You are on page 1of 11

1. What are the Roles and Responsibilities of System Administrator?

Write the steps for creating the


User account, setting permissions and protecting your files with password.
Short for “system administrator”, sysadmin are responsible for administration, management, and
support activities associated with the IT infrastructure at a multi-user organization.
Sysadmin role & responsibilities
The responsibilities of a sysadmin position could include any of the following:
1.User administration
The primary responsibility of a sysadmin is to support reliable and effective use of complex IT systems by
end users, whether internal employees or external customers. Activities range from managing identities and
access to providing dedicated technical support to individual users.
As sysadmin, you may be the first contact point within IT departments for users to resolve any tech-related
issue.
2. System maintenance
Sysadmins are responsible for dependable access and availability to IT systems. Sysadmins are therefore
required to troubleshoot and fix issues that compromise system performance or access to an IT service.
This responsibility also involves regular system improvements, such as upgrades based on evolving end-
user and business requirements.
Documentation
Sysadmins are required to maintain records of IT assets usage. To plan for future IT investments and
upgrades, you will document:
 End-user requests
 Business requirements
 IT issues
Documentation also underpins regulatory compliance.
3.System health monitoring
Most IT issues go unnoticed until the impact reaches end users. Sysadmins therefore monitor system health
and identify anomalous network behavior, which may include security-sensitive activities such as
unauthorized network access and data transfer.
Advanced technology solutions may be used to accomplish these tasks, supporting the wider IT Security
and Operations departments.
4. Backup & disaster recovery
Sysadmins implement data backup and disaster recovery strategies for different IT systems
and SDLC environments. You‟ll also facilitate end-users in accessing data that may have been deleted or
unavailable.
Activities may involve:
 Implementing automated software solutions
 Replacing hardware and software components
5. Application compatibility
Sysadmins support various IT teams to ensure that software systems and feature releases are compatible
with the IT infrastructure. For example, as sysadmin you may:
 Testing server load performance
 Install/upgrade hardware components
Web service administration & configurations
Sysadmins regularly perform web service administration and configuration management activities,
including ensuring that configuration changes are documented and follow organizational policies
associated with access and cybersecurity.
Configuration changes may be applied using automation and configuration management tools.
6. Network administration
To maintain network integrity, Sysadmins ensure that network interactions follow organizational policies
and protocols.
(A background in network engineering may be required to perform mission-critical network administration
activities.)
Security administration
Security responsibilities are centered on infrastructure and network security, with activities including:
 Network monitoring and analysis
 Identity and access management
 Maintaining security of hardware components
 Managing software licensing, updates, and patching
Sysadmins adopting these responsibilities tend to work closely with security specialists and engineers
within the organization as well as external consultants.
7. Database administration
Sysadmins may be responsible for maintaining the integrity, performance, and efficiency of database
systems. Database management activities may include migration, design, configuration, installation and
security of the organization‟s data assets. Sysadmins may act as liaison with users to address database
related issues, including backup and restoration activities.
8. Installation & patching
Sysadmins are responsible for managing, troubleshooting, licensing, and updating hardware and software
assets. You will ensure that appropriate measures are proactively followed in response to unforeseen issues
such as IT downtime or zero-day exploits. Then, you‟ll documented these activities and follow a strategic
approach, per organizational policy.
9. User training
Usually sysadmins communicate directly with end users to solve technical issues. Sometimes, you may
also conduct training programs to bring users up to pace with new software installations or IT system
changes.
These training programs may not pertain to specialized engineering tools, but the Web portal and
procedures required to access the corporate network and IT services.
Common skills for sysadmins
Sysadmin positions may not require engineering know-how, but a strong background in IT is necessary to
