SlideShare ist ein Scribd-Unternehmen logo
1 von 24
To enter in Windows Tools, you must
follow the next picture.
Is a computer maintenance
utility included in Microsoft
Windows designed to free
up disk space on a
computer's hard drive. The
utility first searches and
analyzes the hard drive for
files that are no longer of
any use, and then removes
the unnecessary files.
 Is used to view the
characters in any
installed font, to check
what keyboard input
(Alt code) is used to
enter those
characters, and to
copy characters to the
clipboard in lieu of
typing them.
Designed to increase access speed by
rearranging files stored on a disk to
occupy contiguous storage locations, a
technique called defragmentation.
Defragmenting a disk minimizes head
travel, which reduces the time it takes to
read files from and write files to the disk.
Provides users with the ability to
view the status of computer security
settings and services. This initial
version provides monitoring of
Windows Update, Windows
Firewall, and the availability of an
anti-virus software package
This tool can be used to collect
information about your
computer, from
others tools, diagnose
problems…
 Seven computers.
 Switch o hub: The switch is where you will plug in your
IP cameras, NVR, IP storage array, video servers, etc and
the switch will quickly connect all of them together and
enable communication.
 Ethernet cable: Systems communicating over Ethernet
divide a stream of data into shorter pieces called frames.
Each frame contains source and destination addresses
and error-checking data so that damaged data can be
detected and re-transmitted.
 Rj45: a connector for computer network
 (Ethernet) cables.
 Network printer
 Network card: is a computer hardware component that connects a
computer to a computer network.
 USB cable: was designed to standardize the connection of computer
peripherals to personal computers, both to communicate and to supply
electric power
 Printer
 Router : is a device that forwards data packets between computer
networks, creating an overlay internetwork. A router is connected to two or
more data lines from different networks.
 Telephone cable
 Telephone socket
 To use the protocols you must follow next
pictures.
• Click on “start” and then, control panel.
• Please double-click the Network
Connections icon.
• Select the icon Local Area Connection 2
and with the right button of the mouse you
select Properties.
Pressing the Setup button on the window
that appears
shown below where you can access some
Features of this adapter.
 From the Properties window of the
Local Area Connection that
shown above on the left, select the
Internet Protocol item
(TCP / IP) and clicking on the
Properties button, the window
Properties Internet Protocol (TCP /
IP) (top right),
where are some data relating to the
operation of these
protocols.
 is a native Windows application usually
running in Win32 console. This allows it to
take advantage of features available to
native programs on the platform that are
otherwise unavailable to DOS programs.
 If you are having connectivity problems, you can use the ping
command to check the destination IP address you want to reach and
record the results. The ping command displays whether the
destination responded and how long it took to receive a reply. If there
is an error in the delivery to the destination, the ping command
displays an error message.
You can use the ping command to:
• Ping your computer (by address, not host name) to determine that
TCP/IP is functioning. (Pinging your computer does not verify that
your network adapter is functioning.)
• Ping the local router to determine whether the router is running.
• Ping beyond your local router.
My computer
Other
computer
(invented)
 You can use the ifconfig command to assign an address to a network
interface and to configure or display the current network interface
configuration information. The ifconfig command must be used at
system startup to define the network address of each interface present
on a machine. After system startup, it can also be used to redefine an
interfaces address and its other operating parameters. The network
interface configuration is held on the running system and must be
reset at each system restart. The ifconfig command interprets the
IFF_MULTICAST flag and prints its value if it is set.
There are some computer problems, now
I´m going to explain one solution for this
two. These problems can cause that our
computer goes slow, have a lot of virus…
“SOME FILES COULD NOT BE SCANNED”
It means that the scanner was
blocked, somehow, from scanning those
files. I suggest you run another scan, this
time in Safe Mode With Networking. That
sometimes keeps malware from protecting
itself. In other words, your anti-malware may
be able to scan and fix those files.
To get into Safe Mode with Networking:
1. Log out and reboot your machine.
2. When the machine starts the reboot
sequence, press the F8 key repeatedly.
3. Select Safe Mode with Networking from
the resulting menu.
4. Login. If the malware has changed your
password, try logging in as Administrator. By
default, Administrator has no password.
5. The machine will continue booting, but
the Windows desktop will look different.
6. When you're finished doing what you
need to do, log out and reboot back into
normal mode.
“ WINDOWS GENUINE ADVANTAGE”
The easiest way to do this is...
Search online for the "Windows 7 Loader"
program. It is completely automated and will
automatically give your computer a valid
activation key. I think that the version that I used
(as a test, of course) is version 1.7.7.
However,
Following three simple steps now you can get rid
of the pesky and sometimes buggy Windows
Genuine Advantage (WGA) notifications:
1. Reboot Windows in safe mode (hold the f8 key
while booting and you will get the option to boot
in safe mode) and then:
2. Open Registry Editor (regedit.exe) and search
for wgalogon folder and delete it. You should
backup up the registry before hand, in case
something goes wrong.
3. In your windows directory search for files wga*
and delete them. when you search for wga*
please don't delete wgapi.dll if you found. This
dynamic link is not related with that notifications
massage.
You are done!
Now reboot back normally and continue your
work. Windows Genuine Advantage will not
bother you anymore.
Note: Now it is not required anymore. You can do
it yourself by carefully following the guide above.
computing networks and operating system

