0% found this document useful (0 votes)
66 views

Installing and Optimizes Operating

Uploaded by

osaamaabdikadir
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views

Installing and Optimizes Operating

Uploaded by

osaamaabdikadir
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 80

Installing and Optimizes Operating system

Software

1
Acronym

• OS - Operating System
• FAT- File Allocation Table
• NTFS- New Technology File System
• CDFS- Compact Disk File System

2
Introduction to the Module
• An operating system (OS) is system software that manages computer hardware,
software resources, and provides common services for computer programs.
• Time-sharing operating systems schedule tasks for efficient use of the system and
may also include accounting software for cost allocation of processor time, mass
storage, printing, and other resources.
• For hardware functions such as input and output and memory allocation, the
operating system acts as an intermediary between programs and the computer
hardware, although the application code is usually executed directly by the
hardware and frequently makes system calls to an OS function or is interrupted by it.
3
Cont.….
• Operating systems are found on many devices that contain a computer –
from cellular phones and video game consoles to web servers and
supercomputers.
• This module is designed to meet the industry requirement under the
hardware and Networking service occupational standard, particularly for the
unit of competency: Install and optimize operating system software.
This module covers the units:
• Function of operating system
• Operating system
• Installation, configuration and optimization of operating system
• new software requirements 4
UNIT ONE
Function of Operating System

5
The purpose and functionality of operating systems

• An operating system is the most important software that runs on a computer.


It manages the computer's memory and processes, as well as all of its
software and hardware. It also allows you to communicate with the computer
without knowing how to speak the computer's language. Without an
operating system, a computer is useless.
• Your computer's operating system (OS) manages all of
the software and hardware on the computer. Most of the time, there are
several different computer programs running at the same time, and they all
need to access your computer's central processing unit (CPU), memory,
and storage. 6
Cont.….
• The operating system coordinates all of this to make sure
each program gets what it needs. To explain this in more
specific way an operating system is a computer program
that is initially loaded into a processor by a boot
program. It then manages all the other programs in the
processor. The other programs are
called applications or tasks.

7
Fig 1.1. Functionality

8
Cont.….

The purpose of operating systems is to manage computer memory,


processes and the operation of all hardware and software. An
operating system is the most important software on a computer as it
enables the computer hardware to communicate effectively with all
other computer software.
• Program Execution: The Operating System is responsible for
execution of all types of programs whether it be user programs or
system programs. The Operating System utilizes various resources
available for the efficient running of all types of functionalities.
9
Cont.….
• Handling Input/output Operations: The Operating System is
responsible for handling all sort of inputs, i.e., from keyboard,
mouse, desktop, etc. The Operating System does all interfacing in
the most appropriate manner regarding all kind of Inputs and
Outputs.
For example, there is difference in nature of all types of peripheral
devices such as mouse or keyboard, then Operating System is
responsible for handling data between them.

10
Cont.….
• Manipulation of File System: The Operating System is responsible for making
of decisions regarding the storage of all types of data or files, i.e. floppy
disk/hard disk/pen drive, etc. The Operating System decides as how the data
should be manipulated and stored.
• Error Detection and Handling: The Operating System is responsible for
detection of any types of error or bugs that can occur while any task. The well
secured OS sometimes also acts as countermeasure for preventing any sort of
breach to the Computer System from any external source and probably
handling them.
• Resource Allocation: The Operating System ensures the proper use of all the
resources available by deciding which resource to be used by whom for how
11
much time. All the decisions are taken by the Operating System.
Cont.….
• Accounting: The Operating System tracks an account of all the
functionalities taking place in the computer system at a time. All the details
such as the types of errors occurred are recorded by the Operating System.
• Information and Resource Protection: The Operating System is
responsible for using all the information and resources available on the
machine in the most protected way. The Operating System must foil an
attempt from any external resource to hamper any sort of data or
information.
• Security: The operating system uses password protection to protect user
data and similar other techniques. It also prevents unauthorized access to
programs and user data.
12
Cont.….
• Control over system performance – Monitors overall system health to help
improve performance. Records the response time between service requests
and system response to having a complete view of the system health. This can
help improve performance by providing important information needed to
troubleshoot problems.
• Job accounting – Operating system Keeps track of time and resources used by
various tasks and users, this information can be used to track resource usage
for a particular user or group of users.
• Error detecting aids – The operating system constantly monitors the system to
detect errors and avoid the malfunctioning of a computer system.
13
Cont.….
• Coordination between other software and users – Operating systems also
coordinate and assign interpreters, compilers, assemblers, and other
software to the various users of the computer systems.