perform sysadmin duties. You‟ll also want to boast effective communication skills, both written and verbal.
Here are some common skills needed to be a successful sysadmin:
10. Subject matter expertise. Most organizations employ multiple individuals specializing in specific
system administration domains, so you‟ll want to be an expert in one or more of the following:
o Computer systems
o Networks
o Hardware and software troubleshooting
o Databases
o Web services
 Problem solving. You‟re often the first person called upon to deal with a problem, so
troubleshooting and understanding key systems are essential.
 Strong interpersonal and communication skills, both written and verbal, as you‟ll deal with
technically-minded employees and non-technical colleagues alike.
Understand user accounts and permissions
Windows requires at least one user account. You specify that account when you‟re completing the
installation processes, or the first time the computer starts after Windows has been installed. Windows
designates this first account as an administrator account so that the account can be used to manage the
computer. It isn‟t possible to sign on to the computer without a user account.
Here‟s a summary of the uses of those terms:
 A user is the person who is using the computer.
 A user account is an account that a person uses to sign in to a computer.
Each user account is either:
 A Microsoft account, which is any email address that has been registered with the Microsoft account
service
 A local account that exists only on a single computer and is not associated with a specific email address
Every user account is also classified as either:
 An Administrator account
 A Standard User account
This classification provides a specific level of permission to manage system actions on the computer. We
explain what each of these types of accounts can do in the next section of this topic.
A user account can also be one of the following:
 A Child account that is monitored by using Family Safety
 An Adult account that can manage Family Safety settings for Child accounts
User profiles
Windows provides the ability to share one computer among multiple users, or for one user to have multiple
accounts for different purposes. To do this, each user account (whether a Microsoft account or a local
account) is associated with a user profile that describes the way the computer environment (the user
interface) looks and operates for that user.
Each user profile includes a personal folder that is not generally accessible by other people who are using
the computer, in which you can store documents, pictures, media, and other files that you want to keep
private.
The Windows system of user profiles allows more than one person to use the same computer while
providing the following safeguards:
 Each user’s information is stored separately You prevent Standard Users from reading or altering your
documents, pictures, music, and other files by storing them in subfolders that are automatically set up
within your user account folder. For example, if you manage your family‟s financial records on a home
computer that your children use to do their homework, the children log in with separate accounts and don‟t
have access to confidential information or the ability to change your files. Administrators can access all
user accounts.
 Each user’s working environment is protected you can personalize your environment in various ways,
without worrying about other people making changes to your personal settings.
 Each user’s app usage is unique each user runs separate instances of each app on the computer. For
example, you can set up Outlook to connect to your accounts, and other computer users can set up Outlook
to connect to their accounts, but they cannot also connect to your accounts. Each user‟s data is stored and
managed separately.
User account permissions
The system actions that a user can perform are governed by the type of account he or she signs in with. An
administrator account has higher-level permissions than a standard user account, which means that an
administrator account owner can perform tasks on your computer that a standard user account owner
cannot.
Standard user account credentials allow a user to do things that affect only his or her accounts, including:
 Change or remove the password.
 Change the user account picture.
 Change the theme and desktop settings.
 View files stored in his or her personal folders and files in the Public folders.
Administrator account credentials are necessary to do things such as:
 Create, change, and delete accounts.
 Change settings that affect all of the computer‟s users.
 Change security-related settings.
 Install and remove apps.
 Access system files and files in other user account profiles.
Tasks that require administrator permission are indicated in windows and dialog boxes by a Windows
security icon.

