Professional Documents
Culture Documents
CP150 Combined Slides
CP150 Combined Slides
Week 1
Week 1
• Introduction
• Review syllabus
• Review outline
• Material Introduction
Who am I?
Dr. Malek Alsmadi
Malsmadi@confederationcollege.ca
Get an answer within 24 hours
– except weekends/holidays
Office hours:
TBA
Location: TBA
Appointment is best
Student Success
Attendance is required!
Hand in ALL Lab assignments
Do all homework
Course Information
5
Course Information
6
Course Description
7
Course Learning Outcomes
9
Resources
How
Oracle VirtualBox
https://www.virtualbox.org/wiki/Downloads
No chatting
Neighbours
Cellphones
Facebook
OS is a resource allocator
Manages all resources
Decides between conflicting requests for efficient and
fair resource use
OS is a control program
Controls execution of programs to prevent errors and
improper use of the computer
Operating System Definition (Cont.)
Common features in an OS
• process management
• interrupts
• memory management
• file system
• device drivers
• networking
• security
• input/output
OS Containers
Smart phone
Tablet
PC
Cloud computing
Servers
Operating Systems
Windows
Linux
Mac
What is a nibble?
• 4 bits
What is a byte?
• 8 bits
Storage Definitions
OS definition
Computer system structure
OS features
OS containers
Storage Definitions and Hierarchy
Lab Work
Download Software
Hypervisor
https://www.virtualbox.org/wiki/Downloads
Operating Systems
Week 2
Week 2
Process Management
Memory Management
File System Management
Protection and Security
Process Management
• Mostly, the users have no idea (hidden and performed behind the scenes)
• Users just interact with the application (which interacts with the OS which
interacts with the hardware)
• A desktop OS needs only worry about one user and the applications that are
running
• What about a server OS or Cloud OS?
• Many users, many applications, finite resources
Multi Thinking
The OS must…
Execute and provide services for applications software
AND
Manage the computer's resources
• Multi-tasking
• allowing multiple software processes to run at the same time
• Multi-threading
• allowing different parts of a software program to run concurrently
OS varieties
Common:
Unix (and derivatives)
MacIntosh (Apple)
Windows (Microsoft)
https://en.wikipedia.org/wiki/List_of_operating_systems
Types of OS
Single-user, multi-tasking
Modern computers
- word processing, downloading file, playing music
Multi-user
Servers
- Unix, main frame OS
In the beginning...
In April 1991, Linus Torvalds, at the time a 21-year-old student at the University of Helsinki, Finland, started
working on some simple ideas for an operating system.
He started with a task switcher in Intel 80386 assembly language and a terminal driver.
“I'm doing a (free) operating system (just a hobby, won't be big and professional like gnu)
for 386(486) AT clones. This has been brewing since April, and is starting to get ready.
I'd like any feedback on things people like/dislike in minix, as my OS resembles it
somewhat (same physical layout of the file-system (due to practical reasons) among
other things)...”
GNU/Linux
What is linux?
• An operating system
• X Windows in 1992
• Feb. 1992 adopted GNU General Public License (GPL) over Linus’ previous self-drafted license,
which had not permitted commercial redistribution
Initially, Torvalds released Linux under a license which forbade any commercial use.
This was changed in version 0.12 to the GNU General Public License (GPL).
This license allows distribution and sale of possibly modified and unmodified versions of Linux but
requires that all those copies be released under the same license and be accompanied by the
complete corresponding source code.
Torvalds has described licensing Linux under the GPL as the "best thing I ever did."
Linux
https://www.youtube.com/watch?v=5IfHm6R5le0
Linux & the VM
Welcome to linux
When you click in the window, the Linux operating system (the guest) will gain full control of the
mouse
To exit the guest window (the Linux operating system in this case) you will need to press the host
button (displayed in the bottom right of the screen)
What if you have no Right Ctrl???
To create a new user, type in useradd followed by a space and the username for the new account
you are creating
• E.g. useradd mcgee
Note: To set your own password, just type in passwd and enter
Why?