Weitere ähnliche Inhalte

Was ist angesagt?

HostID or Disk Serial Number
HostID or Disk Serial NumberHostID or Disk Serial Number
HostID or Disk Serial Number
Arun Talukdar
 
How to Wipe Mac Laptop
How to Wipe Mac LaptopHow to Wipe Mac Laptop
How to Wipe Mac Laptop
glen sagman
 
Xp installation screenshots
Xp installation screenshotsXp installation screenshots
Xp installation screenshots
BenRB
 
Redhat OS installation
Redhat OS installationRedhat OS installation
Redhat OS installation
Pontika Gupta
 
Act4 Faith
Act4 FaithAct4 Faith
Act4 Faith
jamie25
 
Windows xp installation
Windows xp installationWindows xp installation
Windows xp installation
Thomas_Fifield
 

Was ist angesagt? (18)

2.2
2.22.2
2.2
 
HostID or Disk Serial Number
HostID or Disk Serial NumberHostID or Disk Serial Number
HostID or Disk Serial Number
 
CSS LO6 - PREPARING AND INSTALLING OPERATING SYSTEM
CSS LO6 - PREPARING AND INSTALLING OPERATING SYSTEMCSS LO6 - PREPARING AND INSTALLING OPERATING SYSTEM
CSS LO6 - PREPARING AND INSTALLING OPERATING SYSTEM
 
Fundamental
FundamentalFundamental
Fundamental
 
2nd lesson installing operating system
2nd lesson installing operating system2nd lesson installing operating system
2nd lesson installing operating system
 
How to Wipe Mac Laptop
How to Wipe Mac LaptopHow to Wipe Mac Laptop
How to Wipe Mac Laptop
 
Computer repair and maintenance
Computer repair and maintenanceComputer repair and maintenance
Computer repair and maintenance
 
Computer maintenance-and-repair
Computer maintenance-and-repairComputer maintenance-and-repair
Computer maintenance-and-repair
 
CSS L07 - Preparing the Installer
CSS L07 - Preparing the InstallerCSS L07 - Preparing the Installer
CSS L07 - Preparing the Installer
 
Xp installation screenshots
Xp installation screenshotsXp installation screenshots
Xp installation screenshots
 
Explanation of Operating System ! Designed By: A jay Kumar
Explanation of Operating System ! Designed By: A jay KumarExplanation of Operating System ! Designed By: A jay Kumar
Explanation of Operating System ! Designed By: A jay Kumar
 
Data recovery software mac
Data recovery software macData recovery software mac
Data recovery software mac
 
Redhat OS installation
Redhat OS installationRedhat OS installation
Redhat OS installation
 
Act4 Faith
Act4 FaithAct4 Faith
Act4 Faith
 
Types of computer system error
Types of computer system errorTypes of computer system error
Types of computer system error
 
Pc maintenance
Pc maintenancePc maintenance
Pc maintenance
 
Windows xp installation
Windows xp installationWindows xp installation
Windows xp installation
 
Using a Windows Network
Using a Windows NetworkUsing a Windows Network
Using a Windows Network
 

Andere mochten auch (17)

A trip to new zealand
A trip to new zealandA trip to new zealand
A trip to new zealand
 
Final_Birdlife_IBACaucasus
Final_Birdlife_IBACaucasusFinal_Birdlife_IBACaucasus
Final_Birdlife_IBACaucasus
 
IABSE presentation on Shear Capacity of Concrete Bridges
IABSE presentation on Shear Capacity of Concrete BridgesIABSE presentation on Shear Capacity of Concrete Bridges
IABSE presentation on Shear Capacity of Concrete Bridges
 
As evq7
As evq7As evq7
As evq7
 
PDHPE Rationale - Jess Smith (17638757)
PDHPE Rationale - Jess Smith (17638757)PDHPE Rationale - Jess Smith (17638757)
PDHPE Rationale - Jess Smith (17638757)
 
G324 Advanced Portfolio: Evaluation
G324 Advanced Portfolio: EvaluationG324 Advanced Portfolio: Evaluation
G324 Advanced Portfolio: Evaluation
 