Understand user accounts and permissions


Create and manage user accounts
1. Create a local user account with the name Ssdc that is not part of your family group.
2. Disable the account and verify that it no longer appears in the Family & Other Accounts settings pane.
3. Activate the built-in Guest account.
4. Enable the Ssdc account for use in the next practice task.
5. Verify that the Ssdc and Guest accounts appear in the Family & Other Accounts settings pane.
6. Check the permissions for the Ssdc account, and make sure that it is a Standard User account.
Manage account pictures and passwords
Perform the following tasks:
1. From the user account menu at the top of the Start menu, switch to the Ssdc account, and sign in to the
computer.
2. Open the Settings window, click Accounts, and then click Your account to display Duke‟s account
information.
3. Add an account picture to Duke‟s account. Choose one of the Account pictures in the practice files folder.
4. Add a password to ssdc‟s account.
5. Lock the computer, and sign in as ssdc, using the password.
Customize your sign-in options
Perform the following tasks:
1. Sign in using the Ssdc account you created in the preceding task, or if you want to configure your own
sign-in options, sign in using your account.
2. Open the Settings window, click Accounts, and then click Sign-in options to display the sign-in options
that are available for the account.
3. Create a PIN that you can use instead of the current password to sign in to the computer.
4. Lock the computer.
5. Dismiss the lock screen, and then sign in by using the PIN.
6. If your computer has a biometric identification system that is compatible with Windows Hello, create a
Windows Hello sign-in authentication. Then lock the computer, dismiss the lock screen, and sign in by
using Windows Hello.
7. Create a picture password that you can use to sign in to the computer. Use one of the Password pictures in
the practice file folder.
8. Lock the computer.
9. Dismiss the lock screen. On the Welcome screen, click the Sign-in options link and notice the icons that
represent the available authentication methods.
10. Sign in by using the picture password. If you want to, change the picture password to use a picture of your
own.
11. Display the Sync your settings pane. Review the elements that you can synchronize among computers and
consider which of these would be useful or not useful. (If you‟re signed in as Duke, you won‟t be able to
modify the sync settings because it is a local account.)
12. If you have a Microsoft account and want to modify the sync settings for that account, sign in using your
own account, return to the Sync your settings pane, and modify the settings to fit your needs.
13. ______________________________________________________________________
2. Write the steps for disk partitioning and perform operations like shrinking, extending, deleting
and formatting.
ANS:
Disk Management is a built-in tool which Windows provides, it allows you to create a hard disk partition,
or shrink the existing hard disk to create new unallocated space that can be used for a new partition.
Note: If you would like to do disk partition or shrink, we recommend that you should back up your
personal files first to prevent data lost.
Windows 10 operating system
Create a new partition
If you have a new disk or there is an unallocated disk, you are able to create the new partition by the
following steps.
1. Type and search [Computer Management] in the Windows search bar①, then click [Run as
administrator]②.

2. In Computer Management, select [Disk Management]③.

3. In Disk Management, right-click an unallocated region on your hard disk④, then select [New Simple
Volume]⑤.

4. In New Simple Volume Wizard, select [Next]⑥.

5. Enter the size of the volume you want to create or accept the maximum default size⑦, then
select [Next]⑧. If the size of the volume you create does not reach the maximum default size, the
remaining space will still be the unallocated region.

6. Select a drive letter or accept the default drive letter to identify the new partition⑨, then select [Next]⑩.

7. To format the volume with the default settings, you also can customize the volume label⑪, and then
select [Next]⑫.

8. The new simple volume creation is completed, confirm the following settings you set up, and then
select [Finish]⑬.

9. You can find the new volume that has been created in Disk Management. If there is the remaining space, it
will still be the unallocated region, and then the unallocated region that can be created as another
partition⑭.

Shrink the existing volume


Shrink Volume allows you to create a new disk space from the existing disk and it will be an unallocated
region. If you discover that you need an additional partition but do not have additional disks, you can refer
to the following steps to create it.
Note: If the existing partition contains data, to shrink the partition might destroy the data. We recommend
that you should back up data before shrinking the partition.
1. Type and search [Computer Management] in the Windows search bar①, then click [Run as
administrator]②.

2. In Computer Management, select [Disk Management]③.

3. In Disk Management, right-click the existing volume you want an additional partition④, then
select [Shrink Volume]⑤.

4. Shrink volume will automatically calculate the maximum space that you can shrink, you also can enter the
size you want to shrink⑥, and then select [Shrink]⑦.

5. After the shrink is completed, an unallocated region will be created in Disk Management, and then you can
use the unallocated region to create a new partition⑧.

Extend the existing volume


Extend Volume allows you to add space to an existing volume, extending it into empty space on the drive,
but only if the empty space doesn‟t have a volume on it and comes immediately after the volume you want
to extend, with no other volumes in-between, as shown in the following image.

1. Type and search [Computer Management] in the Windows search bar①, then click [Run as
administrator]②.

2. In Computer Management, select [Disk Management]③.

3. In Disk Management, right-click the existing volume you want to extend④, then select [Extend
Volume]⑤.
If there is no unallocated space, but you want to extend the existing volume, you are able to delete a
separate volume, and then it will become unallocated space. However, only if the deleted volume comes
immediately after the volume you want to extend, with no other volumes in-between.
Note: The data on it will be deleted if you delete an existing volume, please back up your files first.

4. In Extend Volume Wizard, select [Next]⑥.

5. Enter the size of the volume you want to extend or accept the maximum default size⑦, and then
select [Next]⑧. If the size of the volume you extend does not reach the maximum default size, the
remaining space will still be the unallocated region.