Creating a New User
Clear Command
The clear command clears the screen and wipes the board
clean.
It will take the user back to the start prompt of whatever
directory you are currently operating in.
To use the clear command simply type clear
http://www.informit.com/blogs/blog.aspx?uk=The-10-Most-Important-Linux-Com
mands
mkdir Command
https://www.computerhope.com/unix/umkdir.htm
rmdir Command
https://www.computerhope.com/unix/umkdir.htm
cd Command
https://www.computerhope.com/unix/ucd.htm
pwd Command, whoami Command
https://www.computerhope.com/unix/upwd.htm
The root directory
https://www.computerhope.com/unix/ucd.htm
The parent directory
https://www.computerhope.com/unix/ucd.htm
The home directory
https://www.computerhope.com/unix/ucd.htm
Basic Commands
The folder I am in
What is in this folder? //Go back one level
This folder has nothing in it
What’s here? (one folder) //Go back one level
• --help
• will ask the command to show the possible flags to use
• Usage: whoami --help
How do I use this function?
The third approach is accessible outside of the command line: the internet
e.g.
You want to know how to add a user to a wheel group, you would type
Red hat add user to wheel group
or
linux add user to wheel group
Note: Provide the language or the environment you are interested in. In this case we specify RED
HAT or linux, otherwise you will be presented with information on how to do it in other systems
Listing Files/Directories - ls Command
https://www.computerhope.com/unix/uls.htm
Listing Files/Directories - ls Command
https://www.computerhope.com/unix/uls.htm
Listing Files/Directories - ls Command
https://www.computerhope.com/unix/uls.htm
Listing Files/Directories - ls Command
https://www.computerhope.com/unix/uls.htm
Creating & Viewing Files –
cat Command
The 'cat' command is used to display text files
Also used for copying, combining and creating new text files
To create a new file, use the command
cat > filename
Add content
Press 'ctrl + d' to save and return to command prompt
https://www.guru99.com/must-know-linux-commands.html#1
Creating & Viewing Files –
cat Command
To view an existing file contents, use the command
cat filename
To concatenate/combine text of two files into
another file
cat file1 file2 >newfile
Only text files can be displayed and combined using
this command
https://www.guru99.com/must-know-linux-commands.html#1
Copying and Appending Files –
cat Command
To copy the content of one file to another file use the
greater than ‘>’ symbol with the cat command as shown,
cat file1 > file2
To append the contents of one file to another, use the
double greater than ‘>>’ symbol with the cat command.
cat file1 >> file2
https://www.guru99.com/must-know-linux-commands.html#1
Removing Files –
rm Command
The rm command - removes files from your Linux OS
the rm command will delete created files without
confirmation
Syntax:
rm testfile.txt
Note: the rmdir command will only delete an empty
directory, the rm command will remove both files and
directories with files in it.
http://www.informit.com/blogs/blog.aspx?uk=The-10-Most-Important-Linux-Com
mands
Moving/Renaming Files – mv Command
https://www.guru99.com/must-know-linux-commands.html#1
sudo Program
https://www.guru99.com/must-know-linux-commands.html#1
Operating Systems
Week 4
Questions
What is meant by …
1. Hypervisor
2. Guest system
3. Host system
Answers
1. Hypervisor
• The application that is being used to run the virtual machines
• VirtualBox
2. Host system
• The computer system that is running the virtual machines
• Windows or iOS
3. Guest system
• The virtual machine that is being run
• RedHat, CentOS, ……………….
System registration
System registration
Un-registering a system
Reference: https://access.redhat.com/solutions/253273
System registration
Registering a system
Use the following command to register the system, then automatically associate any available subscription
matching that system:
# subscription-manager register --username <username> --auto-attach
Reference: https://access.redhat.com/solutions/253273
Installing Software
How to install software
Therefore, to install vim, we will use the yum program to install this text editor
If the system not registered then the result will beThe Result
Installing vim
The Result
What is this?
