Installing and Optimizes Operating
Installing and Optimizes Operating
Software
1
Acronym
• OS - Operating System
• FAT- File Allocation Table
• NTFS- New Technology File System
• CDFS- Compact Disk File System
2
Introduction to the Module
• An operating system (OS) is system software that manages computer hardware,
software resources, and provides common services for computer programs.
• Time-sharing operating systems schedule tasks for efficient use of the system and
may also include accounting software for cost allocation of processor time, mass
storage, printing, and other resources.
• For hardware functions such as input and output and memory allocation, the
operating system acts as an intermediary between programs and the computer
hardware, although the application code is usually executed directly by the
hardware and frequently makes system calls to an OS function or is interrupted by it.
3
Cont.….
• Operating systems are found on many devices that contain a computer –
from cellular phones and video game consoles to web servers and
supercomputers.
• This module is designed to meet the industry requirement under the
hardware and Networking service occupational standard, particularly for the
unit of competency: Install and optimize operating system software.
This module covers the units:
• Function of operating system
• Operating system
• Installation, configuration and optimization of operating system
• new software requirements 4
UNIT ONE
Function of Operating System
5
The purpose and functionality of operating systems
7
Fig 1.1. Functionality
8
Cont.….
10
Cont.….
• Manipulation of File System: The Operating System is responsible for making
of decisions regarding the storage of all types of data or files, i.e. floppy
disk/hard disk/pen drive, etc. The Operating System decides as how the data
should be manipulated and stored.
• Error Detection and Handling: The Operating System is responsible for
detection of any types of error or bugs that can occur while any task. The well
secured OS sometimes also acts as countermeasure for preventing any sort of
breach to the Computer System from any external source and probably
handling them.
• Resource Allocation: The Operating System ensures the proper use of all the
resources available by deciding which resource to be used by whom for how
11
much time. All the decisions are taken by the Operating System.
Cont.….
• Accounting: The Operating System tracks an account of all the
functionalities taking place in the computer system at a time. All the details
such as the types of errors occurred are recorded by the Operating System.
• Information and Resource Protection: The Operating System is
responsible for using all the information and resources available on the
machine in the most protected way. The Operating System must foil an
attempt from any external resource to hamper any sort of data or
information.
• Security: The operating system uses password protection to protect user
data and similar other techniques. It also prevents unauthorized access to
programs and user data.
12
Cont.….
• Control over system performance – Monitors overall system health to help
improve performance. Records the response time between service requests
and system response to having a complete view of the system health. This can
help improve performance by providing important information needed to
troubleshoot problems.
• Job accounting – Operating system Keeps track of time and resources used by
various tasks and users, this information can be used to track resource usage
for a particular user or group of users.
• Error detecting aids – The operating system constantly monitors the system to
detect errors and avoid the malfunctioning of a computer system.
13
Cont.….
• Coordination between other software and users – Operating systems also
coordinate and assign interpreters, compilers, assemblers, and other
software to the various users of the computer systems.
15
Cont.….
16
Batch system VS real-time system VS multi-tasking system
Batch Operating System
• The users of a batch operating system do not interact with the
computer directly. Each user prepares his job on an off-line device like
punch cards and submits it to the computer operator. To speed up
processing, jobs with similar needs are batched together and run as a
group. The programmers leave their programs with the operator and
the operator then sorts the programs with similar requirements into
batches. The problems with Batch Systems are as follows:
• Lack of interaction between the user and the job.
• CPU is often idle, because the speed of the mechanical I/O devices is
slower than the CPU.
• Difficult to provide the desired priority. 17
Real-Time Operating System
• Multi-tasking is nothing but the need to time-share the CPU to ensure that
things are happening in time. Fractional slices of a second are allotted to
myriad demands that are lined up for the CPU. The problem just gets worse
when there are multiple activities competing for CPU attention. This chapter
explores the demands of these complex systems. It investigates the
underlying challenges and comes up with a strategy for dealing with them—
the real-time operating system. It's no longer the program sequence which
determines what happens next, but the operating system that controls it.
20
Comparing and contrast different operating systems
21
Cont.….
22
A. Microsoft Windows
23
Cont.….
24
26
Cont.….
Strength
• Windows looks good for GUI, is easy to learn, has lots of productivity apps, has
good gaming functionalities and support, has an app store, has some decent
diagnostic and administrative tools, and setting up is easier than Linux, and has a
large support base among other strengths.
