SlideShare uma empresa Scribd logo
1 de 100
Baixar para ler offline
OSC Group 3 Reports ,[object Object]
 Peer to peer connection
 Printer Sharing
 File Sharing
 Net Meeting Configuration,[object Object]
 It was first released in August 2001
 It was the most popular versions of Windows, based on installed user based.
Windows XP Introduction ,[object Object]
 Windows XP is the successor to both Windows 2000 and Windows ME
 The most common edition were Windows XP Home edition for home users and Windows XP Professional which support Windows server domain and two  physical processors.
Minimum Hardware Requirements ,[object Object]
 64 Megabytes (MB) of RAM
 1.5 Gigabytes of available space on hard disk
 CD Rom or DVD Rom drive
 Keyboard and mouse and other pointing devices. ,[object Object]
 Sound card, speakers and headphones,[object Object]
 Locate your Windows XP product key.
 Make sure your computer hardware meets the minimum requirements and also verify that your keyboard, mouse, monitors  and CD drive are properly connected.,[object Object]
Pre-installation checklist ,[object Object]
 If all are ready and set, we can now continue on the Installation process.,[object Object]
 Insert your Windows XP CD into your computer CD Rom and restart.
 If prompted to boot from the CD, press any key on your keyboard or just press on the spacebar key.
 If you miss the prompt as it only appearsin few seconds, restart and try again.
Installation Process ,[object Object],[object Object],[object Object],[object Object]
Installation Process ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Installation Process ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Installation Process ,[object Object],Administrator password box, and then retype it in the  Confirm password box. Click Next.
Installation Process ,[object Object],[object Object],[object Object],[object Object]
 When the Monitor Settings dialog box appears, click OK.
Installation Process ,[object Object],[object Object],[object Object]
Installation Process ,[object Object],[object Object]
Installation Process ,[object Object],[object Object],[object Object]
Installation Process ,[object Object]
 Enjoy and start using your new PC with Windows XP.,[object Object]
Peer to peer connection ,[object Object],         - There are several ways to connect computers or create a network. For a home or small office, the most common model is peer-to-peer networking.          -  In a peer-to-peer network, also called a workgroup, computers directly communicate with each other and do not require a server to manage  network resources.  A peer-to-peer  network is most appropriate when fewer than  ten computers are located in the same general area.
Peer to peer connection    - The computers in a workgroup are considered peers because they are all equal and share resources among each other.     - Each user decides which data on his or her computer will be shared with the network. By sharing common resources, users can print from a  single printer, access information  in shared folders, and work on a  single file without transferring it  to a floppy disk.
Peer to peer connection    - A home or small office network is like a telephone system. On a network, each computer has a network adapter that acts like a phone handset: just as you use a handset for talking and listening, the computer uses the network device to send and receive information to and from other computers on the network.
Peer to peer connection  - With home or small office networking, you can:  ,[object Object]
 Share one Internet connection with all of the computers on the network.
 Work on files stored on any computer on the network. ,[object Object], computers on the network.  ,[object Object],[object Object]
Peer to peer connection  - The typical computing model for many applications is a client/server model. A server computer typically has vast resources and responds to requests for resources and data from client computers. Client computers initiate requests for resources or data from server computers.  A good example of the client/server  model of computing is Web browsing.
Peer to peer connection  - Web servers on the Internet are typically high-end dedicated server computers with very fast processors (or multiple processors) and huge hard disk arrays. The Web server stores all of the content associated with a Web site (HTML files, graphics, audio and video files, etc.) and listens for incoming requests to view  the information on a particular Web page. When a page is requested, the Web  server sends the page and its associated files  to the requesting client.
Peer to peer connection  - Peer-to-peer networking has the following advantages over client/server networking: 1.  Content and resources can be shared from both the center and the edge of the network. In client/server networking, content and resources are typically shared from only the center of the network. 2.  A network of peers is easily scaled and more reliable than a  single server. A single server is  subject to a single point of failure or can be a  bottleneck in times of high network utilization.
Peer to peer connection 3. A network of peers can share its processor, consolidating computing resources for distributed computing tasks, rather than relying on a single computer, such as a supercomputer. 4. Shared resources of peer computers can be directly accessed. Rather than sharing a file stored on a central server, a peer can share the file  directly from its local storage.
Peer to peer connection  - Peer-to-peer networking solves the following problems:        1. Allows the processing resources of edge computers to be utilized for distributed computing tasks.       2. Allows local resources to be shared directly, without the need for intermediate servers.        3. Allows efficient multipoint  communication without having to  rely on IP multicast infrastructure.
Peer to peer networking scenarios   - Peer-to-peer networking enables or enhances the following scenarios:      1. Real-time communications (RTC).      2. Collaboration      3. Content distribution      4. Distributed processing      5. Improved Internet technologies
Real-Time Communications   - For RTC, peer-to-peer networking enables server less instant messaging and real-time matchmaking and game play.      1. Server less instant messaging :  Computer users can chat and have voice or video conversations with their peers today. However, many of the existing programs and their  communications protocols  rely on servers to function.  If you are participating in an ad-hoc  wireless network or are a part of an isolated network, you are unable to use these RTC facilities. Peer-to-peer technology allows the extension of RTC technologies to these additional networking environments.