• We can see “This system is not registered to Red Hat Subscription Management” in what the
program report to us
• We need to also remember the License agreement specified “you may install this software on up to 16
nodes”
• If we search the reported issue (first bullet) we can see that we need to register this installation of Red Hat
Enterprise Linux with Red Hat
• The feedback from the program also show us how to fix this issue
• Therefore, combining a quick internet search with the feed back will get us to type in:
subscription-manager register --username <username> --auto-attach
• I do not use the --password flag (as shown on the Red Hat website) because I do not like to ever type a
password in plain text
Yum solves the dependencies issues
Networking
Networking
MAC address
Hexadecimal
Networking
Networking
IP address
• On the internet (or to communicate between LANs) we use a logical address (Internet
protocol address or IP address)
• IPv4 has 32 bits. IPv6 has 128 bits.
• This is like specifying your street address (2280 Baronwood Dr., Oakville, Ontario,
Canada). This street address is an easier way to find the property with the roll number
2401010040023240000
• But, this is still hard to remember (what is the IP address to Google’s Canadian web
server?)
• So we use names (e.g. www.google.ca)
• This is like saying John’s house (to refer to 2280 Baronwood Dr. …)
Troubleshooting
Can you send anything out to the internet using ping <ip address or named address>?
ping 74.125.21.103
ping www.google.com
Should see something like
Windows Linux
Find the break
Vi editor
Vi Editor
https://www.guru99.com/the-vi-editor.html
Vi Editor – Command Mode
https://www.guru99.com/the-vi-editor.html
Launching the Vi editor
https://www.guru99.com/the-vi-editor.html
Vi Editor – Moving within a file
Be in the command mode to move within a file
Although the arrow keys can be used, the default keys
are given in the table
Keystroke Use
k Move cursor up
j Move cursor down
h Move cursor left
l Move cursor right
https://www.guru99.com/the-vi-editor.html
VI Editor – Saving and closing a file
Keystroke Use
:q! Forced quit without
saving
:w Save the file but
keep it open
:q Quit without saving
:wq Save the file and
quit
https://www.guru99.com/the-vi-editor.html
Keystrokes Action
i Insert at cursor (goes into insert mode)
a Write after cursor (goes into insert mode)
A Write at the end of line (goes into insert mode)
ESC Terminate insert mode
u Undo last change
U Undo all changes to the entire line
o Open a new line (goes into insert mode)
dd Delete line
3dd Delete 3 lines.
D Delete contents of line after the cursor
C Delete contents of a line after the cursor and insert new text. Press ESC key to
end insertion.
dw Delete word
4dw Delete 4 words
cw Change word
x Delete character at the cursor
r Replace character
R Overwrite characters from cursor onward
s Substitute one character under cursor continue to insert
S Substitute entire line and begin to insert at the beginning of the line
~ https://www.guru99.com/the-vi-editor.html
Change case of individual character
Operating Systems
Week#5
Week#5
• Shell Scripting
• What is a Shell?
• What is Shell Scripting?
https://searchdatacenter.techtarget.com/definition/shell
Types of Shell
So we'll type vi
hello.sh
Ref: Lynda.com
Why to use bash command?
We use bash command to execute our script because
files by default don't have the execute permission
Let's try ./hello.sh.
We get an error message ‘Permission denied’
To make a file executable, we type chmod u+x
hello.sh. This gives user the permission to execute
the script
Okay, let's try it again. ./hello.sh. Okay, that worked
Why to type ./before the name of the script?
hello.sh. command not found.
Linux systems look for commands on the path, not in
the current directory. And if the command is not in
the path, they report that it is not found.
When we put the ./ we tell the system don't bother
with the path, here's the location of the command.
Comments
A comment begins with the #
sign, and ends at the end of the
line.