• Memory Management – The operating system manages the Primary


Memory or Main Memory. Main memory is made up of a large array of bytes
or words where each byte or word is assigned a certain address. Main
memory is fast storage and it can be accessed directly by the CPU. For a
program to be executed, it should be first loaded in the main memory. An
Operating System performs the following activities for memory
management:
14
Cont.….
• It keeps track of primary memory, i.e., which bytes of memory are used by
which user program. The memory addresses that have already been
allocated and the memory addresses of the memory that has not yet been
used. In multiprogramming, the OS decides the order in which processes are
granted access to memory, and for how long. It allocates the memory to a
process when the process requests it and DE allocates the memory when
the process has terminated or is performing an I/O operation.

15
Cont.….

• Processor Management – In a multi-programming environment, the OS


decides the order in which processes have access to the processor, and how
much processing time each process has. This function of OS is called process
scheduling. An Operating System performs the following activities for
processor management. Keeps track of the status of processes. The
program which performs this task is known as a traffic controller. Allocates
the CPU that is a processor to a process. De-allocates processor when a
process is no more required.

16
Batch system VS real-time system VS multi-tasking system
Batch Operating System
• The users of a batch operating system do not interact with the
computer directly. Each user prepares his job on an off-line device like
punch cards and submits it to the computer operator. To speed up
processing, jobs with similar needs are batched together and run as a
group. The programmers leave their programs with the operator and
the operator then sorts the programs with similar requirements into
batches. The problems with Batch Systems are as follows:
• Lack of interaction between the user and the job.
• CPU is often idle, because the speed of the mechanical I/O devices is
slower than the CPU.
• Difficult to provide the desired priority. 17
Real-Time Operating System

• A real-time system is defined as a data processing system in which the time


interval required to process and respond to inputs is so small that it controls
the environment. The time taken by the system to respond to an input and
display of required updated information is termed as the response time. A
real-time operating system must have well-defined, fixed time constraints,
otherwise the system will fail.
• For example, scientific experiments, medical imaging systems, industrial
control systems, weapon systems, robots, air traffic control systems, etc.
There are two types of real-time operating systems.
1. Hard real-time systems
2. Soft real-time systems 18
Cont.….
1. Hard real-time systems
• Hard real-time systems guarantee that critical tasks complete on time. In
hard real-time systems, secondary storage is limited or missing and the data
is stored in ROM. In these systems, virtual memory is almost never found.
2. Soft real-time systems
• Soft real-time systems are less restrictive. A critical real-time task gets
priority over other tasks and retains the priority until it completes. Soft real-
time systems have limited utility than hard real-time systems. For example,
multimedia, virtual reality, Advanced Scientific Projects like undersea
exploration and planetary rovers, etc.
19
Multi-tasking operating system

• Multi-tasking is nothing but the need to time-share the CPU to ensure that
things are happening in time. Fractional slices of a second are allotted to
myriad demands that are lined up for the CPU. The problem just gets worse
when there are multiple activities competing for CPU attention. This chapter
explores the demands of these complex systems. It investigates the
underlying challenges and comes up with a strategy for dealing with them—
the real-time operating system. It's no longer the program sequence which
determines what happens next, but the operating system that controls it.

20
Comparing and contrast different operating systems

Types of operating systems


• Operating systems usually come pre-loaded on any computer you buy. Most
people use the operating system that comes with their computer, but it's
possible to upgrade or even change operating systems. The three most
common operating systems for personal computers are Microsoft Windows,
MacOS, and Linux.

21
Cont.….

• Modern operating systems use a graphical user interface, or GUI


(pronounced gooey). A GUI lets you use your mouse to click icons, buttons,
and menus, and everything is clearly displayed on the screen using a
combination of graphics and text.
• Each operating system's GUI has a different look and feel, so if you switch to
a different operating system it may seem unfamiliar at first. However,
modern operating systems are designed to be easy to use, and most of the
basic principles are the same.