6. The volume extension is completed, confirm the following settings you set up, and then select [Finish]⑨.

7. You can find the volume that has been extended in Disk Management. If there is the remaining space, it
will still be the unallocated region, and then the unallocated region that can be created as another
partition⑩.

4. Write the steps for installation of software from Open source Mode and Paid subscription mode
installation of software from Open source Mode , you could follow these steps:
1. Download and uncompressing the source code.
2. In the terminal, move into the extracted directory.
3. Run " ./configure " to configure the software.
4. Run " make " to compile the software.
5. Run " make install " to install the software.

5. Write the steps to make Microsoft Chrome as a default browser, Add Active X Controls and Add–
on to the Browser.
How to Enable ActiveX on Google Chrome
Considering that ActiveX is obviously very useful, why isn‟t it already enabled across all browsers? The
answer lies in the fact that this technology was created by Microsoft. By default, ActiveX only works on
applications that were also made by Microsoft – that includes Internet Explorer, PowerPoint, Excel, Word,
etc.
However, you can now enable ActiveX on both Google Chrome and Mozilla Firefox, even though this
wasn‟t possible initially.
Enabling ActiveX on Chrome
There are two methods that you can use for this. Go through them both and choose the method that‟s easier
for you to follow.
Method 1
Step 1
Open your Google Chrome browser.
Step 2
Click on the Google Chrome menu option (three horizontal or vertical lines/dots, depending on the version
that you have installed).
Step 3
Click on Settings.
Step 4
Scroll to the bottom of the page and select Advanced.
Step 5
Navigate to the System section.
Step 6
Select Open Proxy Settings and a new popup window will appear.
Step 7
Click on the Security tab and select Custom Level (located under the Security Level for This Zone section).
Scroll down and select the Prompt option for both “Download Signed ActiveX Controls” and “Download
Unsigned ActiveX Controls sections”. Also, make sure that Enable has been checked in the “Run ActiveX
Control and Plug-Ins” section.
Click on „OK„ and restart your browser for the changes to be saved.
Method 2
In the second method, we will enable ActiveX by adding it as a Chrome extension. First, you‟ll have to
download and install the plug-in externally.
1. Download the file here.
2. Click on the Google Chrome menu (three horizontal or vertical lines/dots).

3. Select More Tools.

4. Click on Extensions.

5. Go to the folder where you have downloaded the plug-in.

6. Drag the plug-in on the Extensions page.

7. A list of permissions will appear, so click Add.


After you have completed the last step, restart your browser and you will be good to go.
6. Write the steps to establish peer to peer network connection using two systems in a LAN
Establish peer to peer network connection using two systems in a LAN
AIM:
Establish peer to peer network connection using two systems in a LAN.
Requirements:
Pentium IV Computer
Windows XP Professional Edition
LAN cable
Procedure:
1) Switch on the two systems
2) Connect the two system using network cable.
2) After connect the systems. Click the my network place icon on the desktop for the first system
3) Then click view network connection.
4) Now right click local area connection and click properties.
5) Click the internet protocol (TCP/IP) and set the IP address for the First system
Example IP address: 192.168.0.1
Subnet mask: 255.255.255.0
6) Then click ok
7) Repeat the steps 2-6 for the another system
Result
By following the above procedures, we can connect the peer to peer connection using LAN successfully.
7. What is WiFi? How do you configure the Wifi on Windows operating system?
Wi-Fi is the wireless technology used to connect computers, tablets, smartphones and other devices
to the internet.
Wi-Fi is the radio signal sent from a wireless router to a nearby device, which translates the signal into data
you can see and use. The device transmits a radio signal back to the router, which connects to the internet
by wire or cable.

The following steps explain the process in a simple and easy way:
1. Get the right router
The very first step in setting up a home WiFi network is to get the right router. It is important to take
into consideration factors such as the probable distance between the router and the devices connected,
the interference levels based on the number of devices operating nearby, the transfer speed required, and
security. It is best for the router to have the latest form of wireless encryption which is WPA2.

2. Connect the router to the modem


Next, the port on the router that is labeled WAN/WLAN/Internet is to be connected to the modem using
an Ethernet cable. The router should be switched on.