Let's add a comment to our script
Save and run it again
There’s no change in the display
Comments are a programmer
thing not something for the user
Not displayed like echo
The shebang
The #! syntax used in scripts to indicate an interpreter for
execution under Linux OS
Since our script code is written specifically for the Bash shell, we
need to make sure that our script only runs on Bash
Go to the top of the page, insert a new line i.e. interpreter
line known as the shebang
This line tells the system which command processor should
handle this script
For Bash, it is
#!/usr/bin/env bash
Or
#!/bin/bash
Variables
Favorite_color=blue
Lynda.com
Operating Systems
Week#7
week#7
• Shell Scripting
• Branching and Loops
https://searchdatacenter.techtarget.com/definition/shell
The if statement
The if statement lets us make decisions
The basic form of the if statement is
if-then-fi
If equal –eq
If not equal –ne
If less than –lt
If less than or equal to –le
If greater than –gt
If greater than or equal to –ge
Boolean compares - Example
According to the if conditions, depending
upon the values of the parameter $1,
appropriate messages will be displayed
The if – then – else statement
The if statement let us make decisions
The basic form of the if-else statement is
if-then-else-fi
Statements
done
The while loop- Example
The for loop also gives us the ability to execute our code
repetitively
For each of the items in a given list, for loop performs the
given set of commands
Syntax:
for var in <list>
do
<commands>
done
The for loop – contd…
Lynda.com
Week 8: CPU Scheduling
Operating System Concepts – 9th Edition Silberschatz, Galvin and Gagne ©2013
Objectives
Operating System Concepts – 9th Edition 6.2 Silberschatz, Galvin and Gagne ©2013
Basic Concepts
Operating System Concepts – 9th Edition 6.3 Silberschatz, Galvin and Gagne ©2013
Process Concept (Cont.)
Program is passive entity stored on disk (executable file),
process is active
Program becomes process when executable file loaded into
memory
Execution of program started via GUI mouse clicks, command
line entry of its name, etc
One program can be several processes
Consider multiple users executing the same program
Operating System Concepts – 9th Edition 6.4 Silberschatz, Galvin and Gagne ©2013
Process State
Operating System Concepts – 9th Edition 6.5 Silberschatz, Galvin and Gagne ©2013
Diagram of Process State
Operating System Concepts – 9th Edition 6.6 Silberschatz, Galvin and Gagne ©2013
CPU Scheduler
Short-term scheduler selects from among the
processes in ready queue, and allocates the CPU to
one of them
Queue may be ordered in various ways
CPU scheduling decisions may take place when a
process:
1. Switches from running to waiting state
2. Switches from running to ready state
3. Switches from waiting to ready
4. Terminates
Scheduling under 1 and 4 is nonpreemptive
All other scheduling is preemptive
Consider access to shared data
Consider interrupts occurring during crucial OS
activities
Operating System Concepts – 9th Edition 6.7 Silberschatz, Galvin and Gagne ©2013
Dispatcher
Operating System Concepts – 9th Edition 6.8 Silberschatz, Galvin and Gagne ©2013
Scheduling Criteria
Operating System Concepts – 9th Edition 6.9 Silberschatz, Galvin and Gagne ©2013
Scheduling Algorithm Optimization Criteria
Operating System Concepts – 9th Edition 6.10 Silberschatz, Galvin and Gagne ©2013
First- Come, First-Served (FCFS) Scheduling
P1 P2 P3
0 24 27 30
Operating System Concepts – 9th Edition 6.11 Silberschatz, Galvin and Gagne ©2013
FCFS Scheduling (Cont.)
Suppose that the processes arrive in the order:
P2 , P3 , P1
The Gantt chart for the schedule is:
P2 P3 P1
0 3 6 30
Operating System Concepts – 9th Edition 6.12 Silberschatz, Galvin and Gagne ©2013
Shortest-Job-First (SJF) Scheduling
Associate with each process the length of its next CPU burst
Use these lengths to schedule the process with the shortest
time
SJF is optimal – gives minimum average waiting time for a given
set of processes
Operating System Concepts – 9th Edition 6.13 Silberschatz, Galvin and Gagne ©2013
Example of SJF
P4 P1 P3 P2
0 3 9 16 24
Operating System Concepts – 9th Edition 6.14 Silberschatz, Galvin and Gagne ©2013
Priority Scheduling
Operating System Concepts – 9th Edition 6.15 Silberschatz, Galvin and Gagne ©2013
Example of Priority Scheduling
P2 P5 P1 P3 P4
0 1 6 16 18 19
Operating System Concepts – 9th Edition 6.16 Silberschatz, Galvin and Gagne ©2013
Round Robin (RR)
Each process gets a small unit of CPU time (time quantum q),
usually 10-100 milliseconds. After this time has elapsed, the
process is preempted and added to the end of the ready queue.
