation system to


ensure that the hardware devices that are attached to the particular computer.
Operating systems come with a range of built-in device drivers, but sometimes
additional drivers will be required in order to manage and operate all connected
hardware devices correctly.

CONFIGURE DEVICE DRIVERS

The device drivers that have been installed onto a computer will need to configure using
the functions held within the operating systems device manager. It will be necessary to
locate the device manager and select the device driver from installed list that needs to
be configured.

Within the device manager, it will be possible to:

• Identify device drivers


• Assess versions
• Test the conditions of the drivers
• Update and install drivers

If a device driver is not working correctly it may need to be manually configured in


order to ensure that it has been correctly assigned to the device using the following
actions:

Start Device manager by typing 'Devmgmt.msc' in the Run dialog box.


Right-click the desired device and select Properties.
Click the Resources tab on the Properties dialog box.
Click the resource to be changed and then clear the "Use automatic settings" checkbox.
Click Change Setting and then change the value of the setting to the desired value.
Howeverbest thing to do is to let Plug and Play resolve conflicts whenever possible.
2

2http://searchenterprisedesktop.techtarget.com/tip/Device-drivers-Installation-and-configuration

41
ICTSAS518 Student Workbook
TOPIC 5 - CONFIGURE AND
TROUBLESHOOT THE DESKTOP AND
USER ENVIRONMENTS

CONSTRUCT PROFILES FOR USERS

Once the new or upgraded operating system has been installed, it will be necessary to
conduct a range of configuration and troubleshooting of the desktop and user
environments.

USER PROFILES

A user profile is a set of configurations that are made to adesktop environment that is
associated with a specific login and stored within the system for retrieval each time the
same user logs on.

Depending on the user profile type that is created the user profile may be accessed only
on the computer it was created on or on a range of connected computers on a network.

A user profile will consist of the following components:

REGISTRY HIVE

A registry hive is a file named “NTuser.dat” This hive file will be loaded every time the
user logs in. The NTuser.dat file will be mapped to the registry key identified as
HKEY_CURRENT_USER. The function of the registry hive is to maintain the registry-
based configurations and preferences entered by the user or the creator of the profile.

PROFILE FOLDER SET

The user profiles folder set will be stored in the file system within the “Profiles”
directory. Each time a new user is created a profile folder set will also be created.
These folders will contain the range of information related to the configurations and
settings of each profile.

42
ICTSAS518 Student Workbook
PROFILE TYPES

There is a range of different profile types which may be set up during the installation
and upgrading procedures conducted within the organisation.

Profiles types may include:

LOCAL PROFILES

A local user profile is created each time new user logs onto a computer. When changes
are made to the desktop environment on a local profile, they will be saved to the specific
log on only within the particular computer that was used for the login.

MANDATORY PROFILES

Mandatory user profiles are a type of roaming profile that is able to be pre-configured in
a manner that allows the user profiles to be specified for the users. When a user is
logged into a mandatory profile, they will be able to adjust the desktop experience
settings, but these settings will not be saved once the user logs off.

Mandatory user profiles are an excellent way of organisations maintaining control and
consistency over the desktop configuration environment.

ROAMING PROFILES

A roaming user profile is a feature of the Windows NT family of operating systems that
can facilitate users with a computer that is joined to a Windows Server domain to
conduct log in procedures on any of the computers within the same network and access
their own documents and desktop setup.

Roaming profiles are common within medium to large organisation that require
theflexibility of user login locations.

43
ICTSAS518 Student Workbook
ORGANISE SHORTCUTS

As a part of the setting up of the user and desktop experience on completion of the
installation or upgrade processes conducted it will be necessary to organise the range of
shortcuts that the organisation wishes to have present on the desktop when particular
user profile groups log on.

DESKTOP SHORTCUTS

Desktop shortcuts are logos and links that can be placed on the desktop providing a
quick link to a specific:

• Folder
• Website
• Program
• Email user

PURPOSE OF DESKTOP SHORTCUTS

Desktop shortcuts are designed to:

• Simplify access to important items


• Increase efficiency
• Enhance productivity
• Enhance organisation
• Streamline work tasks

Examples of desktop shortcuts:

3http://www.basiccomputerinformation.ca/desktop-shortcuts/

44
ICTSAS518 Student Workbook
COMPONENTS OF DESKTOP SHORTCUTS

The components of a desktop shortcut include:

• The icon: The icon is a graphic representation of the item that there is a
shortcut to
• Shortcut Arrow: An arrow is placed on the corner of the icon to show that it
is a shortcut
• Shortcut name: The name of the shortcut on the desktop
• Shortcut path: The path that links the icon to the item and creates the
shortcut

CREATE DESKTOP SHORTCUTS

Desktop shortcuts may be created in the properties section of the folder that contains
the program or file that the desktop is created for.

ARRANGE DESKTOP SHORTCUTS ITEMS

It will be necessary to arrange the desktop shortcuts on the desktop through the use of
the properties and view functions that can be accessed byright-clicking on the desktop.

Items will be arranged based on:

• Organisational policy
• Efficiency

45
ICTSAS518 Student Workbook
ARRANGE SCREEN MANAGEMENT

The final phase of setting up the user environment and desktop on completion of the
upgrading or installing procedures for operating systems is to arrange the screen
management options.