3. Connect the computer with Ethernet cable


Though not always necessary, connecting the computer‟s LAN port with an Ethernet cable helps to
configure the wireless WiFi settings without running the risk of losing the connection to the router.

4. Install router software


If the router comes with software, users should install it on the computer. Users should then choose and
enter a name for the home WiFi network, the type of security, and a complex password.

5. Open configuration page


In case the router does not come with software, users need to connect the router‟s configuration page
through the web browser. The web address of the router is to be entered on the web browser. This is
provided in the manual or documents that come along with the router. The username and password are
also to be entered. These details are provided in the manual.

6. Enter the internet connection information


In the next step, users need to enter the IP address and DNS information. The router might enter this
information on its own, but if it doesn‟t, the information can be gathered by connecting to the ISP.

7. Secure the router


An often overlooked but crucial step while setting up a home network is securing the router. A well-
secured router can protect all the devices on the home WiFi network against malicious threats and
cyber-attacks from hackers. Changing the default username and password, updating the router firmware,
enabling the router firewall, setting up a guest network, etc. are a few important steps of securing the
router.

8. Set the wireless settings


On the wireless settings, users can change the name of the home WiFi network which appears on a
device on detecting the network. For maximum security, it is recommended that the security encryption
be set to the latest version, which is mostly WPA2. Users can also enter and set a strong password of
their choice in this section.

9. Figure out where to place the router


Once the wireless settings are configured and saved, the router needs to be strategically placed in a
position, which facilitates the new WiFi connection to have maximum coverage. Any physical obstacle
like concrete walls and pillars, between the WiFi router and the devices, will restrict users from
enjoying the best WiFi network.

10. Connect a device


Next, any device that works on WiFi can be connected to the home WiFi network. The device will first
scan for the network. When the SSID shows up, users will need to enter the password enabled by the
WPA2 encryption. The device will connect to the WiFi network. Users can then open any web browser
to test the network. It is important to do the research in order to avail of the best WiFi plans.

8. Write the steps to Install and configure Network Components like switches, Hub and Modem and
how do you connect to Dial-Up networking
Installing Network Components
Aim
(a)Installing a network using switches and Hub
(b)Modem Installation and Configuration
(c)Connecting to the Network using Dial-Up networking
Requirements:
Pentium IV Computer
8 port Hub
Modem
Windows XP Professional Edition
Procedure:
Installing a Network using Switches / Hubs
Physical Connection
1) Install Network Interface Card in the prescribed slot in the CPU.
2) Attach RJ45 connector in both end of UTP cable.
3) Connect one RJ45 connector in the NIC Card and another RJ45 connector in the Hub.
4) Give power supply for the Hub.
Software Installation
1) Windows will automatically detect the installed Network Interface Card and install required device
driver files.
Modem Installation and Configuration
1) Login as Administrator in the Windows XP system.
2) Start ->Settings ->Control Panel ->Phone and Modem options
3) Choose Modem Tab and Click Add Button.
4) Now Add Hardware Wizard will begin and search for the modem connected in the CPU.
If the modem is found it will install the required driver files from CD/Floppy Disks.
Connecting to the Network using Dial-Up networking
1) Start - >Programs ->Accessories ->Communication ->New Connection Wizard
2) Choose Network connection Type as „Connect to Internet‟ and click Next Button
3) Choose the option „Setup my connection manually‟ and click Next Button
4) Choose the option „Connect using a dialup modem‟ and click Next Button
5) Type ISP name, phone no, user account and its password and Click Finish Button.
Result:
By following the above procedures, we can install hub, modem and configure dialup networking
successfully.
9. What are the features of firewall? Write the steps in providing network security and to set
Firewall Security in windows.
Major characteristics related to firewall protection are defined below.
 Various protection levels
 Wireless network (Wi-fi) Protection
 Internet and network access
 Blockage against unauthorized access
 Protection against malware
 Provide access only to valid data packets
 Provision of different configurations
 Provision of numerous security policies
 Allowing to pass authorized traffic that fulfills a set of rules
 Firewall functions like an immune system for malware and unauthorized access; therefore, it
ensures a secure system and an OS.
Aim: Establish security in a system using firewall configuration.
Requirements:
Pentium four Computer
Windows XP Professional Edition
Procedure:
Windows XP and Vista provide a built-in firewall component, which controls the programs that can
access the Internet and the types of connections that they can make.
If Windows Firewall doesn't permit Firefox to make connections, Firefox generates a "Server not
found" error when you try to browse to websites.
Checking for Windows Firewall
To see if you're running Windows Firewall:
1. Open the Windows Control Panel.
 (Windows Vista) Click the Windows icon, and select Control Panel.
 (Windows XP) Open the Windows Start Menu, and select Control Panel.
2. In the Control Panel, open the Windows Security Center.
 o(Windows Vista) Under the Security header, click Check this computer's security status.
3. Open the Windows Firewall header. Try to locate the following text:
Windows Firewall is actively protecting your computer
4. If it is set to On (Recommended), you are using Windows Firewall.
Configuring Windows Firewall
If you're using Windows Firewall, you must verify that it is properly configured.
1. In the Windows Security Center, open the Windows Firewall settings dialog.
 (Windows Vista) Click Windows Firewall. Then click Change settings.
You may receive a User Account Control pop-up. Click Continue.
2. Click the General tab.
3. Allow connections:
 (Windows Vista) Deselect the checkbox for Block all incoming connections.
 (Windows XP) Deselect the checkbox for Don't allow exceptions
4. Click the Exceptions tab.
5. If Mozilla Firefox is listed, select it and click the Delete button.
6. In the Delete a Program dialog, click Yes.
7. Set Windows to alert you when it blocks a program:
 Select the checkbox for Notify me when Windows Firewall blocks a new program.
 Select the checkbox for Display a notification when Windows Firewall blocks a program
8. Click OK.
9. Now, try browsing to a website with Firefox. You may receive a Windows Security Alert dialog
asking if you want to block Firefox. Click Unblock.
Result:
By following the above procedure, we can establish security in a system using firewall configuration