Weakness
• Windows is costly and some services require paid subscriptions. Windows is less
secure than Linux and macOS. Windows can be slow over time and its performance
is reduced and requires frequent updates which sometimes fail as well.
Competitive Edge
• Based on the competitive strength of Office and cloud products, Morningstar gives
Microsoft a significant economic moat. The three divisions that makeup Microsoft's
business are more personal computing, intelligent clouds, and productivity and
business processes. (Downie, 2019)
27
B.MacOS
• MacOS (previously called OS X) is a line of operating systems created by
Apple. It comes preloaded on all Macintosh computers, or Macs. Some of
the specific versions include Mojave (released in 2018), High Sierra (2017),
and Sierra (2016).
• According to StatCounter Global Stats, macOS users account for less
than 10% of global operating systems—much lower than the percentage of
Windows users (more than 80%). One reason for this is that Apple
computers tend to be more expensive. However, many people do prefer the
look and feel of macOS over Windows.
28
Cont.….
29
Operability
• MacOS has been more operable than Windows given its proprietary nature.
As Apple develops both the hardware and the OS there are fewer issues
facing macOS. Apple has thus been able to provide consistent performance,
security, and support to its home users. Providing quality user experience
has been a top priority for macOS and they have been delivering it
consistently.
30
Cont.….
Features
• MacOS uses proprietary hardware. With OS X, you get a completely
integrated system in which hardware and software interact flawlessly to
provide you with the finest Mac experience possible. The fact that your
Mac's apps can communicate with those on your iOS devices is due to the
practical iCloud. To give you an example, anything you do in apps on your
Mac will also be reflected on your other iOS devices. (Poole, 2021)
31
Cont.….
Strength
• MacOS has fewer virus attacks than Windows, has good customer support, consistent GUI
for all its products, provides great speed and availability and due to its superior hardware
provides long life. It also supports the Windows file system and can run Windows
Weakness
• MacOS is the most expensive, provides less software than Windows, has poor support for
• Gaming, and has no hardware customization. MacOS also does not provide cloud or server
• Services like Windows and Linux.
Competitive Edge
• Security, ease of use, hardware-software harmony, and superior quality of the hardware is
what make macOS standout from the rest. With Apple, you are in control.
32
C.Linux
• Linux (pronounced LINN-ux) is a family of open-source operating systems,
which means they can be modified and distributed by anyone around the
world. This is different from proprietary software like Windows, which can
only be modified by the company that owns it. The advantages of Linux are
that it is free, and there are many different distributions—or versions—you
can choose from.
• According to StatCounter Global Stats, Linux users account for less
than 2% of global operating systems. However, most servers run Linux
because it's relatively easy to customize.
33
Cont.….
34
35
Cont.….
Features
• The Linux OS consists of several components: the boot loader, the kernel,
the init system, daemons, graphical server, desktop environment, and
various applications (Linux, 2018). Linux shows how much total system
memory is currently used, cached, buffered, or free, shows how much time
the CPU spends performing system and user duties, stealing jobs from
virtual operating systems, waiting for I/O to finish, and processing pleasant
tasks, shows the amount of work that a computer system performs like
Windows and macOS, tracks growth or reduction in the amount of available
disk space used like windows and macOS and other features such as disk
utilization, queuing, latency and throughput (Operating System
Performance Metrics, n.d.).
36
Cont.….
Strength
• Linux is an OS where you would battle less with obstacles like viruses,
malware, slowdowns, crashes, costly repairs, and licensing fees (Linux,
2018). Linux is also open source which means it is flexible to use, changes
can be made easily, and distributions can be shared among peers and
updated easily. Every type of user can utilize one of the many versions of
Linux. You can select a "variant" of Linux to suit your needs, whether you're a
novice user or a die-hard. Distributions (or "distros" in the short form) are
the names for these variations. Almost all Linux distributions are available
for free download, burning to disc (or USB thumb drive), and installation (on
as many machines as you like) (Linux, 2018).
37
Cont.….
Weakness
• Some device drivers are not available for Linux, which is one of the
problems that most Linux users encounter. Because they have more
customers than Linux, hardware manufacturers choose to create drivers for
Windows or Mac. Beginners can easily get up and running with Windows,
but understanding Linux is challenging. The command-line interface
requires some learning, and finding new software can be challenging.