Real-Time Communications     2. Real-time matchmaking and game play:              Similar to RTC, real-time game play exists today. There are many Web-based game sites that cater to the gaming community via the Internet.              They offer the ability to find other gamers with similar interests and play a game together.  The problem is that the game sites  exist only on the Internet and are geared  toward the avid gamer who wants to play against the best gamers in the world.
Real-Time Communications           These sites track and provide the statistics to help in the process. However, these sites do not allow a gamer to set up an ad-hoc game among friends in a variety of networking environments. Peer-to-peer networking can provide this capability.
Collaboration  - Peer-to-peer networking allows the sharing of a workspace, files, and experiences.       1. Project workspaces solving a goal:             Shared workspace applications allow for the creation of ad-hoc workgroups and then allow the workgroup owners to populate the  shared workspace with the tools  and content that will allow the group  to solve a problem. This could include  message boards, productivity tools, and files.
Collaboration      2. Sharing your files with other people:             A subset of project workspace sharing is the ability to share files. Although this ability exists today with the current version of Windows, it can be enhanced through peer-to-peer networking to make file content available in an easy and friendly way. Allowing easy access to the incredible wealth of content at the  edge of the Internet or in ad-hoc  computing environments increases the  value of network computing.
Content Distribution  - Peer-to-peer networking allows the distribution of text, audio, and video and software product updates.
Distributed Processing  - Peer-to-peer networking allows computing tasks to be distributed and processor resources to be aggregated.       A large computing task can first be divided into separate smaller computing tasks well suited to the computing resources of a peer. A peer could do the dividing of the large computing task. Then, peer-to-peer networking  can distribute the individual tasks to  the separate peers in the group.  Each peer performs its computing task  and reports its result back to a  centralized accumulation point.
Improved Internet Technologies Peer-to-peer networking can also provide an improved utilization of the Internet and support new Internet technologies. Historically, the Internet was designed so that network peers can have end-to-end connectivity. The modern-day Internet, however, more closely resembles a client/server environment where communication in many cases is not end-to-end due to the  prevalence of Network Address  Translators (NATs).
Example of Peer to Peer connection w/o central infrastructure
Peer to Peer connection using X graph
Peer to peer in Windows XP ,[object Object],    - Click Start, click Control Panel, and then click on Add and Remove Programs.     - Click Add / Remove Windows components.     - In Components, click Networking Services (but do not select its checkbox), then click on Details - Select the Peer-to-Peer check box, and then click ok.      - Click next and then follow the instructions in the wizard.
Set-up peer network in Windows XP ,[object Object],[object Object]
Hardware – Network Cable ,[object Object],[object Object],[object Object]
Decide whether to use hub or switch ,[object Object],For your small network, use either  a dual-speed hub or a dual-speed  switch .
A hub forwards data packets to all the ports ,[object Object],[object Object]
Switch forwards data packet only to recipients ,[object Object],packet, it determines the  recipient and forwards the  packet to the correct computer.
Connecting the Computers ,[object Object],   - Plug one end of the twisted pair cable into a network card and the other end into the hub or switch. ,[object Object],a power outlet.
Sharing folders in peer network ,[object Object]
 Right-click the file that you want to share, and then click Sharing and Security to view additional settings.,[object Object],[object Object],[object Object]
Sharing folders in peer network ,[object Object]
 The icon for the shared folder appears with a picture of a hand.
 To access the shared folder, click Start, click My Computer,  and then click  My Network Places.
Sharing folders in peer network ,[object Object],[object Object]
Sharing folders in peer network ,[object Object],You can add new files and  access subfolders and files.
Sharing folders in peer network ,[object Object],  - Hard disks or partitions   - CD ROM drives    - ZIP drives
Printer Sharing ,[object Object]
 If you are using Classic view in Control Panel, double-click  Printers and Faxes.
Printer Sharing ,[object Object]
You can now share the printer.  Click Share this printer, type a share name, and then click OK. ,[object Object],[object Object]
  In the RUN window type CONF and press Enter       This will launch the Net Meeting program setup ,[object Object],[object Object]
  Press Next,[object Object]
  Place Checkon “Do not list..” ,[object Object],[object Object]
 Press Next,[object Object]
  Remove the check mark on the second option
  Press Next,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
  Select Unblock,[object Object]
 Click on the Telephone icon toBegin the call ,[object Object],Receiver.
Terminology and meanings ,[object Object]
  Ad hoc networking – means “for or concerned with one specific purpose”. In networking, the computer to computer direct networking is called ad hoc.
 NAT  - Network Address Translation is a process of  modifying network address information in datagram ( IP ) packet headers while in transit acrossa traffic routing device for the purpose of re-mapping one IP address space into another.
Terminology and meanings ,[object Object]
 IPV4 – Internet Protocol Version 4 is the first major version of IP.
 IPV6 – Internet Protocol Version 6 is the successor of IPV4 and is in active growing Deployment worldwide.
Terminology and meanings ,[object Object]
 LAN – Local Area Network,[object Object]
Operating System Concepts : Reports
Operating System Concepts : Reports
Operating System Concepts : Reports
Operating System Concepts : Reports
Operating System Concepts : Reports
Operating System Concepts : Reports
Operating System Concepts : Reports