22
A. Microsoft Windows

• Microsoft created the Windows operating system in the mid-1980s. There


have been many different versions of Windows, but the most recent ones
are Windows 10 (released in 2015), Windows 8 (2012), Windows 7 (2009), and
Windows Vista (2007). Windows comes pre-loaded on most new PCs, which
helps to make it the most popular operating system in the world.

23
Cont.….

24

Fig 1.2. Windows interface


Cont.….
Operability
• Compared to Linux and macOS windows operability is poor yet still, it is the
most popular OS. Several historical reasons can be cited for its popularity
such as its early introduction of GUI, large market share, various productivity
apps, gaming convenience, pirated windows, preinstalled OS, etc. (19
Reasons Why Windows OS Is Popular, 2021). However, windows have some
of the poorest operability features such as frequent crashes, slowing down
over time, virus, error codes, memory leak, blue screen of death, black
screen, WIFI issues, battery problems, and apps suddenly stopping, etc.
(updated, 2021; Darlington, 2022)
25
Cont.….
Features
• Windows have some similar features to Linux but some features that are
special to Windows are Windows shows the available physical memory, the
cached operating system code, and the allocated pool-paged-resident and
pool-nonpaged memory, shows how much time the CPU spends on user
processes, and system processes, has a start menu, has tablet mode in
Windows 10, has a game center which can be connected with XBOX, has
multiple desktops and task views, has Cortana assistant manager, unified
settings and action center (Low, 2014; Operating System Performance
Metrics, n.d.).

26
Cont.….
Strength
• Windows looks good for GUI, is easy to learn, has lots of productivity apps, has
good gaming functionalities and support, has an app store, has some decent
diagnostic and administrative tools, and setting up is easier than Linux, and has a
large support base among other strengths.
Weakness
• Windows is costly and some services require paid subscriptions. Windows is less
secure than Linux and macOS. Windows can be slow over time and its performance
is reduced and requires frequent updates which sometimes fail as well.
Competitive Edge
• Based on the competitive strength of Office and cloud products, Morningstar gives
Microsoft a significant economic moat. The three divisions that makeup Microsoft's
business are more personal computing, intelligent clouds, and productivity and
business processes. (Downie, 2019)
27
B.MacOS
• MacOS (previously called OS X) is a line of operating systems created by
Apple. It comes preloaded on all Macintosh computers, or Macs. Some of
the specific versions include Mojave (released in 2018), High Sierra (2017),
and Sierra (2016).
• According to StatCounter Global Stats, macOS users account for less
than 10% of global operating systems—much lower than the percentage of
Windows users (more than 80%). One reason for this is that Apple
computers tend to be more expensive. However, many people do prefer the
look and feel of macOS over Windows.

28
Cont.….

29

Fig 1.3 macOS


Cont.….

Operability
• MacOS has been more operable than Windows given its proprietary nature.
As Apple develops both the hardware and the OS there are fewer issues
facing macOS. Apple has thus been able to provide consistent performance,
security, and support to its home users. Providing quality user experience
has been a top priority for macOS and they have been delivering it
consistently.

30
Cont.….
Features
• MacOS uses proprietary hardware. With OS X, you get a completely
integrated system in which hardware and software interact flawlessly to
provide you with the finest Mac experience possible. The fact that your
Mac's apps can communicate with those on your iOS devices is due to the
practical iCloud. To give you an example, anything you do in apps on your
Mac will also be reflected on your other iOS devices. (Poole, 2021)

31
Cont.….
Strength
• MacOS has fewer virus attacks than Windows, has good customer support, consistent GUI
for all its products, provides great speed and availability and due to its superior hardware
provides long life. It also supports the Windows file system and can run Windows
Weakness
• MacOS is the most expensive, provides less software than Windows, has poor support for
• Gaming, and has no hardware customization. MacOS also does not provide cloud or server
• Services like Windows and Linux.
Competitive Edge
• Security, ease of use, hardware-software harmony, and superior quality of the hardware is
what make macOS standout from the rest. With Apple, you are in control.