If there are n processes in the ready queue and the time
quantum is q, then each process gets 1/n of the CPU time in
chunks of at most q time units at once. No process waits more
than (n-1)q time units.
Timer interrupts every quantum to schedule next process
Performance
q large FIFO
q small q must be large with respect to context switch,
otherwise overhead is too high
Operating System Concepts – 9th Edition 6.17 Silberschatz, Galvin and Gagne ©2013
Example of RR with Time Quantum = 4
Process Burst Time
P1 24
P2 3
P3 3
The Gantt chart is:
P1 P2 P3 P1 P1 P1 P1 P1
0 4 7 10 14 18 22 26 30
Operating System Concepts – 9th Edition 6.18 Silberschatz, Galvin and Gagne ©2013
Operating Systems
Week#9 - Windows Command Prompt
Solution - Lab#8
RR Algorithm
P1=2, P2=1, P3=8, P4=4 and P5=5 ms
Round Robin:-
Time quantum = 2 ms
P1 P2 P3 P4 P5 P3 P4 P5 P3 P5 P3
0 2 3 5 7 9 11 13 15 17 18 20
C:\>
https://www.cs.princeton.edu/courses/archive/spr05/cos126/cmd-prompt.html
Command Prompt Basics
Windows now manages both forward (/) and backward (\) slashes as the same for dir and cd
Command Line Basics
Redirection
cmd > filename - redirect the effects of cmd to a filename, overwriting the file if it exists
cmd >> filename - redirect the effects of cmd to a filename, appending to the file if it exists
Command Line Basics
type filename –View file contents of filename without editing the file
more filename – View file contents of filename without editing the file, will stop at each new page
- space will move forward one page
- enter will move forward one line
- q will stop the viewing
Command Line Basics
whoami – if you are on a system that you need to log in to, it will display your domain and your
username
c:\Users\malsmadi\Documents\temp>whoami
confederation\malsamdi
my domain (the network) where I am logged into is confederation
my username is malsmadi
Network issues – ping command
https://www.lifewire.com/ping-command-2618099
Network issues
ping comments
https://www.webopedia.com/TERM/I/ipconfig.html
Reference
Lynda.com
Operating Systems
Week#10 – Batch Files in Windows
This Week
Batch Files
• The batch file is a group of command line functions that can be run
as a “program” or a script
• The extension is .bat or .cmd
• Files of this type are recognized and executed through an interface
(sometimes called a shell) provided by a system file called the
command interpreter.
• On Windows systems, this interpreter is known as cmd.exe.
Batch Files in Windows
Batch Files
@echo off
SET /p a=Enter first number
SET /p b=Enter second number
SET /A a=%a%
SET /A b=%b%
if %a% equ %b% echo "Both values are equal"
if %a% lss %b% echo "%a% is less than %b%"
if %a% gtr %b% echo "%a% is greater than %b%"
Nested If Statement
https://www.tutorialspoint.com/batch_script/batch_script_variables.htm
Operating
Systems
Power shell
PowerShell Command Prompt
PowerShell was introduced in the year 2006. cmd was introduced in the year 1981.
It can be opened from run by typing PowerShell. It can be opened from run by typing cmd.
PowerShell
You can also use Get-Help with individual nouns and verbs. For example, to find out all the
commands you can use with the Get verb, type:
Get-Help -Name Get-*
10 Useful Command
2: Set-ExecutionPolicy
Although you can create and execute PowerShell scripts, Microsoft has disabled scripting by default
in an effort to prevent malicious code from executing in a PowerShell environment.
You can use the Set-ExecutionPolicy command to control the level of security surrounding PowerShell
scripts.