Evaluation question 1 front cover
Evaluation question 1 front coverEvaluation question 1 front cover
Evaluation question 1 front cover
 
Menu
MenuMenu
Menu
 
Structural Synergy presentation
Structural Synergy presentationStructural Synergy presentation
Structural Synergy presentation
 
G324 Advanced Portfolio: Evaluation
G324 Advanced Portfolio: EvaluationG324 Advanced Portfolio: Evaluation
G324 Advanced Portfolio: Evaluation
 
Iias merchant list
Iias merchant listIias merchant list
Iias merchant list
 
Presentation1
Presentation1Presentation1
Presentation1
 
bbom presentazione italiano
bbom presentazione italianobbom presentazione italiano
bbom presentazione italiano
 
Bec 1 unit 1
Bec 1 unit 1Bec 1 unit 1
Bec 1 unit 1
 
Online search markma
Online search markmaOnline search markma
Online search markma
 
Soportes contables y requisitos
Soportes contables y requisitosSoportes contables y requisitos
Soportes contables y requisitos
 
Diapositivastaller 2 tecnologia_educativa new
Diapositivastaller 2 tecnologia_educativa newDiapositivastaller 2 tecnologia_educativa new
Diapositivastaller 2 tecnologia_educativa new
 

Ähnlich wie computing networks and operating system

Os and network activity javier guerrero
Os and network activity   javier guerreroOs and network activity   javier guerrero
Os and network activity javier guerrero
JGuerreroM96
 
Operating systems and networks
Operating systems and networksOperating systems and networks
Operating systems and networks
carmenpuigdueta
 
Networking and Computer Troubleshooting
Networking and Computer TroubleshootingNetworking and Computer Troubleshooting
Networking and Computer Troubleshooting
Rence Montanes
 
Parallel port programming
Parallel port programmingParallel port programming
Parallel port programming
mangal das
 
10 reasons why p cs crash
10 reasons why p cs crash 10 reasons why p cs crash
10 reasons why p cs crash
Srikanth
 
Application software and system software
Application software and system softwareApplication software and system software
Application software and system software
shujra
 

Ähnlich wie computing networks and operating system (20)

Os and network activity javier guerrero
Os and network activity   javier guerreroOs and network activity   javier guerrero
Os and network activity javier guerrero
 
Operating systems
Operating systemsOperating systems
Operating systems
 
Virginiatools
VirginiatoolsVirginiatools
Virginiatools
 
Virginiatools
VirginiatoolsVirginiatools
Virginiatools
 
Operating systems and networks
Operating systems and networksOperating systems and networks
Operating systems and networks
 
Presentation operation system
Presentation operation systemPresentation operation system
Presentation operation system
 
Networking and Computer Troubleshooting
Networking and Computer TroubleshootingNetworking and Computer Troubleshooting
Networking and Computer Troubleshooting
 
Reverse engineering – debugging fundamentals
Reverse engineering – debugging fundamentalsReverse engineering – debugging fundamentals
Reverse engineering – debugging fundamentals
 
Operating systems and computing networks
Operating systems and computing networksOperating systems and computing networks
Operating systems and computing networks
 
Operating System & Utility Programme
Operating System & Utility ProgrammeOperating System & Utility Programme
Operating System & Utility Programme
 
5 stepmainttut
5 stepmainttut5 stepmainttut
5 stepmainttut
 
Hardware & software
Hardware & softwareHardware & software
Hardware & software
 
Main notes (1)
Main notes (1)Main notes (1)
Main notes (1)
 
Module1 computerbasics1
Module1 computerbasics1Module1 computerbasics1
Module1 computerbasics1
 
Parallel port programming
Parallel port programmingParallel port programming
Parallel port programming
 
10 reasons why p cs crash
10 reasons why p cs crash 10 reasons why p cs crash
10 reasons why p cs crash
 
Troubleshooting
TroubleshootingTroubleshooting
Troubleshooting
 
Application software and system software
Application software and system softwareApplication software and system software
Application software and system software
 
Operating system &utility program
Operating system &utility programOperating system &utility program
Operating system &utility program
 