32
C.Linux
• Linux (pronounced LINN-ux) is a family of open-source operating systems,
which means they can be modified and distributed by anyone around the
world. This is different from proprietary software like Windows, which can
only be modified by the company that owns it. The advantages of Linux are
that it is free, and there are many different distributions—or versions—you
can choose from.
• According to StatCounter Global Stats, Linux users account for less
than 2% of global operating systems. However, most servers run Linux
because it's relatively easy to customize.

33
Cont.….

34

Fig 1.4. Linux OS


Cont.….
Operability
• Linux easily defeats Windows in terms of speed. When using numerous
processes, Linux, in contrast to Windows, tends to reduce "bogging." Linux's
Ext4 file system does a great job of maintaining the device's efficiency.
Linux no longer supports defragmentation. Any Windows OS can be slowed
down to unacceptable and agonizing levels by even reasonable and minimal
use; this can only be prevented by strictly adhering to a use plan. When
several processes are active, memory and disc hogging frequently occurs.
Users of Linux benefit from an operating system that respects their privacy.

35
Cont.….
Features
• The Linux OS consists of several components: the boot loader, the kernel,
the init system, daemons, graphical server, desktop environment, and
various applications (Linux, 2018). Linux shows how much total system
memory is currently used, cached, buffered, or free, shows how much time
the CPU spends performing system and user duties, stealing jobs from
virtual operating systems, waiting for I/O to finish, and processing pleasant
tasks, shows the amount of work that a computer system performs like
Windows and macOS, tracks growth or reduction in the amount of available
disk space used like windows and macOS and other features such as disk
utilization, queuing, latency and throughput (Operating System
Performance Metrics, n.d.).
36
Cont.….
Strength
• Linux is an OS where you would battle less with obstacles like viruses,
malware, slowdowns, crashes, costly repairs, and licensing fees (Linux,
2018). Linux is also open source which means it is flexible to use, changes
can be made easily, and distributions can be shared among peers and
updated easily. Every type of user can utilize one of the many versions of
Linux. You can select a "variant" of Linux to suit your needs, whether you're a
novice user or a die-hard. Distributions (or "distros" in the short form) are
the names for these variations. Almost all Linux distributions are available
for free download, burning to disc (or USB thumb drive), and installation (on
as many machines as you like) (Linux, 2018).

37
Cont.….
Weakness
• Some device drivers are not available for Linux, which is one of the
problems that most Linux users encounter. Because they have more
customers than Linux, hardware manufacturers choose to create drivers for
Windows or Mac. Beginners can easily get up and running with Windows,
but understanding Linux is challenging. The command-line interface
requires some learning, and finding new software can be challenging.
Finding a remedy is difficult if you experience any operating system issues.
Compared to Windows and Mac, Linux has fewer experts.

38
Cont.….
Competitive Edge
• Linux’s competitive edge comes from its’ appeal to a specific category of
customers and users. These are people who would prioritize security, speed,
cost, and ease of maintenance. For example, speaking to LinuxLine about
the benefits of switching to Linux on IBM, Kuznetsova points out that clients
can benefit from both the inherent attributes of Linux and the underlying

39
Virtual Memory
• Virtual memory is a technique that allows the execution of processes which
are not completely available in memory. The main visible advantage of this
scheme is that programs can be larger than physical memory. Virtual
memory is the separation of user logical memory from physical memory.
This separation allows an extremely large virtual memory to be provided for
programmers when only a smaller physical memory is available. Following
are the situations, when entire program is not required to be loaded fully in
main memory.

40
Cont.….
• User written error handling routines are used only when an error occurred in the
data or computation.
• Certain options and features of a program may be used rarely.
• Many tables are assigned a fixed amount of address space even though only a small
amount of the table is actually used.
• The ability to execute a program that is only partially in memory would counter
many benefits.
• Less number of I/O would be needed to load or swap each user program into
memory.
• A program would no longer be constrained by the amount of physical memory that
is available.
• Each user program could take less physical memory, more programs could be run41
the same time, with a corresponding increase in CPU utilization and throughput.
Cont.….

42

Fig 1.5 virtual memory


Assignment one

• Write How to install windows 7,8,10 and 11 step by step?