Mais conteúdo relacionado

Mais procurados

Help! My PC Just Died & Our Techie Is On Vacation!
Help! My PC Just Died & Our Techie Is On Vacation!Help! My PC Just Died & Our Techie Is On Vacation!
Help! My PC Just Died & Our Techie Is On Vacation!Kathy Lussier
 
Laptop Dell Inspiron 3576 giá rẻ thiết kế bền bỉ
Laptop Dell Inspiron 3576 giá rẻ thiết kế bền bỉLaptop Dell Inspiron 3576 giá rẻ thiết kế bền bỉ
Laptop Dell Inspiron 3576 giá rẻ thiết kế bền bỉLAPTOP TRẦN PHÁT
 
Optimize your computer for peak performance
Optimize your computer for peak performanceOptimize your computer for peak performance
Optimize your computer for peak performancepacampbell
 
How to Format a Computer WindowsXP
How to Format a Computer WindowsXPHow to Format a Computer WindowsXP
How to Format a Computer WindowsXPMd Aftab
 
BASIC MAINTENANCE OF COMPUTER
BASIC MAINTENANCE OF COMPUTERBASIC MAINTENANCE OF COMPUTER
BASIC MAINTENANCE OF COMPUTERJohndion Ruloma
 
Pc hardware course work
Pc hardware course workPc hardware course work
Pc hardware course workIsmail Mukiibi
 
How to install windows 7
How to install windows 7How to install windows 7
How to install windows 7Ahsan Beyg
 
Installing windows 10 and creating a bootable usb
Installing windows 10 and creating a bootable usbInstalling windows 10 and creating a bootable usb
Installing windows 10 and creating a bootable usbArsalan Qureshi
 
How to format your computer??
How to format your computer??How to format your computer??
How to format your computer??PleaseHelpMe
 
Unit III - Basics of Computer Science
Unit III - Basics of Computer ScienceUnit III - Basics of Computer Science
Unit III - Basics of Computer ScienceHepsijeba
 
Formating computer
Formating computerFormating computer
Formating computerargusacademy
 
slideshow about windows xp and features
slideshow about windows xp and featuresslideshow about windows xp and features
slideshow about windows xp and featuresJerick Merueñas
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenanceramsashu15
 
Mac boot camp install-setup
Mac boot camp install-setupMac boot camp install-setup
Mac boot camp install-setupShrawan Kumar
 
Ankit Phadia Hacking tools (2)
Ankit Phadia Hacking tools (2)Ankit Phadia Hacking tools (2)
Ankit Phadia Hacking tools (2)Chandra Pr. Singh
 
Linux Installation And Shamba Server
Linux Installation And Shamba ServerLinux Installation And Shamba Server
Linux Installation And Shamba ServerMayur Verma
 
General PC Maintenance and Troubleshooting
General PC Maintenance and TroubleshootingGeneral PC Maintenance and Troubleshooting
General PC Maintenance and TroubleshootingRaj Alam
 

Mais procurados (20)

Help! My PC Just Died & Our Techie Is On Vacation!
Help! My PC Just Died & Our Techie Is On Vacation!Help! My PC Just Died & Our Techie Is On Vacation!
Help! My PC Just Died & Our Techie Is On Vacation!
 
Laptop Dell Inspiron 3576 giá rẻ thiết kế bền bỉ
Laptop Dell Inspiron 3576 giá rẻ thiết kế bền bỉLaptop Dell Inspiron 3576 giá rẻ thiết kế bền bỉ
Laptop Dell Inspiron 3576 giá rẻ thiết kế bền bỉ
 
Optimize your computer for peak performance
Optimize your computer for peak performanceOptimize your computer for peak performance
Optimize your computer for peak performance
 
How to Format a Computer WindowsXP
How to Format a Computer WindowsXPHow to Format a Computer WindowsXP
How to Format a Computer WindowsXP
 
BASIC MAINTENANCE OF COMPUTER
BASIC MAINTENANCE OF COMPUTERBASIC MAINTENANCE OF COMPUTER
BASIC MAINTENANCE OF COMPUTER
 
Pc hardware course work
Pc hardware course workPc hardware course work
Pc hardware course work
 
How to install windows 7
How to install windows 7How to install windows 7
How to install windows 7
 
Installing windows 10 and creating a bootable usb
Installing windows 10 and creating a bootable usbInstalling windows 10 and creating a bootable usb
Installing windows 10 and creating a bootable usb
 
How to format your computer??
How to format your computer??How to format your computer??
How to format your computer??
 