Finding a remedy is difficult if you experience any operating system issues.
Compared to Windows and Mac, Linux has fewer experts.
38
Cont.….
Competitive Edge
• Linux’s competitive edge comes from its’ appeal to a specific category of
customers and users. These are people who would prioritize security, speed,
cost, and ease of maintenance. For example, speaking to LinuxLine about
the benefits of switching to Linux on IBM, Kuznetsova points out that clients
can benefit from both the inherent attributes of Linux and the underlying
39
Virtual Memory
• Virtual memory is a technique that allows the execution of processes which
are not completely available in memory. The main visible advantage of this
scheme is that programs can be larger than physical memory. Virtual
memory is the separation of user logical memory from physical memory.
This separation allows an extremely large virtual memory to be provided for
programmers when only a smaller physical memory is available. Following
are the situations, when entire program is not required to be loaded fully in
main memory.
40
Cont.….
• User written error handling routines are used only when an error occurred in the
data or computation.
• Certain options and features of a program may be used rarely.
• Many tables are assigned a fixed amount of address space even though only a small
amount of the table is actually used.
• The ability to execute a program that is only partially in memory would counter
many benefits.
• Less number of I/O would be needed to load or swap each user program into
memory.
• A program would no longer be constrained by the amount of physical memory that
is available.
• Each user program could take less physical memory, more programs could be run41
the same time, with a corresponding increase in CPU utilization and throughput.
Cont.….
42
44
Technical Specifications and system Requirement
46
Cont.….
• Authentication and authorization
This is a technical requirement that states that a system must abide by certain
authentication and authorization policies. Authentication refers to assessing
data as valid and authorization provides clearance for users to access it.
• Availability
Availability is a technical requirement that functions more like a metric. This
metric tracks time as a percentage and verifies how long a software or
resource is available for users to operate.
• Data quality
Data quality is a technical requirement that refers to data and information that
is of a certain quality. Ideally, you want high-quality data that you can use for
operational and decision-making processes. 47
Cont.….
Human error
This is a technical requirement where software can detect when people have inputted
inaccurate information. If the software detects this error, it notifies the user and
advises them to fix the discrepancy.
• Information security
This technical requirement refers to the encryption and security of user credentials and
personal private information within an online storage base or transit system. This level
of security would also involve a requirement for encrypting highly classified
information as well.
• Internal controls
The internal controls technical requirement means that only certain users can access
the decryption keys for encrypted user and highly classified data. These individuals,
called data stewards, can only access the data when a higher official allows it. 48
Cont.….
• Interoperability
The interoperability technical requirement states that software must offer
comprehensive compatibility. This means that it needs to work on all the major
operating systems, web browsers and technical devices. These requirements may
function based on the technology needs of customers.
• Maintainability
Maintainability simply means that software must maintain its integrity. To elaborate, a
system needs to identify and resolve technical problems in a set timeframe. Most
repairs need to resolve in only an hour.
• Performance
The performance technical requirement determines average wait times and how long
it takes for software or a page to load. For example, it is best practice to set a technical
49
requirement for loads times to exceed only two seconds.
Cont.….
• Privacy
Privacy refers to protecting a customer's sensitive data from internal data
professionals and employees. For example, a privacy technical requirement
may not allow employees to view a customer's social security number stored
within a customer database.
• Productivity
The productivity technical requirement refers to processes that allow users to
be more productive. For example, creating a system that auto generates data
so users can skip inputting data multiple times.
• Reliability
Reliability refers to the average time that a system or software operates
between downtimes or failures. This a metric that averages the time for
applications and services that are critical to operations. 50
Cont.….
• Serviceability
Serviceability is an important technical requirement because most software
and systems undergo regular updates or some kind of modification.
• Standards
The standards technical requirement states that a system or software must
follow and comply with the security and architectural requirements.
• System errors
When a system has an error, this technical requirement causes an error code to
communicate this discrepancy with the user.
• Vendor lock-in
Vendor lock-in is a technical requirement that means software or system is 51
open-sourced.
Operating system installation process and components
Boot methods
Here are the several boot methods which are available to one;
USB: One should know that with the absence of a CD or DVD, one might prefer
to use a USB drive as a boot media. However, so as to boot from a USB, one
should create a bootable USB version through the help of some programs.
After that, one should now copy the operating system on the USB flash drive
ready to commence installation.
52
Cont.….