• How install MacOS ?
• What is the different between Windows, MacOS and Linux?
43
Unit Two
Obtain operating system

44
Technical Specifications and system Requirement

• Technical requirements, otherwise known as technical specifications or


specs, refer to the implemented solutions professionals use to resolve
technical problems and issues involving software. When working on a
project or creating software, technical requirements describe the technical
aspects and issues that you need to address for the project or software to
work and execute successfully.
Why is it important to have technical requirements?
• Technical requirements are important because they describe how software
should function and what its behavior should be. This helps developers and
users to understand the best way to use the software.
45
Technical requirements

• Technical requirements vary depending on the product or industry. Though


there is no all-encompassing list of technical requirements that apply to
every project or development, here is a sample list of 17 technical
requirement examples:
Accessibility
• Accessibility refers to a technical requirement that seeks to make a service, software or
technology accessible to all users and parties.

46
Cont.….
• Authentication and authorization
This is a technical requirement that states that a system must abide by certain
authentication and authorization policies. Authentication refers to assessing
data as valid and authorization provides clearance for users to access it.
• Availability
Availability is a technical requirement that functions more like a metric. This
metric tracks time as a percentage and verifies how long a software or
resource is available for users to operate.
• Data quality
Data quality is a technical requirement that refers to data and information that
is of a certain quality. Ideally, you want high-quality data that you can use for
operational and decision-making processes. 47
Cont.….
Human error
This is a technical requirement where software can detect when people have inputted
inaccurate information. If the software detects this error, it notifies the user and
advises them to fix the discrepancy.

• Information security
This technical requirement refers to the encryption and security of user credentials and
personal private information within an online storage base or transit system. This level
of security would also involve a requirement for encrypting highly classified
information as well.

• Internal controls
The internal controls technical requirement means that only certain users can access
the decryption keys for encrypted user and highly classified data. These individuals,
called data stewards, can only access the data when a higher official allows it. 48
Cont.….
• Interoperability
The interoperability technical requirement states that software must offer
comprehensive compatibility. This means that it needs to work on all the major
operating systems, web browsers and technical devices. These requirements may
function based on the technology needs of customers.

• Maintainability
Maintainability simply means that software must maintain its integrity. To elaborate, a
system needs to identify and resolve technical problems in a set timeframe. Most
repairs need to resolve in only an hour.

• Performance
The performance technical requirement determines average wait times and how long
it takes for software or a page to load. For example, it is best practice to set a technical
49
requirement for loads times to exceed only two seconds.
Cont.….
• Privacy
Privacy refers to protecting a customer's sensitive data from internal data
professionals and employees. For example, a privacy technical requirement
may not allow employees to view a customer's social security number stored
within a customer database.
• Productivity
The productivity technical requirement refers to processes that allow users to
be more productive. For example, creating a system that auto generates data
so users can skip inputting data multiple times.
• Reliability
Reliability refers to the average time that a system or software operates
between downtimes or failures. This a metric that averages the time for
applications and services that are critical to operations. 50
Cont.….
• Serviceability
Serviceability is an important technical requirement because most software
and systems undergo regular updates or some kind of modification.
• Standards
The standards technical requirement states that a system or software must
follow and comply with the security and architectural requirements.
• System errors
When a system has an error, this technical requirement causes an error code to
communicate this discrepancy with the user.
• Vendor lock-in
Vendor lock-in is a technical requirement that means software or system is 51
open-sourced.
Operating system installation process and components

Boot methods
Here are the several boot methods which are available to one;
USB: One should know that with the absence of a CD or DVD, one might prefer
to use a USB drive as a boot media. However, so as to boot from a USB, one
should create a bootable USB version through the help of some programs.
After that, one should now copy the operating system on the USB flash drive
ready to commence installation.