How to reformat pc
How to reformat pcHow to reformat pc
How to reformat pc
 
Unit III - Basics of Computer Science
Unit III - Basics of Computer ScienceUnit III - Basics of Computer Science
Unit III - Basics of Computer Science
 
Formating computer
Formating computerFormating computer
Formating computer
 
slideshow about windows xp and features
slideshow about windows xp and featuresslideshow about windows xp and features
slideshow about windows xp and features
 
Computer maintenance
Computer maintenanceComputer maintenance
Computer maintenance
 
How to install windows 7 operating system
How to install  windows 7 operating system How to install  windows 7 operating system
How to install windows 7 operating system
 
Pro user-guide
Pro user-guidePro user-guide
Pro user-guide
 
Mac boot camp install-setup
Mac boot camp install-setupMac boot camp install-setup
Mac boot camp install-setup
 
Ankit Phadia Hacking tools (2)
Ankit Phadia Hacking tools (2)Ankit Phadia Hacking tools (2)
Ankit Phadia Hacking tools (2)
 
Linux Installation And Shamba Server
Linux Installation And Shamba ServerLinux Installation And Shamba Server
Linux Installation And Shamba Server
 
General PC Maintenance and Troubleshooting
General PC Maintenance and TroubleshootingGeneral PC Maintenance and Troubleshooting
General PC Maintenance and Troubleshooting
 

Destaque

Chs nc2 reviewer - with oral questioning
Chs nc2 reviewer - with oral questioningChs nc2 reviewer - with oral questioning
Chs nc2 reviewer - with oral questioningAdolfo Nasol
 
Perlbeginners proposal
Perlbeginners proposalPerlbeginners proposal
Perlbeginners proposalazuma satoshi
 
Kozma Szilárd: Nagy Attila Puli, avagy az árnyék én a sorsképlet tükrében
Kozma Szilárd: Nagy Attila Puli, avagy az árnyék én a sorsképlet tükrébenKozma Szilárd: Nagy Attila Puli, avagy az árnyék én a sorsképlet tükrében
Kozma Szilárd: Nagy Attila Puli, avagy az árnyék én a sorsképlet tükrébenVioletta Joó
 
Calculating shelf life of foods
Calculating shelf life of foodsCalculating shelf life of foods
Calculating shelf life of foodsJaideep Banerjee
 
Terzo sogno missionario
Terzo sogno missionarioTerzo sogno missionario
Terzo sogno missionarioMaike Loes
 
Naranjas de Hiroshima Book nº2 - 2007-2011
Naranjas de Hiroshima Book nº2 - 2007-2011Naranjas de Hiroshima Book nº2 - 2007-2011
Naranjas de Hiroshima Book nº2 - 2007-2011Naranjas de Hiroshima
 
Barómetro sobre CONFIANZA de Edelman 2016
Barómetro sobre CONFIANZA de Edelman 2016Barómetro sobre CONFIANZA de Edelman 2016
Barómetro sobre CONFIANZA de Edelman 2016Soymimarca
 
Triduo Sr. Angela Vallese_2 giorno eng
Triduo Sr. Angela Vallese_2 giorno engTriduo Sr. Angela Vallese_2 giorno eng
Triduo Sr. Angela Vallese_2 giorno engMaike Loes
 
Drupal Checklist for Site Builder and Web admin
Drupal Checklist for Site Builder and Web adminDrupal Checklist for Site Builder and Web admin
Drupal Checklist for Site Builder and Web adminAdolfo Nasol
 
Watch my doc!
Watch my doc!Watch my doc!
Watch my doc!stoliros
 
Triduo Sr Angela Vallese_3 giorno eng
Triduo Sr Angela Vallese_3 giorno engTriduo Sr Angela Vallese_3 giorno eng
Triduo Sr Angela Vallese_3 giorno engMaike Loes
 
Continuous Delivery via Docker (in Chinese)
Continuous Delivery via Docker (in Chinese)Continuous Delivery via Docker (in Chinese)
Continuous Delivery via Docker (in Chinese)Yi Yang
 

Destaque (20)

Chs nc2 reviewer - with oral questioning
Chs nc2 reviewer - with oral questioningChs nc2 reviewer - with oral questioning
Chs nc2 reviewer - with oral questioning
 