10. Write the steps for installation of System Software, Application software and Antivirus.
Software installation
Once you have worked out what requirements you need to install software, you will need to begin the
installation process. Before installing the software, you need to:

1. Download the software files from a website; or


2. Purchase a CD or DVD from a store.
After downloading the installation Application software, you can install it. Usually this installation
software is an installation wizard to assist you with the installation process.

11. Program to find class of an IP Address in C

#include <stdio.h>
#include <string.h>

/*
Function : extractIpAddress
Arguments :
1) sourceString - String pointer that contains ip address
2) ipAddress - Target variable short type array pointer that will store ip address octets
*/
void extractIpAddress(unsigned char *sourceString,short *ipAddress)
{
unsigned short len=0;
unsigned char oct[4]={0},cnt=0,cnt1=0,i,buf[5];

len=strlen(sourceString);
for(i=0;i<len;i++)
{
if(sourceString[i]!='.'){
buf[cnt++] =sourceString[i];
}
if(sourceString[i]=='.' || i==len-1){
buf[cnt]='\0';
cnt=0;
oct[cnt1++]=atoi(buf);
}
}
ipAddress[0]=oct[0];
ipAddress[1]=oct[1];
ipAddress[2]=oct[2];
ipAddress[3]=oct[3];
}

int main()
{
unsigned char ip[20]={0};
short ipAddress[4];

printf("Enter IP Address (xxx.xxx.xxx.xxx format): ");


scanf("%s",ip);

extractIpAddress(ip,&ipAddress[0]);

printf("\nIp Address: %03d. %03d. %03d.


%03d\n",ipAddress[0],ipAddress[1],ipAddress[2],ipAddress[3]);

if(ipAddress[0]>=0 && ipAddress[0]<=127)


printf("Class A Ip Address.\n");
if(ipAddress[0]>127 && ipAddress[0]<191)
printf("Class B Ip Address.\n");
if(ipAddress[0]>191 && ipAddress[0]<224)
printf("Class C Ip Address.\n");
if(ipAddress[0]>224 && ipAddress[0]<=239)
printf("Class D Ip Address.\n");
if(ipAddress[0]>239)
printf("Class E Ip Address.\n");

return 0;
}

Output

Enter IP Address (xxx.xxx.xxx.xxx format): 145.160.017.001

Ip Address: 145. 160. 017. 001


Class B Ip Address.

You might also like