• CD-ROM: One should understand that many at times, the windows
installation media is normally stored in a CD-ROM. In such a scenario, the
computer onto which one are installing the OS must possess an in-built CD-
ROM reader or it can be external in cases where it is not in-built.
• DVD: One might find out that the DVD boot method is quite similar to that
of a CD-ROM. This is due to the fact that the specific computer must have a
DVD-ROM reader. If the reader is absent, then it automatically means one
cannot install an OS stored on such media.
• PXE: The Pre boot Execution Environment is a capability that is present in
most computers which allows for automatic installation of an operating
system whose files are on a network drive. In this case, physical media is not
required 53
Type of installations
• Creating image: One should know that this task basically requires the
installer to come up with a windows operating system that is a cloned by
taking an existing OS version and make sector copies of everything on the
computer.
• Unattended installation: Unattended installation is one that is quite
common in large organizations. This is a type of installation where the IT
expert or installer must not be present so as to respond to the numerous
prompts that come during the installation. In this case, one should create a
• Upgrade: In-place upgrade is a type of OS installation where the installation
begins with the presence of the previous operating system. Once it
identifies the existence of an existing operating system, it automatically
makes an upgrade to the latest version without altering any applications or
files present. 54
Cont.….
• Clean install: Clean installation is a kind of OS installation that is far much
different from in-place upgrade. This is because clean installation means
erasing of every file in the computer.
• Repair installation: A repair installation is one that normally takes place in
instances where the Operating system files are corrupted or damaged
probably because of a bad hard drive section, a virus or Trojan attack among
many others
• Multi boot: At times, one may desire to install a new operating system
version without having to do away with the old or existing operating
system. In such a case, one should be in a position to support a Multi boot
configuration also known as dual boot configuration.
• Remote network installation: Remote network installation is another
magnificent way of installing an OS.
• Image deployment: This simply involves cloning the particular OS image to 55
58
Cont.….
62
Installing, configuring and testing operating
• As a matter of fact, it has come to the realization of many that an operating
system is a very important aspect when it comes to the running and
functioning of any computer device. This is due to the fact that, it is the
operating system which controls every activity occurring in a computer. For
an OS to run on a device, it must be installed and configured to run in the
device. Windows installation is quite an easy activity which takes a
maximum of one hour.
63
Operation sheet 1.1.
Install Windows 10 Operating System
1. First input the windows 10 installer media you are using (flash or DVD).
• Then turn on the computer, then go first to the BIOS to set up First Boot.
The way when the new computer is on, press the F2 key, or some existing
computer uses the DEL key to enter the BIOS. Just adjust it. After setting
the first boot, press F10, save and restart. The computer will boot through
the Windows 10 installer media, and if the prompt Type any key to boot
from CD or DVD appears, press any key directly, don’t be late! Then the
process will be continued soon.
65
2. Select Language to install, Time and currency format, and Keyboard or input
method. If it is selected, click next.
66
3.Then click Install now.
67
4. Setup is starting, wait for the process to
continue at the next stage.
68
5.Then enter the serial number that you have. If
you don’t have it, just click skip.
69
6.In this section, you can customize the Windows 10 that you
will install. Adjust it to each of your choices or needs! If it is
selected, click next.
70
7.Then check the “I accept the license terms”
section. Then click next.
71
8. In this section, there are two options, which you can
choose between upgrade and custom. Since we will
reinstall our computer or laptop, then I choose custom.
72
9. Then we will continue with a split of partitions. Urgent! Here I hope you
are very careful, especially for the first time. Because if it’s wrong, your
data might be lost (therefore, don’t forget to backup data before
reinstalling the computer/laptop).
73
10. Next are the steps in the process of allocating
Windows files from the installer media to the hard disk.
Wait for the process to finish.
74
11. Then the computer will ask to restart itself.
Just click Restart now.
75
12. Now almost finished, follow for the next step to the Windows 10
desktop. Then, enter the serial number if asked. If you don’t have it, click
Do this later.
76
13. Select I own it. Then click next
77
14. Create an account for your computer. Enter your username, password,
and HINT (for a reminder if you forget your password), don’t leave it blank
because if forget your password have to format the data. When it is
selected, click next.
78
15. Wait for the process for a moment. Soon
you will be on the desktop Windows 10.
79
16. Congratulations you guys have successfully
installed windows 10 on your computer or laptop!
80