Nt1310 Unit 1 Lab 2 Essay

Superior Essays
Objective As future computer professionals, students of CIT 17600 need a basic understanding of the location and abilities of a variety of tools on Microsoft environments. The Windows Lab 2 was designed to provide a glimpse into these tools. The Microsoft environment that was researched was Windows 7.
Discussion
Throughout the lab, we were directed to various areas of the Windows environment.
Right-Click
As one of the most basic tools within Windows, right-clicking on an item is probably the fastest way to access content pertaining to the item clicked. Virtually any clickable item within Windows will also have a right-click option.
Control Panel The control panel is the go to place for Windows environment if you want to alter any
…show more content…
On Windows 7 there are thirteen different tools available. The uses and specifics of these tools will be discussed in the results section.
Microsoft Management Console The Microsoft Management Console, MMC for short, is a customizable launch pad for computer technicians. MMC allows technicians to add any utilities they wish via snap-ins and can save their consoles for future reference.
Administrative Tools True to Windows characteristics, administrative tools provides another way to access tools that may be also located elsewhere. The difference with this area is that as the name would suggested is that the tools located here are aimed towards users that have administrative access, whereas other areas like Control Panel are used by all users. The services and their specifics located in Administrative Tools will be discussed in the results section.
Action Center The action center in Windows environments is the go to applet if something has gone awry with the computer system. The action center provides the status for a variety of important features of the computer. It specifically targets issues that has to do with Security and Maintenance.

Related Documents

  • Decent Essays

    Nt1310 Unit 2 Essay

    • 368 Words
    • 2 Pages

    1. Rack and wall mountable connector housings shall accept an interchangeable connector panel. An adapter panel is defined as a modular removable plate containing optical fiber connector adapters. 2.…

    • 368 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    1. Name two creatures that have been discovered since you were born. Titi Monkey and Dumbo Octopus have been discovered since I was born. 2. How tall would a redwood be compared to you right now?…

    • 317 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    I chose to change the inclination to a 75-degree angle for the third lab assignment. If I were a bird researcher studying a population of birds and the earth began to shift to a 75-degree inclination, the biggest change would be a rise in temperature at the latitude marked with the white “X”. At the original 35-degree inclination, the average temps for early spring are mild and as the months continue into summer; the average daily temperatures do not go above what is described as mild and a half. If a gradual shift began towards a 75-degree inclination, you would begin to see a rise in the temperatures for this region. In the early spring, you might still find mild temperatures but as the spring progresses into summer, the temperatures…

    • 389 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Policy-based management: SQL server has a feature called policy-based management which is used to define and also implement policies in SQL server. It is used if we want to apply any policy against a table or database and then checks whether the database or table satisfies with the given policy. If target database objects are not satisfied with the policies then either a trigger should be fired or we can enforce it so that an administrator will come to know that there is some policy violation. It will manage one or more instances of SQL server.…

    • 391 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Introduction The current information technology (IT) infrastructure consists of a mix of 2008 and 2008 R2 servers, with two legacy Windows 2000 servers, and four Windows Server 2012. In addition to the Windows server environment, the network consists of routers, switches, and security appliances, such as firewalls. The environment also consists of important services to ensure the security, and stability of the network.…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Decent Essays

    The Notorious B When you walk past the toy aisle at a store what do you see? Usually there are aisles that you look down and see nothing but a sea of pink. Why is this? Why do certain products lean toward certain genders? Companies often do this to target a certain audience and increase sales.…

    • 386 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Nt1330 Unit 1 Term Paper

    • 455 Words
    • 2 Pages

    5.2.3Direct Access DirectAccess is new to the Windows 7 operating systems. DirectAccess enables a remote user to work on their corporate network when they are away from the office without the need of a VPN. As long as the remote user is connected to the Internet, DirectAccess will automatically connect the remote user to the corporate network without the need of any user intervention.…

    • 455 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Nt1330 Unit 3 Assignment 1

    • 1006 Words
    • 5 Pages

    Create new scope of server, Assign scope name and description. Now define a range of IP address, start and end date Now use any excusive address that is server IP address Now select lease duration, now configure DHCP [3] options now Insert router IP address which is 192.168.1.1 in my case, press next---> Next--->activate scope now--->then finish 5) Roaming Profile [4]: For creating of centrally profile [4] of all domain users’ roaming profile [4] is use. In roaming profile we simply share and folder and assign it to all authorized domain user.…

    • 1006 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 1123 Words
    • 5 Pages

    It displays the controls and the websites using a simple-to-use, graphical user…

    • 1123 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 6 Term Paper

    • 620 Words
    • 3 Pages

    1. Structural ex ante constrains on the agencies that prevent deviations before they occur “The most effective means for achieving policy stability are constraints on the flexibility of agencies, rather than reliance on rewards, punishments, and oversight.” Enfranchising the constituents of presidents and congress through administrative structure and process, we can constrain the bureaucrats. We should clarify each political player’s responsibility and right by regulations and laws with negotiation and bargain.…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    ASSIGNMENT QUESTIONS: 1. What is the regulation or law that you would propose? Be very specific in the wording. (This will be your own idea and written in your own words). (20 points) Answer:…

    • 672 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Securing your Macintosh(Mac) OS computer Apple producing their computers with a lot of security features already in them. Mac OS X is one of the most secure operating systems in the market. Still a lot of people make mistakes while using their computers on their daily bases. These mistakes can notably weaken the security of their operation system. To be sure that you computer secure we will consider how to secure your user account, your web browsing, and we will maximize the privacy.…

    • 867 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Nt1330 Final Exam Paper

    • 233 Words
    • 1 Pages

    21 Which operating system doesn't support networking between computers? a. Windows 3.1 b. Windows 95 c. Windows 2000 d. Windows NT 22Which Operating System doesn't support networking between computers? a. Windows 3.1 b. Windows 95 c. Windows 2000 d. Windows NT 23…

    • 233 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    NT1410 Module 5 Exercise 1 Securing Desktop & Mobile Operating Systems Sierra Baltins Friday Whether or not a person uses a desktop or mobile operating system, there are forms of protection available. There are several operating systems that offer protection to the user, but some operating systems are more vulnerable than others. Mobile devices may automatically provide the user with different security systems than the desktop can offer. Either way, these security systems are designed to stop cyber-attacks.…

    • 635 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Turning Point of Central California (TPOCC/Turning Point) is a nonprofit organization that is based out of Visalia CA, in the Central Valley. Turning Point’s abbreviated mission statement is to server people in need, and their full mission statement is “to provide public benefit through helping people develop skills, motivation, and resources to become productive members of society; healthy in body, mind, and spirit.” With over 43 different locations fulfilling several community needs, Turning Point strives and succeeds in accomplishing their mission. The organization maintains and supports a multitude of programs at its various locations, each one serving a separate communal purpose.…

    • 448 Words
    • 2 Pages
    Improved Essays