52
Cont.….
• CD-ROM: One should understand that many at times, the windows
installation media is normally stored in a CD-ROM. In such a scenario, the
computer onto which one are installing the OS must possess an in-built CD-
ROM reader or it can be external in cases where it is not in-built.
• DVD: One might find out that the DVD boot method is quite similar to that
of a CD-ROM. This is due to the fact that the specific computer must have a
DVD-ROM reader. If the reader is absent, then it automatically means one
cannot install an OS stored on such media.
• PXE: The Pre boot Execution Environment is a capability that is present in
most computers which allows for automatic installation of an operating
system whose files are on a network drive. In this case, physical media is not
required 53
Type of installations

• Creating image: One should know that this task basically requires the
installer to come up with a windows operating system that is a cloned by
taking an existing OS version and make sector copies of everything on the
computer.
• Unattended installation: Unattended installation is one that is quite
common in large organizations. This is a type of installation where the IT
expert or installer must not be present so as to respond to the numerous
prompts that come during the installation. In this case, one should create a
• Upgrade: In-place upgrade is a type of OS installation where the installation
begins with the presence of the previous operating system. Once it
identifies the existence of an existing operating system, it automatically
makes an upgrade to the latest version without altering any applications or
files present. 54
Cont.….
• Clean install: Clean installation is a kind of OS installation that is far much
different from in-place upgrade. This is because clean installation means
erasing of every file in the computer.
• Repair installation: A repair installation is one that normally takes place in
instances where the Operating system files are corrupted or damaged
probably because of a bad hard drive section, a virus or Trojan attack among
many others
• Multi boot: At times, one may desire to install a new operating system
version without having to do away with the old or existing operating
system. In such a case, one should be in a position to support a Multi boot
configuration also known as dual boot configuration.
• Remote network installation: Remote network installation is another
magnificent way of installing an OS.
• Image deployment: This simply involves cloning the particular OS image to 55

another PC if there is need for the machine to be deployed.


Partitioning
Hard drive partitioning is a prompt that one should come across when
installing any windows operating system especially if it is a first time
installation. Presently, most of the available computers run a Master Boot
Record Partition Table which supports four partitions on one hard disk. The
newer Globally Unique Identifier partition table supports 128 partitions.
• Dynamic: A dynamic disk partition is one that has the capability to deny
addition of any new drive in addition to spanning of data from the basic
partition into the newly installed drive.
• Basic: A basic disk partition is an idea of Microsoft.
• Primary: A primary partition is basically a partition that one's operating
system can boot from.
• Extended: Extended partitions come into use when one wants to have more
than four partitions in a disk.
• Logical: Logical partitions are basically partitions that are created inside of56
an extended partition. An OS cannot boot from such partitions.
File system types/formatting
• File systems must be created so that any information can be written on a particular
drive. The file system one prefers to use should be one that the operating system
can understand. One should choose a file system that can be easy for an operating
system to read and write files. Some operating systems can read from multiple file
systems while others can only read from specific file systems.
• FAT: File Allocation Table was among the pioneer file systems for personal
computers which have been on constant update throughout years.
• FAT32: is considered an update or rather advancement of the FAT. It began with
Windows 2000 and now in all later versions. It allowed for one to have volume sizes
of almost two terabytes with files of a four gigabytes maximum size.
• NTFS: is a file system type that has more improvements compared to FAT32. This
file system allows for file compression and encryption utilities without having to
use specific software. It is a utility built to function with the file system and operate
with the OS. It also has data recovery features and additional security in addition to
many improvements regarding this file system
• CDFS: The Compact Disk File System is one that is present in operating systems
that allow the reading of compact disks or DVD-ROMS. It can be used on Microsoft 57
windows, UNIX, Linux and Macintosh systems being an ISO standard number 9660.
Quick formatting VS Full Format
• Quick formatting is a specific type of formatting that occurs very fast. It
generally erases data from the drive, formats it with the specified file
system without going through the drive to check for bad errors. Quick
format is an option only available for Windows XP installation and not
Windows Vista and 7.
• Full format on the other hand involves putting on the new file system
meaning that it wipes data and puts the file system in place. Contrary to
quick format, this one goes through all sectors in the entire storage device
so as to make sure that data can be readily written on it.