Perlbeginners proposal
Perlbeginners proposalPerlbeginners proposal
Perlbeginners proposal
 
Arrendamiento
ArrendamientoArrendamiento
Arrendamiento
 
Kozma Szilárd: Nagy Attila Puli, avagy az árnyék én a sorsképlet tükrében
Kozma Szilárd: Nagy Attila Puli, avagy az árnyék én a sorsképlet tükrébenKozma Szilárd: Nagy Attila Puli, avagy az árnyék én a sorsképlet tükrében
Kozma Szilárd: Nagy Attila Puli, avagy az árnyék én a sorsképlet tükrében
 
Sunshine Coast Library, 3rd place IFLA BibLibre Marketing award 2016
Sunshine Coast Library, 3rd place IFLA BibLibre Marketing award 2016Sunshine Coast Library, 3rd place IFLA BibLibre Marketing award 2016
Sunshine Coast Library, 3rd place IFLA BibLibre Marketing award 2016
 
Calculating shelf life of foods
Calculating shelf life of foodsCalculating shelf life of foods
Calculating shelf life of foods
 
A-iPAS Brochure
A-iPAS BrochureA-iPAS Brochure
A-iPAS Brochure
 
Terzo sogno missionario
Terzo sogno missionarioTerzo sogno missionario
Terzo sogno missionario
 
Naranjas de Hiroshima Book nº2 - 2007-2011
Naranjas de Hiroshima Book nº2 - 2007-2011Naranjas de Hiroshima Book nº2 - 2007-2011
Naranjas de Hiroshima Book nº2 - 2007-2011
 
geriatric-myth and facts India
geriatric-myth and facts Indiageriatric-myth and facts India
geriatric-myth and facts India
 
Barómetro sobre CONFIANZA de Edelman 2016
Barómetro sobre CONFIANZA de Edelman 2016Barómetro sobre CONFIANZA de Edelman 2016
Barómetro sobre CONFIANZA de Edelman 2016
 
Leo da vinci
Leo da vinciLeo da vinci
Leo da vinci
 
Triduo Sr. Angela Vallese_2 giorno eng
Triduo Sr. Angela Vallese_2 giorno engTriduo Sr. Angela Vallese_2 giorno eng
Triduo Sr. Angela Vallese_2 giorno eng
 
Arp Attack
Arp AttackArp Attack
Arp Attack
 
Drupal Checklist for Site Builder and Web admin
Drupal Checklist for Site Builder and Web adminDrupal Checklist for Site Builder and Web admin
Drupal Checklist for Site Builder and Web admin
 
L tthon
L tthonL tthon
L tthon
 
Commercialization Of Inventions
Commercialization Of InventionsCommercialization Of Inventions
Commercialization Of Inventions
 
Watch my doc!
Watch my doc!Watch my doc!
Watch my doc!
 
Triduo Sr Angela Vallese_3 giorno eng
Triduo Sr Angela Vallese_3 giorno engTriduo Sr Angela Vallese_3 giorno eng
Triduo Sr Angela Vallese_3 giorno eng
 
Continuous Delivery via Docker (in Chinese)
Continuous Delivery via Docker (in Chinese)Continuous Delivery via Docker (in Chinese)
Continuous Delivery via Docker (in Chinese)
 

Semelhante a Operating System Concepts : Reports

How to format system windows 7 ,10,12,15,or any os .pptx
How to format system windows 7 ,10,12,15,or any os .pptxHow to format system windows 7 ,10,12,15,or any os .pptx
How to format system windows 7 ,10,12,15,or any os .pptxAdarshaAdarsha5
 
Operating systems 2
Operating systems 2Operating systems 2
Operating systems 2mariacalji
 
Windows xp and windows 7 installaton
Windows xp and windows 7 installatonWindows xp and windows 7 installaton
Windows xp and windows 7 installatonSiddharth Jain
 
Install window xp
Install window xpInstall window xp
Install window xpManoj Yadav
 
itft_Installing windows 2003
itft_Installing windows 2003 itft_Installing windows 2003
itft_Installing windows 2003 Swati Aggarwal
 
COMPUTER REFORMATTING COT.pptx
COMPUTER REFORMATTING COT.pptxCOMPUTER REFORMATTING COT.pptx
COMPUTER REFORMATTING COT.pptxJohnRimmonTaquiso3
 
Format, Partition, Install OS
Format, Partition, Install OSFormat, Partition, Install OS
Format, Partition, Install OSSef Cambaliza
 
Installation of windows xp
Installation of windows xpInstallation of windows xp
Installation of windows xpntsurendhar
 
Computer repair Services in newburgh
Computer repair Services in newburgh Computer repair Services in newburgh
Computer repair Services in newburgh marcusantony2
 
