MANAGING AN OPERATING SYSTEM (OS)

FUNCTIONS OF AN OS

Management interfaces include: 

  1. Control Panel
  2. Windows settings
  3. Management consoles
    1. Includes computer management default console – includes .exe extensions; lists most frequently used tools  
    2. Custom consoles with selected snap-ins 
      1. Includes disk management
      2. User management 
  4. Registry editor (regedit) – it’s a database that contains all the info you can use on your computer
    1. To access, go to RUN [WIN + R]>type REGEDIT
    2. It contains folders. Root folders start with HKEY
  5. Command prompt and PowerShell – terminals used to run IPCONFIG 
  6. Linux has the same features, and all configuration is done by editing text files using vi or nano
TASK MANAGER

TASK MANAGER [taskmgr] A task manager is a system monitor program used to provide information about the processes and applications running on a computer, as well as the general status of the computer. 

  • Can be accessed the following ways: 
    1. CTRL + ALT + DEL 
    2. CTRL + SHIFT + ESC
    3. Right click on task bar, click TASK MANAGER
    4. Right click START menu, click TASK MANAGER
    5. Run + type TASK MANAGER
  • It ends processes that are not responding 
  • Important to note that ending processes started by the OS require admin rights, for security purposes
  • Can be used to monitor and control processes (and other performance indicators) 

SERVICE MANAGEMENT are processes that run in the background that does not require user interaction 

  • It supports OS functionality and many applications by: 
    1. Allowing signing in 
    2. Let’s you browse your network
    3. Indexing files
    4. It’s also used for connecting printers (print spooler), and troubleshooting printers
  • You can start/stop, and configure services through the services snap-in
  • To access, go to RUN [WIN + R], SERVICES R

TASK SCHEDULER allows you to run certain tasks on the computer at certain times a day, hour, year, etc.  

  • Task scheduler triggers include: 
    1. Time and date
    2. Event tripper 
    3. Multiple triggers 
  • It must be noted that Windows comes with some scheduled tasks by default, including: 
    1. Disk defrag
    2. Disk clean up 
    3. Update scans
  • Linux has the same type of task scheduler called CRON, which commands tasks or scripts to run at a specified time 

MEMORY AND MEMORY MANAGEMENT

☐ System memory is volatile [can only be preserved while the system is powered, but once power is removed, the memory is wiped clean. 

System memory is provided by the RAM [Random Access Memory] module 

☐ Mass storage provides data when the system is turned off

  • Includes the primary fixed disk – HDD or SSD 

☐ Memory management is mostly controlled by the OS

  • Monitors memory usage to see if an upgrade is required [done by Task Manager] 
  • Monitors how processes use memory to detect leaks, malware, and buggy programs
    • Memory leak = a program that is taking excessive RAM or other memory to run, because there is a bug in the system. 

VIRTUAL MEMORY/PAGEFILE 

☐ If your computer runs out of physical memory, it can use some hard disk space to supplement RAM

Configured via SYSTEM PROPERTIES: Right-click THIS PC/COMPUTER> PROPERTIES > ADVANCED SYSTEM SETTINGS > ADVANCED > (PERFORMANCE) SETTINGS > ADVANCED > CHANGE

DISK MANAGEMENT 

☐ It’s a built-in took in Windows that helps you manage disk partitions, without reboot or system interruptions 

  • To access: 
    1. Right click task bar, select DISK MANAGEMENT
    2. Type DISKMGMT.MSC in the command line, hit ENTER
    3. Once it opens, you can use it to change drive letters, partition a drive, format a drive, and all kinds of other techie stuff

COMMAND LINE INTERFACES

☐ Did you know that DISKMGMT.MSC was a command line interface [CLI]? Now you know. 

  • You can use CLI type commands to the computer, instead of using your mouse or keyboard. But you have to know what you’re asking, why you’re asking the command to do certain tasks, and how those commands will impact the system. In other words, you have to know the rules before you can break them. 
  • Please note that the commands available depend on the environment: 
    1. Windows command prompt = cmd.exe
    2. Or Windows PowerShell
    3. Linux’s command prompt is called BASH [Bourne Again Shell]

ACCESS CONTROL AND PROTECTION [CAN’T COME TO THE PARTY IF YOU AREN’T INVITED]

☐ Access control systems ensure authorized parties are able to access data, network resources, and proper computers.  

  • Users are identified through specified accounts 
  • Users can access their account by authenticating with credentials [username and password]
    • Access controls prevents apps and non-admins from making changes to their account [especially if they have zero business making changes to said account] 
  • Types of user accounts includes 
    • Administrator accounts – everyone and their mother uses admin accounts 
      • It’s a huge reason why UAC (User Access Control) is so important – it requires explicit permission to perform a “protected” task
    • Standard user accounts – has the leas privileges
      • Users should only have enough permissions/access required to do their job and no more