Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave

1.Explain in your own words in accordance with the job role in your assigned business how you can prepare to install a desktop operating system in relationship to the following points (note that you must answer each of the following points).

  • Prepare for work according to site specific safety requirements and enterprise work health and safety (WHS) processes and procedures.
  • Obtain desktop applications and features from appropriate person.
  • Review required installation options and file systems.
  • Determine and apply knowledge of licensing, hardware and system requirements.
  • Analyse data migration requirements.
  • Backup local data in preparation for installation.

Arrange access to site and advise client of deployment and potential down times.

2.Explain in your own words in accordance with the job role in your assigned business how you can install desktop operating system in relationship to the following points (note that you must answer each of the following points).

  • Install or upgrade desktop operating system using appropriate installation or update method.
  • Patch the operating system and applications to ensure maximum security and reliability.

Restore local data to new workstation.

3.Explain in your own words in accordance with the job role in your assigned business how you can configure desktop environment in relationship to the following points (note that you must answer each of the following points).

  • Create file and directory structure using appropriate administration and system tools.
  • Configure access to external data.

Configure desktop applications according to business requirements.

4.Explain in your own words in accordance with the job role in your assigned business how you can operate command line interface in relationship to the following points (note that you must answer each of the following points).

  • Open a command line interface.
  • Run commands and scripts from the command line interface.

Manipulate files using the command line.

5.Explain in your own words in accordance with the job role in your assigned business how you can configure desktop security in relationship to the following points (note that you must answer each of the following points).

  • Modify default user settings to ensure that they match organisational security policies.
  • Ensure password security.
  • Check appropriate legal notices are displayed at logon.

Configure security settings for desktop applications according to business requirements.

6.Explain in your own words in accordance with the job role in your assigned business how you can monitor and test the desktop in relationship to the following points (note that you must answer each of the following points).

  • Test desktop environment to ensure that client, functionality and performance requirements have been met.

Document the desktop environment, according to organisational policy.

Part One

An operating system is essential software that enables a computer to run by managing the computer’s processes and memory (Korkishko, 2017). It is an interface between the computer hardware and the computer user. It also supports the running of various software and hardware components of the machine. It is the work of the Operating System of a machine to ensure compatibility of any software being installed in the machine. Software running in a computer is housed by the operating system. Amongst other functions, the operating system performs memory management, device management, file management, processor management, security of the computer, taking control of the system performance, detecting errors and software-user coordination.

When preparing to install any software, it is important to take into consideration safety precautions both for the computer and the important data. Therefore, before starting the installation process, I will first ensure that the operating system software that I want to install is legit. I will access the product key and the activation key codes to ascertain if they are genuine. As a network administrator, I will also refer keenly to Dallas Technical center’s work and safety policies. I will go ahead and ask the Center’s Information Technology office to serve me with legit driver packs, reliable anti-virus software and the general information on the specifications of the computers, which is basically the manual containing factory information regarding the computers.

A file system is a scheme of organizing and storing computer files and information contained for simple and efficient retrieval (Pudipeddi, 2017). I will ensure proper configuration of the files in order to allow security configuration. For instance I will configure the file system as NTFS and not as FAT, FAT makes the computer less secure. I will check whether the operating is to be installed from CD-ROM, boot disks or from the network. I will also examine the service that the operating system will be required to offer, for example, if the installation will be server installation, then I will take keen interest on the DNS, DHCP and the computers Active Directory.

The operating system will have a license key in order for it to be acceptable. Actually all operating systems will require a license key for it to operate, it is also important to that I ensure that they product and activation key are not counterfeit. I will use data models for easy identification of which data should be migrated, for example the Data Flow Diagrams. I will test the migration technique more than once for purposes of proper functioning.

Part Two

I will ensure data security by seeking external back up mechanism with enough space and virus proof. Another option I will consider is partitioning the internal disk so that I can install the operating system one partition while the other houses the data. I will show my client how and where he/she can access the operating system upon authentication, the user will be required to enter password in order to access the site. I will also inform the client that the system may at times be sluggish, especially when running more than one software at a time, many programs executing at the same time will bring about system deadlock hence slow performance of the computer.

Installing the desktop operating system should be carefully done to avoid unnecessary mistakes that can lead to poor performance of the computer (Wang, 2017). When choosing an installation method, I will consider the most efficient, secure and one with fast installation speed. It is also important to note that over the internet download and installation method is a no option.

As a network administrator for Dallas technical center, I will choose installation from the bootable CD-ROM. This method is easier and fastest compared to other installation options like over the network method. I will disconnect the computer from the network to the time of complete installation. Repairing the software is necessary since software breakdown cannot be ruled out in any system. I will run a vulnerability test on the software to fix any error in the operating system. I also will be conducting periodical recovery consoles to ensure reliability and security.

After a successive installation, it is now time to restore data from the back up location to the previous stations. I will first install an antivirus in the computer to clean up any unnecessary applications that might be risky to data security, after which I will transfer the data to their workstations.

Dallas technical center has large data storage units and several files that need to be properly stored. Since in the center we are using windows, I will create files and directories using windows explorer

It is therefore my responsibility to create a structure that can enhance easy access of the files. I will put the data into segments on different files so that the storage load is shared amongst smaller disks hence easy retrieval. I will use windows Explorer program, I will achieve this by creating folders, which are the directory structures. Below is what I will create for Dallas Technical center using windows explorer copywhiz

Part Three

Step 1

I will open the program, windows explorer and select files, then m right-click and choose copywhiz than copy from menu. This is shown below:

Figure 1 showing open windows explorer

Step 2

I will navigate to the destination directory/ folder, right-click the folder inside and select copywhiz then paste. This is also shown below

Figure 2 showing windows explorer activity

Step 3

After I am done with copywhiz pasting, a copywhiz window will appear, I will again click on ‘advanced settings’ and select create folder only and click ok as shown below

Figure 3 showing how to create a folder (directory)

The above steps demonstrate how I will create the directories and files using windows explorer.