You can set an execution policy by entering the Set-ExecutionPolicy command followed by the name
of the policy. For example, if you wanted to allow scripts to run in an unrestricted manner you could
type:
Set-ExecutionPolicy Unrestricted
10 Useful Command
2: Set-ExecutionPolicy
If you're working on an unfamiliar server, you'll need to know what execution policy is in use before
you attempt to run a script.
You can find out by using the Get-ExecutionPolicy command.
10 Useful Command
4: Get-Service
The Get-Service command provides a list of all of the services that are installed on the system
If you are interested in a specific service you can append the -Name switch and the name of the
service (wildcards are permitted)
When you do, Windows will show you the service's state.
10 Useful Command
5: ConvertTo-HTML
PowerShell can provide a wealth of information about the system, but sometimes you need to do
more than just view the information onscreen. Sometimes, it's helpful to create a report you can send
to someone. One way of accomplishing this is by using the ConvertTo-HTML command.
To use this command, simply pipe the output from another command into the ConvertTo-HTML
command.
You will have to use the -Property switch to control which output properties are included in the
HTML file and you will have to provide a filename.
10 Useful Command
5: ConvertTo-HTML
To see how this command might be used, think back to the previous section, where we typed Get-
Service to create a list of every service that's installed on the system.
Now imagine that you want to create an HTML report that lists the name of each service along with its
status (regardless of whether the service is running).
To do so, you could use the following command:
Get-Service | ConvertTo-HTML -Property Name, Status > C:\service1s.html
ConvertTo-HTML
get-service | convertto-html > c:\services_1.html
Just as you can create an HTML report based on PowerShell data, you can also export data from
PowerShell into a CSV file that you can open using Microsoft Excel.
The syntax is similar to that of converting a command's output to HTML.
At a minimum, you must provide an output filename.
For example, to export the list of system services to a CSV file, you could use the following command:
If you tried using the previous command, you know that there were numerous properties (fields)
included in the CSV file.
It's often helpful to narrow things down by including only the properties you are really interested in.
This is where the Select-Object command comes into play.
The Select-Object command allows you to specify specific properties for inclusion.
For example, to create a CSV file containing the name of each system service and its status, you
could use the following command:
Get-Service | Select-Object Name, Status | Export-CSV c:\service.csv
Get-Service | ConvertTo-HTML -Property Name, Status > C:\service1s.html
10 Useful Command
8: Get-EventLog
You can actually use PowerShell to parse your computer's event logs.
There are several parameters available, but you can try out the command by simply providing the
-Log switch followed by the name of the log file.
For example, to see the Application log, you could use the following command:
Get-EventLog -Log "Application“
Of course, you would rarely use this command in the real world.
You're more likely to use other commands to filter the output and dump it to a CSV or an HTML file.
10 Useful Command
9: Get-Process
Just as you can use the Get-Service command to display a list of all of the system services, you can
use the Get-Process command to display a list of all of the processes that are currently running on the
system.
Note:
- you will have many processes
- to have the screen pause between full screen fills, pipe the command through the more command
get-process | more
You can limit the process by typing in the process name after the command:
get-process chrome
gps c*
10 Useful Command
10: Stop-Process
For example, how do you find all processes that have a process id > 6000?
get-process | where-object {$_.id -gt 6000}
Playing around
To properly understand
Aha!!!
Not name, but DisplayName
Playing around
Correct the property name
More than one way...
For example, how do you find all processes that have a process id > 6000?
get-process | where-object {$_.id -gt 6000}
get-process | where-object id -gt 6000
get-process | ? {$_.id -gt 6000}
get-process | ? id -gt 6000
How do you get all the process with the name chrome in it?
get-process chrome
get-process –name chrome
get-process | where-object {$_.processname -eq "chrome"}
PowerShell
Do I just restart the computer and hope that it all goes away
(it very well may)?
or
Without knowing what it all means, you can assume (incorrectly) that your
computer is broken or infected when there’s nothing really wrong
The Layout
Left-hand pane
- folder view
- you can find all of the different event logs, as well as the views that can be
customized with events from many logs at once
- E.g. Administrative Events view in recent versions of Windows displays all of
the Error, Warning, and Critical events whether they originated from the
Application log or the System log.