12705 installing xp (2)
12705 installing xp (2)12705 installing xp (2)
12705 installing xp (2)Nishant Siddhu
 
Technical interview questions & answer for it support team
Technical interview questions & answer for it support teamTechnical interview questions & answer for it support team
Technical interview questions & answer for it support teamJay Nagar
 
IT Workshop PC-HARDWARE Week3
IT Workshop PC-HARDWARE Week3IT Workshop PC-HARDWARE Week3
IT Workshop PC-HARDWARE Week3sirikeshava
 
Boss components
Boss componentsBoss components
Boss componentsmcganesh
 
2nd lesson installing operating system
2nd lesson installing operating system2nd lesson installing operating system
2nd lesson installing operating systemRaiza Janelle
 

Semelhante a Operating System Concepts : Reports (20)

How to format system windows 7 ,10,12,15,or any os .pptx
How to format system windows 7 ,10,12,15,or any os .pptxHow to format system windows 7 ,10,12,15,or any os .pptx
How to format system windows 7 ,10,12,15,or any os .pptx
 
Operating systems 2
Operating systems 2Operating systems 2
Operating systems 2
 
Windows xp and windows 7 installaton
Windows xp and windows 7 installatonWindows xp and windows 7 installaton
Windows xp and windows 7 installaton
 
2.4
2.42.4
2.4
 
Window xp
Window xpWindow xp
Window xp
 
Install window xp
Install window xpInstall window xp
Install window xp
 
itft_Installing windows 2003
itft_Installing windows 2003 itft_Installing windows 2003
itft_Installing windows 2003
 
COMPUTER REFORMATTING COT.pptx
COMPUTER REFORMATTING COT.pptxCOMPUTER REFORMATTING COT.pptx
COMPUTER REFORMATTING COT.pptx
 
Install window xp
Install window xpInstall window xp
Install window xp
 
Foit lab manual
Foit lab manualFoit lab manual
Foit lab manual
 
Format, Partition, Install OS
Format, Partition, Install OSFormat, Partition, Install OS
Format, Partition, Install OS
 
Installation of windows xp
Installation of windows xpInstallation of windows xp
Installation of windows xp
 
Computer repair Services in newburgh
Computer repair Services in newburgh Computer repair Services in newburgh
Computer repair Services in newburgh
 
12705 installing xp (2)
12705 installing xp (2)12705 installing xp (2)
12705 installing xp (2)
 
Windows XP
Windows XPWindows XP
Windows XP
 
Technical interview questions & answer for it support team
Technical interview questions & answer for it support teamTechnical interview questions & answer for it support team
Technical interview questions & answer for it support team
 
Windows 7
Windows 7Windows 7
Windows 7
 
IT Workshop PC-HARDWARE Week3
IT Workshop PC-HARDWARE Week3IT Workshop PC-HARDWARE Week3
IT Workshop PC-HARDWARE Week3
 
Boss components
Boss componentsBoss components
Boss components
 
2nd lesson installing operating system
2nd lesson installing operating system2nd lesson installing operating system
2nd lesson installing operating system
 

Mais de Adolfo Nasol

Drupal debugging tips
Drupal debugging tipsDrupal debugging tips
Drupal debugging tipsAdolfo Nasol
 
Mysql cheatsheet - Part 2
Mysql cheatsheet - Part 2Mysql cheatsheet - Part 2
Mysql cheatsheet - Part 2Adolfo Nasol
 
Managing drupal views in code
Managing drupal views in codeManaging drupal views in code
Managing drupal views in codeAdolfo Nasol
 
Event Registration System Part 2
Event Registration System Part 2Event Registration System Part 2
Event Registration System Part 2Adolfo Nasol
 
Events Registration System Part 1
Events Registration System Part 1Events Registration System Part 1
Events Registration System Part 1Adolfo Nasol
 
Installing mandriva linux mandriva community wiki
Installing mandriva linux   mandriva community wikiInstalling mandriva linux   mandriva community wiki
Installing mandriva linux mandriva community wikiAdolfo Nasol
 
Drush for drupal website builder
Drush for drupal website builderDrush for drupal website builder
Drush for drupal website builderAdolfo Nasol
 
Converting (X)HTML/CSS template to Drupal 7 Theme
Converting (X)HTML/CSS template to Drupal 7 ThemeConverting (X)HTML/CSS template to Drupal 7 Theme
Converting (X)HTML/CSS template to Drupal 7 ThemeAdolfo Nasol
 
Creating Drupal 7 subtheme
Creating Drupal 7 subthemeCreating Drupal 7 subtheme
Creating Drupal 7 subthemeAdolfo Nasol
 

Mais de Adolfo Nasol (12)

Drupal debugging tips
Drupal debugging tipsDrupal debugging tips
Drupal debugging tips
 
Mysql cheatsheet - Part 2
Mysql cheatsheet - Part 2Mysql cheatsheet - Part 2
Mysql cheatsheet - Part 2
 
Mysql cheatsheet
Mysql cheatsheetMysql cheatsheet
Mysql cheatsheet
 
Managing drupal views in code
Managing drupal views in codeManaging drupal views in code
Managing drupal views in code
 
Event Registration System Part 2
Event Registration System Part 2Event Registration System Part 2
Event Registration System Part 2
 
Events Registration System Part 1
Events Registration System Part 1Events Registration System Part 1
Events Registration System Part 1
 
Installing mandriva linux mandriva community wiki
Installing mandriva linux   mandriva community wikiInstalling mandriva linux   mandriva community wiki
Installing mandriva linux mandriva community wiki
 
Drush for drupal website builder
Drush for drupal website builderDrush for drupal website builder
Drush for drupal website builder
 
Converting (X)HTML/CSS template to Drupal 7 Theme
Converting (X)HTML/CSS template to Drupal 7 ThemeConverting (X)HTML/CSS template to Drupal 7 Theme
Converting (X)HTML/CSS template to Drupal 7 Theme
 
Research methods
Research methodsResearch methods
Research methods
 
Personality
PersonalityPersonality
Personality
 
Creating Drupal 7 subtheme
Creating Drupal 7 subthemeCreating Drupal 7 subtheme
Creating Drupal 7 subtheme
 

Último

React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 

Último (20)

React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 

Operating System Concepts : Reports

  • 1.
  • 2. Peer to peer connection
  • 5.
  • 6. It was first released in August 2001
  • 7. It was the most popular versions of Windows, based on installed user based.
  • 8.
  • 9. Windows XP is the successor to both Windows 2000 and Windows ME
  • 10. The most common edition were Windows XP Home edition for home users and Windows XP Professional which support Windows server domain and two physical processors.
  • 11.
  • 12. 64 Megabytes (MB) of RAM
  • 13. 1.5 Gigabytes of available space on hard disk
  • 14. CD Rom or DVD Rom drive
  • 15.
  • 16.
  • 17. Locate your Windows XP product key.
  • 18.
  • 19.
  • 20.
  • 21. Insert your Windows XP CD into your computer CD Rom and restart.
  • 22. If prompted to boot from the CD, press any key on your keyboard or just press on the spacebar key.
  • 23. If you miss the prompt as it only appearsin few seconds, restart and try again.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29. When the Monitor Settings dialog box appears, click OK.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36. Peer to peer connection - The computers in a workgroup are considered peers because they are all equal and share resources among each other. - Each user decides which data on his or her computer will be shared with the network. By sharing common resources, users can print from a single printer, access information in shared folders, and work on a single file without transferring it to a floppy disk.
  • 37. Peer to peer connection - A home or small office network is like a telephone system. On a network, each computer has a network adapter that acts like a phone handset: just as you use a handset for talking and listening, the computer uses the network device to send and receive information to and from other computers on the network.
  • 38.
  • 39. Share one Internet connection with all of the computers on the network.
  • 40.
  • 41. Peer to peer connection - The typical computing model for many applications is a client/server model. A server computer typically has vast resources and responds to requests for resources and data from client computers. Client computers initiate requests for resources or data from server computers. A good example of the client/server model of computing is Web browsing.
  • 42. Peer to peer connection - Web servers on the Internet are typically high-end dedicated server computers with very fast processors (or multiple processors) and huge hard disk arrays. The Web server stores all of the content associated with a Web site (HTML files, graphics, audio and video files, etc.) and listens for incoming requests to view the information on a particular Web page. When a page is requested, the Web server sends the page and its associated files to the requesting client.
  • 43. Peer to peer connection - Peer-to-peer networking has the following advantages over client/server networking: 1. Content and resources can be shared from both the center and the edge of the network. In client/server networking, content and resources are typically shared from only the center of the network. 2. A network of peers is easily scaled and more reliable than a single server. A single server is subject to a single point of failure or can be a bottleneck in times of high network utilization.
  • 44. Peer to peer connection 3. A network of peers can share its processor, consolidating computing resources for distributed computing tasks, rather than relying on a single computer, such as a supercomputer. 4. Shared resources of peer computers can be directly accessed. Rather than sharing a file stored on a central server, a peer can share the file directly from its local storage.
  • 45. Peer to peer connection - Peer-to-peer networking solves the following problems: 1. Allows the processing resources of edge computers to be utilized for distributed computing tasks. 2. Allows local resources to be shared directly, without the need for intermediate servers. 3. Allows efficient multipoint communication without having to rely on IP multicast infrastructure.
  • 46. Peer to peer networking scenarios - Peer-to-peer networking enables or enhances the following scenarios: 1. Real-time communications (RTC). 2. Collaboration 3. Content distribution 4. Distributed processing 5. Improved Internet technologies
  • 47. Real-Time Communications - For RTC, peer-to-peer networking enables server less instant messaging and real-time matchmaking and game play. 1. Server less instant messaging : Computer users can chat and have voice or video conversations with their peers today. However, many of the existing programs and their communications protocols rely on servers to function. If you are participating in an ad-hoc wireless network or are a part of an isolated network, you are unable to use these RTC facilities. Peer-to-peer technology allows the extension of RTC technologies to these additional networking environments.
  • 48. Real-Time Communications 2. Real-time matchmaking and game play: Similar to RTC, real-time game play exists today. There are many Web-based game sites that cater to the gaming community via the Internet. They offer the ability to find other gamers with similar interests and play a game together. The problem is that the game sites exist only on the Internet and are geared toward the avid gamer who wants to play against the best gamers in the world.
  • 49. Real-Time Communications These sites track and provide the statistics to help in the process. However, these sites do not allow a gamer to set up an ad-hoc game among friends in a variety of networking environments. Peer-to-peer networking can provide this capability.
  • 50. Collaboration - Peer-to-peer networking allows the sharing of a workspace, files, and experiences. 1. Project workspaces solving a goal: Shared workspace applications allow for the creation of ad-hoc workgroups and then allow the workgroup owners to populate the shared workspace with the tools and content that will allow the group to solve a problem. This could include message boards, productivity tools, and files.
  • 51. Collaboration 2. Sharing your files with other people: A subset of project workspace sharing is the ability to share files. Although this ability exists today with the current version of Windows, it can be enhanced through peer-to-peer networking to make file content available in an easy and friendly way. Allowing easy access to the incredible wealth of content at the edge of the Internet or in ad-hoc computing environments increases the value of network computing.
  • 52. Content Distribution - Peer-to-peer networking allows the distribution of text, audio, and video and software product updates.
  • 53. Distributed Processing - Peer-to-peer networking allows computing tasks to be distributed and processor resources to be aggregated. A large computing task can first be divided into separate smaller computing tasks well suited to the computing resources of a peer. A peer could do the dividing of the large computing task. Then, peer-to-peer networking can distribute the individual tasks to the separate peers in the group. Each peer performs its computing task and reports its result back to a centralized accumulation point.
  • 54. Improved Internet Technologies Peer-to-peer networking can also provide an improved utilization of the Internet and support new Internet technologies. Historically, the Internet was designed so that network peers can have end-to-end connectivity. The modern-day Internet, however, more closely resembles a client/server environment where communication in many cases is not end-to-end due to the prevalence of Network Address Translators (NATs).
  • 55. Example of Peer to Peer connection w/o central infrastructure
  • 56. Peer to Peer connection using X graph
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65.
  • 66.
  • 67. The icon for the shared folder appears with a picture of a hand.
  • 68. To access the shared folder, click Start, click My Computer, and then click My Network Places.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74. If you are using Classic view in Control Panel, double-click Printers and Faxes.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81. Remove the check mark on the second option
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87. Ad hoc networking – means “for or concerned with one specific purpose”. In networking, the computer to computer direct networking is called ad hoc.
  • 88. NAT - Network Address Translation is a process of modifying network address information in datagram ( IP ) packet headers while in transit acrossa traffic routing device for the purpose of re-mapping one IP address space into another.
  • 89.
  • 90. IPV4 – Internet Protocol Version 4 is the first major version of IP.
  • 91. IPV6 – Internet Protocol Version 6 is the successor of IPV4 and is in active growing Deployment worldwide.
  • 92.
  • 93.

Notas do Editor

  1. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  2. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  3. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  4. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  5. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  6. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  7. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  8. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  9. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  10. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  11. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  12. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  13. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  14. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  15. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  16. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  17. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  18. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  19. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  20. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  21. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  22. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  23. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  24. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  25. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  26. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  27. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  28. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  29. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  30. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  31. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  32. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  33. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  34. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  35. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  36. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  37. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  38. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  39. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  40. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  41. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  42. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  43. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  44. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  45. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  46. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  47. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  48. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  49. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  50. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  51. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  52. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  53. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  54. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  55. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  56. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  57. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  58. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  59. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  60. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  61. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  62. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  63. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  64. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  65. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  66. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  67. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  68. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  69. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  70. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  71. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  72. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  73. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  74. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  75. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  76. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  77. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  78. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  79. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  80. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  81. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  82. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  83. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  84. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  85. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  86. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  87. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  88. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  89. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  90. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  91. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  92. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  93. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  94. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  95. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  96. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  97. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  98. Group 3 Reports for Operating System Concepts : ICT-TR2A1
  99. Group 3 Reports for Operating System Concepts : ICT-TR2A1