On configuring access to externally stored information:

  1. I will connect the external storage device, probably a USB device to the Wii U console
  2. I will then configure the USB device for deleting all the data in the USB, once the data is deleted, it will in no means be recovered.
  3. I will select ‘copy/move/delete data’.
  4. I will then select ‘USB storage’
  5. After the above selection, the data displayed is the present stored data in the USB device

When configuring desktop applications, I will need to carry out the following exercise

  1. I will set programs as default; this will help me specify the type of file related with a particular application.
  2. I will then modify the file associations; the modification enables me to pick a program and select the type of file related with it. I will do this as shown below.

Figure 4 showing file association modification

  1. After modifying file associations, I will now modify the auto play settings; this defines what windows will do after inserting external medium like USB device.
  2. I will apply settings on program access defaults; this will enable me to create a program configuration that specifies which desktop applications should be used to perform tasks.
  3. I will then configure applications for compatibility; this is installing and configuring applications and windows applications.
  4. In order to meet the business requirements, I will configure the desktop applications compatibility regulations to suit the center’s prudent.
  5. The last step will be to install, reinstall and update the applications; this will be done on condition that there is internet connection.  The process ends here.

A Command Line Interface (CLI) is a user interface to an operating system or any other software running in a computer, the user responds to a prompt by keying in commands on specific lines, where he/she receives a reply from the system, then the user enters successive commands and so on. Nowadays, users have a taste for graphical user interface (GUI) which is actually offered by popular operating systems such as Windows, Mac and BeOS.

Step 1

I will click on ‘start’ menu, then type ‘cmd’ and enter. The command prompt pops up. The command prompt looks as below

Figure 5 showing open command prompt

Step 2

I will give commands such as moving into the current directory, creating files and directories

My command on moving into a directory, I just type ‘dir’ in the command prompt and press enter.

Figure 1 showing directory

In the above window, there are 7 directories

Creating a directory, I will key in a command ‘mkdir test’ then I will move into the directory by typing ‘cd command’.

Creating a file using the command prompt, I will type ‘edit techn.txt’ techn.txt is my file name, then ‘enter’ a blank window open meaning my file techn is ready for editing. I will type various commands like, ‘copy con techn.txt’ for copying the file contents.

Configuring user settings so as to be compatible with the organizations regulations is a requirement for any network administrator; various organizations have different rules that need incorporation into the network to offer better services to their clients.

I will Set default programs to match the business requirements by getting in the control panel then to set default programs and then set program associations. Here I will configure the program to be business oriented and select the relevant options. On passwords configuration, I will introduce new password formats for the institution by changing the static password enabling tool in the global configuration mode, ‘router (config)#’ then ‘password’

It is important to ensure security to any applications in an organization or network. I will ensure only licensed applications are installed at a price. Setting the desktop applications secure will be done by creating an administrator account in the computers with a different password.

A good desktop environment includes ease of access to applications and simple naming of the applications for the client not to struggle locating the applications. It is a strategy that needs usability testing and frequent fixing of undesirable changes.

I will conduct training and awareness to my fellow staff and users about our user standards. I will also carry out regular synchronization of the network to ensure no malicious entries are being dared. I will use the App Builder tool to develop common desktop applications. This application makes work easier on ‘help, Tool-Talk, Drag and drop’ activities. I will also develop a common desktop environment product glossary in order to enhance ‘source and reference’ method. This strategy will ensure proper usage of the graphical user interfaces.

Reference

KorkishICTNWK408 Configure a Desktop Environmentko, T. &. (2017). Method and system for providing security policy for Linux-based security operating system.

Pudipeddi, R. V. (2017). U.S. Patent No. 9,575,988. Patent and Trademark office.

Wang, X. W. (2017). Improved rule installation for real-time query service in software-defined enternet of vehicles. IEEE Transactions on intelligent Transportation systems, 225-235.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2021). How To Prepare, Install, Configure, And Test A Desktop Operating System Essay.. Retrieved from https://myassignmenthelp.com/free-samples/ictnwk408-configure-a-desktop-environment/analyse-data-migration-requirements.html.

"How To Prepare, Install, Configure, And Test A Desktop Operating System Essay.." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/ictnwk408-configure-a-desktop-environment/analyse-data-migration-requirements.html.

My Assignment Help (2021) How To Prepare, Install, Configure, And Test A Desktop Operating System Essay. [Online]. Available from: https://myassignmenthelp.com/free-samples/ictnwk408-configure-a-desktop-environment/analyse-data-migration-requirements.html
[Accessed 18 April 2024].

My Assignment Help. 'How To Prepare, Install, Configure, And Test A Desktop Operating System Essay.' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/ictnwk408-configure-a-desktop-environment/analyse-data-migration-requirements.html> accessed 18 April 2024.

My Assignment Help. How To Prepare, Install, Configure, And Test A Desktop Operating System Essay. [Internet]. My Assignment Help. 2021 [cited 18 April 2024]. Available from: https://myassignmenthelp.com/free-samples/ictnwk408-configure-a-desktop-environment/analyse-data-migration-requirements.html.

Get instant help from 5000+ experts for
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

loader
250 words
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Plagiarism checker
Verify originality of an essay
essay
Generate unique essays in a jiffy
Plagiarism checker
Cite sources with ease
support
Whatsapp
callback
sales
sales chat
Whatsapp
callback
sales chat
close