SCREEN MANAGEMENT

The screen management actions that can be set up within the selected operating system
will define the manner in which the multiple and varied screen viewing options are set
up.

Screen management may include:

DATA PROJECTORS

Data projectors may be connected to computers and then configured as a part of the
screen display.

Data projectors screen management and viewing options include:

• Showing the desktop on the computer display screen


• Duplication of the desktop on the projector
• Extending of the desktop to the projector
• Showing the desktop on the projector only

These arrangements may be made in the display setting section of the installed or
upgraded display setting.

MULTIPLE SCREENS

There is a range of multiple screen options that may be set up in the display setting on
within the operating system and these arrangements may include:

• Showing the desktop on the computer display screen


• Duplication of the desktop on the second screen
• Extending of the desktop to the second screen

46
ICTSAS518 Student Workbook
• Showing the desktop on the second screen only

SCREEN FREQUENCY

The screen frequency is the rate at which the buffer on the hardware will update, higher
frequencies will drain a lot of power but will show the most responsive and high-quality
image. Settings may be balanced between cost and quality parameters.

An example process for changing the screen frequency on a computer:

To change the default value for the Refresh Frequency setting of a guest PC, follow these steps:
Note The following steps only apply to guest operating systems that support DirectX 5 and later.
Windows NT only supports versions up to DirectX 3.
Click Start, click Run, type dxdiag in the Open box, and then click OK.
On the More Help tab, click Override.
Set the value to 75 Hz or higher, depending on the monitor. To do this, follow these steps:
Click Start, point to Settings, and then click Control Panel.
Double-click Display.
In the Display Properties box, click the Settings tab, and then click Advanced.
In the Default Monitor Properties box, click the Monitor tab.
On the Refresh Frequency menu, click 75 Hz (or higher, depending on your monitor), and then click
OK.
When you receive a prompt to apply the new settings, click OK, and then click Yes.
Click OK.
4

SCREEN RESOLUTION

The resolution on a screen is the measurement of the number of pixels that the screen
can display; higher setting may result in a clearer picture. It will be necessary to select
the screen resolution based on the needs of the user. The screen resolution setting may
be accessed via the display setting section of the operating system.

It is essential that all elements of the desktop environment and user experience
inf0ormstio is set up to meet the needs of the organisation and the users. In most cases
medium to largeorganisation will then lock these settings so that regular users are not
able to alter then without administrator request.

4https://support.microsoft.com/en-us/help/824570/how-to-change-the-default-refresh-frequency-

setting-of-a-guest-pc-for-windows-full-screen-mode

47
ICTSAS518 Student Workbook
SUMMARY
Now that you have completed this unit, you should have the skills and knowledge
tomaintain, install new and upgrade existing operating systems (OS) in a medium to
large organisation.

If you have any questions about this resource, please ask your trainer. They will be only
too happy to assist you when required.

48
ICTSAS518 Student Workbook
REFERENCES
Technical support Retrieved: 10 June 2017
https://en.wikipedia.org/wiki/Technical_support

WANT TO MOVE YOUR WINDOWS 10 INSTALL TO A NEW HARD DRIVE? HERE’S HOW
Retrieved: 10 June 2017 https://www.digitaltrends.com/computing/how-to-migrate-a-
windows-installation-to-a-different-hard-drive/

Roaming user profiles Retrieved: 10 June 2017


https://en.wikipedia.org/wiki/Roaming_user_profile

Mandatory User Profiles Retrieved: 10 June 2017 https://msdn.microsoft.com/en-


us/library/windows/desktop/bb776895(v=vs.85).aspx

About user profiles Retrieved: 10 June 2017 https://msdn.microsoft.com/en-


us/library/windows/desktop/bb776892(v=vs.85).aspx

Create desktop shortcut Retrieved: 10 June 2017


http://www.basiccomputerinformation.ca/create-desktop-shortcut/

Desktop shortcuts Retrieved: 10 June 2017


http://www.basiccomputerinformation.ca/desktop-shortcuts/#uses

WIKIHOW Retrieved: 10 June 2017 http://www.wikihow.com/Install-a-New-Operating-


System-on-Your-Computer

Webopedia Operating system OS Retrieved: 10 June 2017


http://www.webopedia.com/TERM/O/operating_system.html

PC WORLD, One OS, Three installation options Retrieved: 10 June 2017


http://www.webopedia.com/TERM/O/operating_system.html

Center Red it, the importance of updating your operating system Retrieved: 10 June
2017 http://www.webopedia.com/TERM/O/operating_system.html

TechNet Automate and manage Windows development Retrieved: 10 June 2017


https://technet.microsoft.com/en-us/library/dn818437(v=ws.11).aspx

Anchor, knowledgebase Retrieved: 10 June 2017


http://www.anchor.com.au/hosting/planning/windows_network_install

Microsoft, Windows server Retrieved: 10 June 2017 https://technet.microsoft.com/en-


us/library/cc770631(v=ws.11).aspx

Webopedia, local Retrieved: 10 June 2017


http://www.webopedia.com/TERM/L/local.html

Pearson, inform IT Retrieved: 10 June 2017


https://www.informit.com/articles/article.aspx?p=1151022&seqNum=5

49
ICTSAS518 Student Workbook

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy