Escolar Documentos
Profissional Documentos
Cultura Documentos
Course Description 2
Topic 1: Introduction To Operating System 3
Tutorial Activity 1-1 3
Tutorial Activity 1-2 7
Topic 2: Memory And Process Management 10
Tutorial Activity 2-1 10
Tutorial Activity 2-2 13
Tutorial Activity 3-1 16
Tutorial Activity 3-2 19
Tutorial Activity 3-3 22
Tutorial Activity 4 26
Topic 3: File Management 29
Tutorial Activity 5 29
Topic 4: Windows Operating System 36
Lab. Activity 1 36
Lab. Activity 2 49
Lab. Activity 3 64
Lab. Activity 4 69
Lab Exercises 73
COURSE DESCRIPTION
CREDIT(S) : 3
PRE-REQUISITE(S) :
SYNOPSIS
LEARNING OUTCOMES
Activity 1A
i. __________________________________________________________________________
ii. __________________________________________________________________________
iii. __________________________________________________________________________
iv. __________________________________________________________________________
v. __________________________________________________________________________
Activity 1B
i) Monolithic:
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
ii) Layered:
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
iii) Microkernel:
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
iv) Networked/distributed:
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
Monolithic Microkernel
|Figure 1: Monolithic Kernel base Operating Figure 2: MicroKernel base Operating System
System.
b) Referring to the diagram above , what are the differences between Monolithic and Microkernel?
(10 Marks)
Monolithic Microkernel
Activity 1C
Activity outcome : The various architecture of operating systems used in different platforms.
i) Single-processor systems
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
ii) Multiprocessor systems
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
Activity 1D
Activity outcome : The various product of operating system.
a) What are the differences between Closed Source system and Open Source System.
(10 Marks)
Activity 1E
Activity Outcome: Describe the following concepts in relation to operating system: Multitasking,
Multiprogramming, time sharing, buffering, spooling, caching.
Activity 1F
Activity Outcome: Describe the following concepts in relation to operating system: Multitasking,
Multiprogramming, time sharing, buffering, spooling, caching.
Instruction: Match all the given concepts with the correct definitions:
Concepts Definitions
Multitasking The sharing of a computing resource among
many users by means of multiprogramming
and multi-tasking.
Multiprogramming Send data that is intended for printing or
processing on a peripheral device to an
intermediate store
Time sharing The concept of loading many programs at one
time to share a single CPU.
Buffering Is a process where a part of RAM used for
temporary storage of data that is waiting to be
sent to a device;
when transferring data between devices or
programs operating at different speeds
Spooling The ability of a computer system to time share
it’s (at least one) CPU with more than one
program at once.
Caching Is a process where the component
transparently stores data so that future
requests for that data can be served faster.
Activity 1G
Activity Outcome: Describe the components of operating system: Kernel, Shell and File system.
Activity 1H
Activity Outcome: Describe the interaction by using graphical representation between applications
and the operating system using Application Programming Interfaces (API).
Instruction: Describe by using graphical representation the interaction between application and the
operating system. Label the diagram.
Activity 1I
Activity Outcome: Identify the different interfaces of operating systems: Command line, voice
actuated, graphical user interface (GUI) and web form.
Operating system
How it works? Example
Interfaces
a) Command line
b) Voice actuated
c) Graphical User
Interface
d) Web Form
Activity 1J
Activity 2A
Activity outcome : Understanding of memory hierarchy
Instruction: Complete the diagram below with the correct memory type.
Memory Hierarchy
Activity 2B
Memory management strategies can be divided into: Fetch, Placement, and Replacement.
Meanwhile, placement strategy can be further divided into: Best-fit, First-fit and Worst-fit.
Instruction: Complete the table below with the correct placement type (Best-fit, First-fit or Worst-fit).
Activity 2C
Activity outcome : Understanding of resident and transient routines.
The operating system is a collection of software routines. Routines are submodules of a program, or
simply, functions in a program. An example of routine is the ones that control physical I/O. Software
routines can be categorized into resident and transient routines.
Instruction: Fill in the following table with the differences between resident and transient routines.
PARAMETER RESIDENT TRANSIENT
Brief definition
Storage area
Usage frequency
Example
Activity 2D
Instruction: In the following diagram, fill in the blanks with the correct answer.
Process A enters the main Process B is waiting for Process B has higher
memory for execution execution since the main priority since it must be
memory is full executed the soonest
Activity 2E
Activity outcome : Understanding of segmentation.
Instruction: Fill in the blank boxes in the following diagram with the correct answer.
Activity 2F
Activity outcome : Understanding of paging.
Instruction: Fill in the blank boxes in the following diagram with the correct answer.
Paging is another memory-management scheme. However, paging avoids external fragmentation and
the need for compaction, whereas segmentation does not. The basic method for implementing paging
involves breaking physical memory into fixed-sized blocks called frames and breaking logical memory
into blocks of the same size called pages. Every address generated by the CPU is divided into two
parts: a page number (p) and a page offset (d). The page number is used as an index into a page
table.
TUTORIAL ACTIVITY 3-1
TUTORIAL ACTIVITY : 3 (2.2.1 - 2.2.3)
CLO : CLO 1 – explain the concept of operating system, memory, process
and file management. (C2, PLO1)
CLO 3 – produce an accurate solution to solve the problem of
memory, process and file management. (A3, C3, PLO4, PLO1)
DURATION : 2 HOURS
Activity 3A
Activity Outcome: explain the major system resource types within computer system.
Instruction: Choose the suitable answer for the system resources types below:
Activity 3B
Instruction: Using the process state diagram, fill in the appropriate terms according to the description
given below.
Activity outcome: Different operating systems have different life cycles for the processes but a very
general life cycle model is given below.
Ready => A process is to be ready when it can start executing the very next moment. Many times a
process may need some ______________ which is not available for that time. Processes which can
be ________________ to run at any time by a scheduler is said to be in ready state.
Running => The process which is currently being _____________by the processor is called the
running process. In an uniprocessor system there exist only one running process at a time.
Blocked => Blocked when it is waiting for some ______________to occur. Without its occurrence it
cannot continue. Such processes are not considered by the scheduler for scheduling.
TUTORIAL ACTIVITY 3-2
TUTORIAL ACTIVITY : 3 (2.2.4 – 2.2.8)
CLO : CLO 1 – explain the concept of operating system, memory, process
and file management. (C2, PLO1)
CLO 3 – produce an accurate solution to solve the problem of
memory, process and file management. (A3, C3, PLO4, PLO1)
DURATION : 2 HOURS
Activity 3D
Activity outcome: Define the purpose of CPU Scheduler.
b) Mid-term scheduler
c) Long-term scheduler
Activity 3E
Activity outcome: Certain scheduling algorithms can be considered preemptive while others are
considered non-preemptive algorithms.
b. However a variation of the First-Come, First-Served scheduling does allow to preempt a process.
Name this scheduling algorithm and explain how it works.
Activity 3F
Table 1 shows the First In First Out scheduling algorithm. Answer the following
questions if the process arrives in order P3, P1, P2 and P4.
P1 4
P2 8
P3 2
P4 1
i. Draw the appropriate Gantt chart.
Activity 3G
Using a multilevel feedback queue, illustrate how the following three (3) queues will be scheduled.
Three queues:
a. Q0 – time quantum 8 milliseconds
b. Q1 – time quantum 16 milliseconds
c. Q2 – FCFS
TUTORIAL ACTIVITY 3-3
TUTORIAL ACTIVITY : 3 (2.2.9 – 2.2.14)
CLO : CLO 1 – explain the concept of operating system, memory, process
and file management. (C2, PLO1)
CLO 3 – produce an accurate solution to solve the problem of
memory, process and file management. (A3, C3, PLO4, PLO1)
DURATION : 2 HOURS
Activity 3H
Activity outcome: Draw scheduling algorithms and calculate average waiting time.
Table 2 shows the Round Robin scheduling algorithm. Answer the following questions based on
schedule time below. Round Robin quantum 20.
P1 0 110
P2 2 85
P3 4 70
P4 5 43
Table 2
Activity outcome: Draw scheduling algorithms and calculate average waiting time.
Table 3 shows the Shortest Job First algorithm. Answer the following questions based on schedule
time below.
P1 0 7
P2 2 4
P3 4 1
P4 5 4
Table 3
Activity outcome: Draw scheduling algorithms and calculate average waiting time.
Table 4 shows the Shortest Remaining Time First algorithm. Answer the following questions based
on schedule time below.
P1 0 7
P2 2 4
P3 4 1
P4 5 4
Table 4
Table 5 shows the Priority algorithm. The processes are assumed to give arrived in the order P1,
P2, P3 and P4 at all-time 0. Answer the following questions based on schedule time below. Assume
priority 0 is greater than 1. In case of any tie, use FCFS.
P1 7 2
P2 4 1
P3 1 0
P4 4 2
Table 5
Activity 3L
What advantage is there in having different time-quantum sizes at different levels of a multilevel
queuing system?
TUTORIAL ACTIVITY 4
TUTORIAL ACTIVITY : 4 (2.3.1 – 2.3.3)
CLO : CLO 1 – explain the concept of operating system, memory, process
and file management. (C2, PLO1)
DURATION : 2 HOURS
Activity 4A
Activity Outcome: Describe the definition of Deadlock.
1. For a computer science example, consider two processes A and B that each want to print a
file currently on tape.
a. A has obtained ownership of the printer and will release it after printing one file.
b. B has obtained ownership of the tape drive and will release it after reading one file.
c. A tries to get ownership of the tape drive, but is told to wait for B to release it.
d. B tries to get ownership of the printer, but is told to wait for A to release the printer.
e. Draw the deadlock of two processes A and B.
1. There are FOUR (4) Deadlock Conditions. Complete the following table with appropriate answer
to differentiate between each of them.
Deadlock
Description Examples
Conditions
Mutual Exclusion
Circular Wait
No Pre-emption
Activity 4C
1. From research on the Internet, describe the methods to handle the deadlock when occurs.
Prevention and
avoidance of deadlock
Allow deadlock, detect
deadlock and recover
deadlock
Ignore deadlock
TOPIC 3: FILE MANAGEMENT
TUTORIAL ACTIVITY 5
TUTORIAL ACTIVITY : 5 (3.1.1 – 3.2.3)
CLO : CLO 1 – explain the concept of operating system, memory, process
and file management. (C2, PLO1)
CLO 3 – produce an accurate solution to solve the problem of
memory, process and file management. (A3, C3, PLO4, PLO1)
DURATION : 2 HOURS
Activity 5A
Activity outcome: explain file management in operating system, describe file access techniques, and
describe various methods of file allocation.
i. ___________________________________________________________________
___________________________________________________________________
ii. ___________________________________________________________________
___________________________________________________________________
iii. ___________________________________________________________________
___________________________________________________________________
2. Describe 3 (THREE) of the following file access technique by your own words?
i. Sequential
ii. Direct
iii. Indexed
3. What is directory structure in file management?
i. Single-level directory
1. 1.
2. 2.
3. 3.
6. Based on the Table Directory 5.0 and Table Directory 5.1 below, draw a contiguous file
allocation.
Doc 3 7
Cpp 19 3
Jsl 36 2
Java 13 5
Html 25 9
Raw 2 5
Gif 33 3
Bmp 7 10
Png 18 1
Hdr 26 5
7. Show how file mapping using Linked Allocation based on Directory Table 5.2 and Directory Table
5.3 below.
i.
2
Fat32 22
End
File Start
NTFS 15 26
8. Show file mapping using Indexed File Allocation based on Directory Table 5.4 and Directory Table
5.5 below.
i.
File Index-Block
18
NTFS
Index-
File Block
7
NTFS
Activity 5B
Activity outcome: describe the Access Control Matrix approaches in protection problems and the
techniques used to prevent data loss.
1. Refer to Figure 5.6 below, please write the correct Access Control List?
Erni R R
Widya R/W -
Erinasari R R/W
Archive Military
Figure 5.6
2. Refer to Figure 5.7 below, draw the correct Capability List?
David -- bbb:R/W,
Figure ccc:R/W,
5.7 ddd:R
i. Physical Backup
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
___________________________________________________________________
TOPIC 4: WINDOWS OPERATING
SYSTEM
LAB. ACTIVITY 1
LABSHEET 1: INSTALL OPERATING SYSTEM, CHECK AND UPDATE DEVICE DRIVER
LABSHEET : 1 (4.1.1 – 4.1.4)
CLO : CLO 2 – perform installation of Operating System with appropriate
setting and management (P3, PLO2)
DURATION : 2 HOURS
Learning Outcomes:
By the end of the Lab, student should be able to:
THEORY
Video card drivers are important for all computers because they tell the operating system
(Windows 7) how to operate your video card. Updating your video card drivers is sometimes
required when one wants to run a game which demands a more up to date driver. It’s very
important to choose the right drivers for your video card otherwise your computer may crash . By
following this simple instruction you too can update your video card drivers.
Activity 1A
Activity outcome: This activity will guide students on how to install operating system.
This activity needs students to form groups for installing WINDOWS 7 in a computer.
Recommended Equipment
The following equipment is required for this exercise:
A computer with a blank hard disk drive.
Windows 7 installation DVD or USB flash drive.
Procedures:
1. Insert the Windows 7 installation DVD into the DVD-ROM drive or plug the USB flash drive into a
USB port.
2. When the system starts up, watch for the message “Press any key to boot from CD or DVD.”.
3. If the message appears, press any key on the keyboard to boot the system from the DVD. If the
press any key message does not appear, the computer automatically starts loading files from the
DVD.
4. The computer starts loading files from DVD or USB flash drive.
8. The Collecting information section of the installation begins. The ‘Setup is starting...’ screen
appears.
9. “Please read the license terms” screen appears. Read and confirm that you accept the license by
selecting the box “I accept the license terms”. Click Next.
10. The “Which type of installation do you want?” screen appears. Click Custom (advanced).
11. The “Where do you want to install Windows?” screen appears. Select the hard drive or partition on
which Windows 7 will be installed. Click Next to select “Disk 0 Unallocated Space”, which is the
default setting.
14. The “Windows needs to restart to continue” screen appears. Your computer will automatically
restart or you can click Restart now.
15. If you get the message “Press any key to boot from CD or DVD.”, do not press any key and
Windows will boot from the hard disk to continue the installation.
16. The “Setup is updating registry settings” message appears.
18. The “Installing Windows...” screen appears again. Windows may reboot a few more times. This
may take several minutes.
19. The Installing Windows section of the installation is completed.
20. The “Set Up Windows” section begins. Type the user name and computer name provided by your
instructor. Click Next.
21. The “Set a password for your account” screen appears. Type the password provided by your
instructor. Retype the password and enter the password hint. Click Next.
22. The “Type your Windows product key” screen appears. On this page, type your product key
as it appears on your Windows 7 DVD case. Click Next.
Note: If you entered your product key, Setup will not ask you the following:
23. “Do you want to enter your product key now?” screen appears. If you were instructed not to
enter a product key, click No.
24. On the “Help protect your computer and improve Windows automatically” screen, click Use
recommended settings.
25. On the “Review your time and date settings” screen, configure the computer clock to match
your local date, time, and time zone. Click Next.
26. The “Select your computer’s current location” screen appears. Select the option provided by
your instructor.
Note: This screen will not show up if the installation did not correctly install drivers for the network
card.
Activity outcome: This activity will guide students on how to check or update the computer driver. This
activity needs students to form group for checking or updating the VGA driver.
Procedures:
1. Press the start button and go to Control Panel. At the top right corner of the screen you
should see a "view by" selection. If it's not set to large icons, do so.
2. Click on “Device Manager”. In this menu you should see a section called "Display adapters"
click on it.
3. Now right click on the video card shown and select "Update Driver Software".
4. Then select Search automatically. If Windows 7 found a driver, restart your computer.
5. To update the drivers manually, write down the name of the video card from the "Device
manager" menu under "Display adapters".
6. Go to the manufacturer's website. Some of the main manufactures' websites are in the tips
section below.
7. Search for a Driver or Download section.
10. Run your download from the selected location and follow the on screen instructions.
Learning Outcome:
1. Manage data security by creating partition on hard disc and format the partition
2. Use the utilities program that compatible with Windows 7 (Anti-virus, Windows Firewall,
THEORY
Disk partitioning is the creation of separate divisions of a hard disk drive using partition editors. Once
a disk is divided into several partitions, directories and files of different categories may be stored in
different partitions.
Disk formatting is the process of preparing a hard disk or other storage medium for use with the file
system (FAT, NTFS, UFS, etc.) of an operating system. Formatting a drive (or partition) destroys the
computer's records of the data it contains, effectively deleting it. It's vital to make back-ups of
important data beforehand.
• Primary partition – This is usually the first partition. A primary partition cannot be subdivided
into smaller sections. There can be up to four partitions per hard drive.
• Active partition – This partition is used by the operating system to boot the computer. Only
one primary partition can be marked active.
• Extended partition – This partition normally uses the remaining free space on a hard drive or
takes the place of a primary partition. There can be only one extended partition per hard drive
and it can be subdivided into smaller sections called logical drives.
Activity 2A
Activity outcome: This activity will guide students on how to create partition for a hard disk.
Procedures:
3. Click Disk Management on the left side of the screen. Right-click the green-outlined block of
Free Space.
8. Type 500 in the Simple volume size in MB: field. Click Next.
9. The “Assign Drive Letter or Path” screen appears.
10. Click the Assign the following drive letter: radio button. Select J from the drop-down menu.
11. Click Next.
12. The “Format Partition” screen appears.
13. Click the Format this volume with the following settings: radio button. Select FAT32 from
the File system drop-down menu.
14. Click Next.
15. The “Completing the New Simple Volume Wizard” screen appears.
20. The Details area on the bottom of the Computer window displays information about the J: drive.
What is the File System? What is the value of Free Space shown?
21. Right-click the NEW VOLUME (J:) drive.
22. Click Properties. The “NEW VOLUME (J:) Properties” window appears.
23. Right-click anywhere in the white space of the window.Click New Text Document.
24. Type Test and press Enter.
25. Right-click the Test document in the window and choose Properties. The “Test Properties”
window appears.
26. Click Start. In the “Search programs and files” field, type cmd.
27. When the cmd program appears, right-click cmdRun as administrator. Click Yes if
prompted by User Account Control.
28. The “Administrator: C:\Windows\System32\cmd.exe” window appears. The convert
command changes the file system of a volume without losing data
29. Type convert J: /fs:NTFSpress the Enter key. You will be prompted to enter the current
volume label for drive J:. Type NEW VOLUME and press the Enter key.
30. After the drive is converted, type exit in the “Administrator: C:\Windows\System32\cmd.exe”
window, and then press Enter.
31. The “C:\Windows\System32\cmd.exe” window closes.
Activity 2B
Activity outcome: This activity will guide students on how to format the hard disk..
This activity needs student to form group for formatting the hard disk in a computer.
Procedures:
1. Open Computer Management by clicking the Startbutton , clicking Control Panel, clicking
System and Security, clicking Administrative Tools, and then double-clicking Computer
Management. If you're prompted for an administrator password or confirmation, type the
password or provide confirmation.
3. Right-click an unallocated region on your hard disk, and then click New Simple Volume.
5. Type the size of the volume you want to create in megabytes (MB) or accept the maximum default
size, and then click Next.
6. Accept the default drive letter or choose a different drive letter to identify the partition, and then
click Next.
7. In the Format Partition dialog box, do one of the following:
8. If you don't want to format the volume right now, click Do not format this volume, and then click
Next.
Activity 2C
Activity outcome: Use Windows Firewall, Windows Defender and User Account Control (UAC)
Procedures:
Activity 2D
Usually the setting are being managed by vendor application Antivirus (eg: McAfee, others)
LAB. ACTIVITY 3
Learning Outcome:
1. Configuring Windows 7 operating system by using System Tool (Disk error checking, create Virtual
memory)
THEORY
System Tools
To maintain and optimize an operating system, you can access various tools within Windows. Some
of these tools include disk error checking, which can scan the hard drive for file structure errors, and
hard drive defragmentation, which can consolidate files for faster access.
Activity 3A
The Windows operating system uses CHKDSK from within the GUI or at the command line to detect
and repair disk errors.
To check a drive for errors using the GUI, follow these steps:
NOTE: The Scan for and attempt recovery of bad sectors option will automatically fix file system
errors as well as check the disk for bad sectors and recover any data from sectors that are found to
be bad. Any data that is recovered is saved to files in the root directory of the disk.
The CLI version of the utility has four options to check a drive for errors:
CHKDSK makes multiple passes over the disk, checking for specific criteria:
Phase 1: Checking Files – CHKDSK examines each file record in the Master File Table (MFT) for
consistency. By the end of this phase, used and available space on the volume have been identified.
Phase 2: Checking Indexes – CHKDSK examines the MFT to ensure that every file and
directory is referenced by at least one entry. Finally, CHKDSK checks that the time stamps and file
sizes are correct in the directory listings.
Phase 3: Checking Security Descriptors – CHKDSK examines the security descriptors for file or
directory ownership information and NTFS permissions.
Phases 4 and 5: Checking Sectors – If the /r option is used, CHKDSK makes two more passes
looking for sectors that have physical damage.
Activity 3B
If you receive warnings that your virtual memory is low, you'll need to increase the minimum size of
your paging file. Windows sets the initial minimum size of the paging file equal to the amount of
random access memory (RAM) installed on your computer, and the maximum size equal to three
times the amount of RAM installed on your computer. If you see warnings at these recommended
levels, then increase the minimum and maximum sizes.
1. Open System by clicking the Start button , right-clicking Computer, and then
clicking Properties.
2. In the left pane, click Advanced system settings. If you're prompted for an administrator
password or confirmation, type the password or provide confirmation.
4. Click the Advanced tab, and then, under Virtual memory, click Change.
5. Clear the Automatically manage paging file size for all drives check box.
6. Under Drive [Volume Label], click the drive that contains the paging file you want to change.
7. Click Custom size, type a new size in megabytes in the Initial size (MB) or Maximum size
(MB) box, click Set, and then click OK.
Activity 3C
THEORY
A data backup stores a copy of the information on a computer to removable backup media that can be
kept in a safe place. If the computer hardware fails, the data can be restored from the backup to
functional hardware.
Data backups should be performed on a regular basis. The most current data backup is usually stored
offsite to protect the backup media if anything happens to the main facility. Backup media is often
reused to save on media costs.
The Windows 7 backup files have the extension .zip. Backup data is automatically compressed, and
each file has a maximum compressed size of 200 MB. A Windows 7 backup file can be saved to a
hard drive, any recordable media, or to another computer or server connected to your network. The
backup can only be created from an NTFS partition. The target hard drive must be either NTFS or
FAT formatted.
To start the Windows 7 Backup Files wizard for the first time, select:
To change the backup settings in Windows 7 after the Backup Files wizard has been completed,
select
The data backup media is just as important as the data on the computer. You should store the backup
media in a climate-controlled offsite storage facility with good physical security. The backups should
be readily available for access in case of an emergency.
LAB. ACTIVITY 4
Learning Outcome(s).
By the end of the Lab, student should be able to:
1. Maintaining Windows 7 operating system (clean Windows 7 by using various tools, eg: Disk Clean-
up, Disk Defragmenter, Windows Update and Windows Defender)
Activity 4A
To help optimize the files on the hard drive, Windows operating systems provide a defragmentation
utility. As files are accessed and stored on a hard drive, the files change from being contiguous on the
disk to being scattered across the disk. This can cause the operating system to slow down. The hard
drive has to search several areas on the hard drive platter to find the entire file. For one file, the effect
of the process is minimal. When this occurs for thousands of files, however, the process will physically
slow down the reading and writing of a file to a hard drive.
4. Click Defragment Now button to optimize the files on the hard drive.
5. To determine if the disk needs to be defragmented or not, click Analyze disk. If you're
prompted for an administrator password or confirmation, type the password or provide
confirmation.
6. Once Windows is finished analyzing the disk, you can check the percentage of fragmentation on
the disk in the Last Run column. If the number is above 10%, you should defragment the disk.
7. Click Defragment disk. If you're prompted for an administrator password or confirmation, type
the password or provide confirmation.
8. Disk Defragmenter might take from several minutes to a few hours to finish, depending on the
size and degree of fragmentation of your hard disk. You can still use your computer during the
defragmentation process.
Activity 4B
Activity outcome: Disk Clean-up
If you want to reduce the number of unnecessary files on your hard disk to free up disk space and
help your computer run faster, use Disk Cleanup. It removes temporary files, empties the Recycle Bin,
and removes a variety of system files and other items that you no longer need. For more information
about deleting files from the Recycle Bin.
2. In the search box, type Disk Cleanup, and then, in the list of results, click Disk Cleanup.
3. In the Drives list, click the hard disk drive that you want to clean up, and then click OK.
4. In the Disk Cleanup dialog box, on the Disk Cleanup tab, select the check boxes for the file
types that you want to delete, and then click OK.
3. Install any of various Operating System (except Windows 7) using VMWare. Write the steps to
install the OS (use print screen to get the diagram). (10 Marks)