The Layout
Middle pane
- list of events
- clicking on an event will display the details in the preview pane – or you can
double-click on any of them to pull it up in a separate window, which can be
handy when you are looking through a big set of events and want to find all
the important things before beginning an internet search
Right-hand pane
- Quick access to actions such as
- creating custom views
- filtering
- creating a scheduled task based on a particular event
The events
• These are what we are here for
• They can run a range from specific and obvious things we can fix to vague
information that makes no sense and cannot be found through searches on
the internets
• They may show issues that are occurring with your system
• They may show details of specific events that are occurring with a program
Important Note: There are always going to be errors and warnings in the event
log, and you can’t solve all of them.
The most important thing is to use Event Viewer to troubleshoot problems you
are already having, rather than trying to find problems that you don’t know about
yet
Event Details
The Event Log Fields
Log Name – while in older versions of Windows everything got dumped into the
Application or System log, in the more modern editions there are dozens or
hundreds of different logs to choose from. Each Windows component will most
likely have its own log.
Source – this is the name of the software that generates the log event. The name
usually doesn’t directly match with a filename, of course, but it is a
representation of which component did it.
Event ID – the all-important Event ID can actually be a little confusing. If you were
to Google for “event ID 122” that you see in the next screenshot, you wouldn’t end
up with very useful information unless you also include the Source, or application
name. This is because every application can define their own unique Event IDs.
The Event Log Fields
Level – This tells you how severe the event is – Information just tells you that
something has changed or a component has started, or something has been
completed. Warning tells you that something might be going wrong, but it isn’t all
that important yet. The error tells you that something happened that shouldn’t
have happened, but isn’t always the end of the world. Critical, on the other hand,
means something is broken somewhere, and the component that triggered this
event has probably crashed.
User – this field tells you whether it was a system component or your user
account that was running the process that caused the error. This can be helpful
when looking through things.
OpCode – this field theoretically tells you what activity the application or
component was doing when the event was triggered. In practice, however, it will
almost always say “Info” and is pretty useless.
The Event Log Fields
Computer – on your home desktop, this will usually just be your PC’s name, but
in the IT world, you can actually forward events from one computer or server to
another computer. You can also connect Event Viewer to another PC or server.
Task Category – this field is not always used, but it ends up basically being an
informational field that tells you a bit more information about the event.
Keywords – this field is not usually used, and generally contains useless
information.
Going to Search
As a rule of thumb, you should try searching by the general description, the
Event ID and the Source, or a combination of those values.
Just remember that the Event ID is unique… for each application.
There is a lot of overlap and you can’t just search for “Event ID 122” because you
will get a lot of nonsense.
Search Results
Beware Internet Sites with “Solutions” for Event ID “Problems”
There are many web sites out there that automatically generate pages for every
single event ID, and then populate them with nonsense.
Some sites have valid responses.
However, many have useless results.
Worse than useless, some offer to solve the problem if you just download some
piece of software for your free analysis. Almost always, these sites are ads, and
the software “solution” is a fraud.
There is NO software package that can solve all of your event log problems
Good result. Useful
information? Need to
open and read
Questionable
I don’t think so
Event Viewer
Left hand pane.
Looking at the sections more closely:
There are a lot of interesting logs to look at when you are troubleshooting
One of the most interesting is found by browsing through the folders to the
following location:
• An event log that shows all of the things that Windows logs internally for
performance checking
• If your computer boots up slower than normal, Windows will usually have a log
entry for it, and will often list out the component that caused Windows to boot
more slowly
Task Manager
Task Manager
This is one of the most used programs in managing programs on your system
It shows
- running applications
- running process
- running services
- memory consumption
- hard drive time utilization
- network usage
Task Manager
Right click on an empty space on your taskbar
Select Start Task Manager
or
Press Alt-Ctrl-Del
Select Start Task Manager
Windows 7
Windows 8 / 10
Understanding the Task Manager
To get more information, you can use the Resource Monitor on the Performance
tab
Resource Monitor