(13646) Lab 1 Os
(13646) Lab 1 Os
ROLL NO : 13646
LAB : 1
STEP:1
PREPARING THE CD
Put the Setup CD into the drive, and press the Restart button on the computer case.
STEP:2
Make sure the computer prompts you to press a key to start the Setup. If it does not, you need to
set the CD-Drive as the First Boot Device in Boot category in your computer's BIOS.
INSTALLING WINDOW
After your computer reboots, a Black screen will appear showing the message 'Press any key to
Boot from CD...'. Press any key.
STEP:3
Wait for a few seconds until the a Blue Screen pops up with the Title Windows Setup.
STEP:4
Select a drive for Windows to be installed, and choose its File System (FAT32 or NTFS).
STEP:5
After a number of restarts, the previous screen with 'Press any key to Boot from CD...' will
appear. Ignore it this time.
STEP:6
Set the Regional and Language, and Network Settings, and let the Setup install windows.
STEP:7
Install basic security software such as a firewall, antivirus program, and an anti-spyware
program; the built-in Windows Firewall, AVG Free, and Safer Networking Spybot S&D should
work fine.
STEP:8
Update Windows and the security software. This should help protect against some viruses and
improve stability.
STEP:9
Make sure that all your hardware is working. Unlike OEM installs, there can be some issues
here. You might want to go to the hardware manufacturers' websites for the latest drivers.
STEP:10
You are done with installing Windows, now take a Quick Tour, as Windows will pop-up a
message for it.
QUESTION:2
1.MULTIUSER SYSTEM:
Unix provides multiple programs to run and compete for the attention of the CPU. This
happens in 2 ways :
2. MULTITASK SYSTEM :
A single user may run multiple tasks concurrently. Example : Editing a file, printing another
on the printer & sending email to a person, and browsing the net too at the same time. The
Kernel is designed to handle user’s multiple needs.
The important thing here is that only one job can be seen running in the foreground, the rest
all seems to run in the background. Users can switch between them, terminate/suspend any of
the jobs.
3. THE BUILDING-BLOCK APPROACH :
The Unix developers thought about keeping small commands for every kind of work. So Unix
has so many commands, each of which performs one simple job only. You can use 2
commands by using pipes (‘|’). Example : $ ls | wc Here, | (pipe) connects 2 commands to
create a pipeline. This command counts the number of files in the directory. These types of
connected commands that can filter/manipulate data in other ways are called filters.
Nowadays, many UNIX tools are designed in a way that the output of 1 can be used as an
input for the others.. We can create a large number of combinations by connecting a number
of tools.
5. PATTERN MATCHING:
Unix provides very sophisticated pattern matching features. The meta-char ‘*’ is a special
character used by the system to match a number of file names. There are several other meta-
char in UNIX. The matching is not confined to only filename. Advanced tools use a regular
expression that is framed with the characters from this set.
6. PROGRAMMING FACILITY :
Unix provides shell which is also a programming language designed for programmers, not for
casual end-users. It has all the control structures, loops, and variables required for
programming purposes. These features are used to design the shell scripts ( programs that can
invoke the UNIX commands).
Many functions of the system can be controlled and managed by these shell scripts.
7. DOCUMENTATION:
It has a ‘man’ command that stands for the manual, which is the most important reference for
any commands and their configuration files. Apart from the offline documentation, there is a
vast amount of resources available on the Internet. If you’re stuck with a problem, there are
various UNIX newsgroups where you can post your concerns.
8. PORTABLE:
Unix is highly portable, meaning it can be easily adapted to run on different hardware
architectures.
9. COMMAND-LINE INTERFACE:
Unix has a powerful command-line interface (CLI) that allows users to interact with the
system through a shell program.
11. NETWORKING:
Unix was designed from the ground up to support networking, making it an ideal choice for
servers and other networked systems.
12. SECURITY:
Unix has robust security features built-in, including user-level permissions and access control
lists.