Apple mac
Apple macApple mac
Apple mac
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

computing networks and operating system

  • 1.
  • 2. To enter in Windows Tools, you must follow the next picture.
  • 3. Is a computer maintenance utility included in Microsoft Windows designed to free up disk space on a computer's hard drive. The utility first searches and analyzes the hard drive for files that are no longer of any use, and then removes the unnecessary files.
  • 4.  Is used to view the characters in any installed font, to check what keyboard input (Alt code) is used to enter those characters, and to copy characters to the clipboard in lieu of typing them.
  • 5. Designed to increase access speed by rearranging files stored on a disk to occupy contiguous storage locations, a technique called defragmentation. Defragmenting a disk minimizes head travel, which reduces the time it takes to read files from and write files to the disk.
  • 6. Provides users with the ability to view the status of computer security settings and services. This initial version provides monitoring of Windows Update, Windows Firewall, and the availability of an anti-virus software package
  • 7. This tool can be used to collect information about your computer, from others tools, diagnose problems…
  • 8.
  • 9.  Seven computers.  Switch o hub: The switch is where you will plug in your IP cameras, NVR, IP storage array, video servers, etc and the switch will quickly connect all of them together and enable communication.  Ethernet cable: Systems communicating over Ethernet divide a stream of data into shorter pieces called frames. Each frame contains source and destination addresses and error-checking data so that damaged data can be detected and re-transmitted.
  • 10.  Rj45: a connector for computer network  (Ethernet) cables.  Network printer  Network card: is a computer hardware component that connects a computer to a computer network.  USB cable: was designed to standardize the connection of computer peripherals to personal computers, both to communicate and to supply electric power  Printer  Router : is a device that forwards data packets between computer networks, creating an overlay internetwork. A router is connected to two or more data lines from different networks.  Telephone cable  Telephone socket
  • 11.
  • 12.  To use the protocols you must follow next pictures. • Click on “start” and then, control panel. • Please double-click the Network Connections icon. • Select the icon Local Area Connection 2 and with the right button of the mouse you select Properties. Pressing the Setup button on the window that appears shown below where you can access some Features of this adapter.
  • 13.  From the Properties window of the Local Area Connection that shown above on the left, select the Internet Protocol item (TCP / IP) and clicking on the Properties button, the window Properties Internet Protocol (TCP / IP) (top right), where are some data relating to the operation of these protocols.
  • 14.
  • 15.  is a native Windows application usually running in Win32 console. This allows it to take advantage of features available to native programs on the platform that are otherwise unavailable to DOS programs.
  • 16.  If you are having connectivity problems, you can use the ping command to check the destination IP address you want to reach and record the results. The ping command displays whether the destination responded and how long it took to receive a reply. If there is an error in the delivery to the destination, the ping command displays an error message. You can use the ping command to: • Ping your computer (by address, not host name) to determine that TCP/IP is functioning. (Pinging your computer does not verify that your network adapter is functioning.) • Ping the local router to determine whether the router is running. • Ping beyond your local router.
  • 18.
  • 19.  You can use the ifconfig command to assign an address to a network interface and to configure or display the current network interface configuration information. The ifconfig command must be used at system startup to define the network address of each interface present on a machine. After system startup, it can also be used to redefine an interfaces address and its other operating parameters. The network interface configuration is held on the running system and must be reset at each system restart. The ifconfig command interprets the IFF_MULTICAST flag and prints its value if it is set.
  • 20.
  • 21. There are some computer problems, now I´m going to explain one solution for this two. These problems can cause that our computer goes slow, have a lot of virus…
  • 22. “SOME FILES COULD NOT BE SCANNED” It means that the scanner was blocked, somehow, from scanning those files. I suggest you run another scan, this time in Safe Mode With Networking. That sometimes keeps malware from protecting itself. In other words, your anti-malware may be able to scan and fix those files. To get into Safe Mode with Networking: 1. Log out and reboot your machine. 2. When the machine starts the reboot sequence, press the F8 key repeatedly. 3. Select Safe Mode with Networking from the resulting menu. 4. Login. If the malware has changed your password, try logging in as Administrator. By default, Administrator has no password. 5. The machine will continue booting, but the Windows desktop will look different. 6. When you're finished doing what you need to do, log out and reboot back into normal mode.
  • 23. “ WINDOWS GENUINE ADVANTAGE” The easiest way to do this is... Search online for the "Windows 7 Loader" program. It is completely automated and will automatically give your computer a valid activation key. I think that the version that I used (as a test, of course) is version 1.7.7. However, Following three simple steps now you can get rid of the pesky and sometimes buggy Windows Genuine Advantage (WGA) notifications: 1. Reboot Windows in safe mode (hold the f8 key while booting and you will get the option to boot in safe mode) and then: 2. Open Registry Editor (regedit.exe) and search for wgalogon folder and delete it. You should backup up the registry before hand, in case something goes wrong. 3. In your windows directory search for files wga* and delete them. when you search for wga* please don't delete wgapi.dll if you found. This dynamic link is not related with that notifications massage. You are done! Now reboot back normally and continue your work. Windows Genuine Advantage will not bother you anymore. Note: Now it is not required anymore. You can do it yourself by carefully following the guide above.