58
Cont.….

• Workgroup vs. Domain setup


When installing an operating system, there are some networking
configurations that must be made. There is always a prompt asking whether
the machine should be part of a workgroup or domain. In the domain setup, it
means that the machine will be in an Active Directory domain most probably
in a business. A workgroup setup on the other hand mainly arises when one's
base of operation is mainly at home where one runs all one's activities.
• Time/date/region/language settings
During Windows installation, there is a prompt to ensure that one's date, time
and region are set. 59
Cont.….
• Time/date/region/language settings
During Windows installation, there is a prompt to ensure that one's date, time and
region are set. This is due to the fact that there are different time zones and regions
and therefore one should make sure one is properly conversant with all these aspects.
• Driver installation, software and windows updates
For a windows configuration to be complete, it must be accompanied by loading and
running of some extra drivers. Some of the drivers one may install include Graphics
drivers, Chipset drivers, and Wireless LAN drivers among many others.
• Factory recovery partition
Creation of a factory recovery partition can be an additional activity that one should
undertake so as to ensure that a recovery partition has been created by the operating60
system during its installation. One can also build one by one's self if need be.
Licensing, hardware and security
• An Operating System license is almost like a proof of purchase. Operating
System licenses are sometimes called an “OS License Key”. After entering a
valid OS license that you purchased, you will be able to use the OS without any
limitations thereafter.
• Majority of Operating System licenses are long not just because there are
many people who use the OS, but there are also some values that are invalid.
Sometimes OS license values are recycled (reused) after all the valid values are
used up, however this happens after a very long period of time (usually a lot
more than just a couple of years).The reason why OS license keys are sold, is to
prevent the sale of pirated OS copies from being sold. Pirated OS copies are
copies of OS, but the when sold none of the commissions go to the developers
of the OS.
61
Unit Three
Installation, configuration and optimization of operating
system

62
Installing, configuring and testing operating
• As a matter of fact, it has come to the realization of many that an operating
system is a very important aspect when it comes to the running and
functioning of any computer device. This is due to the fact that, it is the
operating system which controls every activity occurring in a computer. For
an OS to run on a device, it must be installed and configured to run in the
device. Windows installation is quite an easy activity which takes a
maximum of one hour.

63
Operation sheet 1.1.
Install Windows 10 Operating System

• Operation title: installing operating system


• Purpose: to run a computer hardware with appropriate system software
• Instruction: Ask for software and necessary materials from your instructor
and implement the following steps
• Tools and Equipment: Windows 10 and Personal Computer
• Precautions: insert the disk in appropriate manner and follow safety rules.
64
Steps:

1. First input the windows 10 installer media you are using (flash or DVD).
• Then turn on the computer, then go first to the BIOS to set up First Boot.
The way when the new computer is on, press the F2 key, or some existing
computer uses the DEL key to enter the BIOS. Just adjust it. After setting
the first boot, press F10, save and restart. The computer will boot through
the Windows 10 installer media, and if the prompt Type any key to boot
from CD or DVD appears, press any key directly, don’t be late! Then the
process will be continued soon.

65
2. Select Language to install, Time and currency format, and Keyboard or input
method. If it is selected, click next.

66
3.Then click Install now.

67
4. Setup is starting, wait for the process to
continue at the next stage.

68
5.Then enter the serial number that you have. If
you don’t have it, just click skip.

69
6.In this section, you can customize the Windows 10 that you
will install. Adjust it to each of your choices or needs! If it is
selected, click next.

70
7.Then check the “I accept the license terms”
section. Then click next.

71
8. In this section, there are two options, which you can
choose between upgrade and custom. Since we will
reinstall our computer or laptop, then I choose custom.

72
9. Then we will continue with a split of partitions. Urgent! Here I hope you
are very careful, especially for the first time. Because if it’s wrong, your
data might be lost (therefore, don’t forget to backup data before
reinstalling the computer/laptop).

73
10. Next are the steps in the process of allocating
Windows files from the installer media to the hard disk.
Wait for the process to finish.

74
11. Then the computer will ask to restart itself.
Just click Restart now.

75
12. Now almost finished, follow for the next step to the Windows 10
desktop. Then, enter the serial number if asked. If you don’t have it, click
Do this later.

76
13. Select I own it. Then click next

77
14. Create an account for your computer. Enter your username, password,
and HINT (for a reminder if you forget your password), don’t leave it blank
because if forget your password have to format the data. When it is
selected, click next.

78
15. Wait for the process for a moment. Soon
you will be on the desktop Windows 10.

79
16. Congratulations you guys have successfully
installed windows 10 on your computer or laptop!

80

You might also like