KASNEB
CICT PART 1 SECTION 2
OPERATING SYSTEMS (PRACTICALS)
Wednesday: 30th May 2012
QUESTION ONE
Create a word document named “Question one”. Use the word
processor document to save the screenshots created in question (a), (b) and (c)
below:
(a)
Ensure there are two user accounts in the
computer you are using and that each user account has two running programs. (4
marks).
(b)
Display the processes from all the users
(including the two user created in (a) above) showing the following attributes:
(i)
Image name. (2marks)
(ii)
Process identifier (PID) (2marks)
(iii)
User name (2marks)
(iv)
Session ID (2marks)
Capture and save a screenshot
containing the above details.
(c)
(i) Create a schedule task named “open web page”
(2marks)
(ii) Configure the task in (c) (i) above to
run the Internet Explorer program file after every 3 days at 8:00 a.m. (2marks)
(iii) Configure the scheduled task in (C)
(i) above to run only if the user is logged on (2mks)
(v)
Configure the scheduled task in (c) (i) above to
stop if it runs unattended for 60 minutes. (2marks).
Capture and save a framed
screenshot of the above settings.
Print “Question One” document
(Total: 20marks)
QUESTION TWO
You have been employed as a system administrator of a
company running 100 computers on a local area network. On your initial analysis
of the computer systems, you realize that the company does not have a standard
policy on power saving, security and registry setting among others.
Required:
Create a word processor document named “Question Two”. Use
the word processor document to save screenshots that you would capture as you
standardize the settings of the computer system in the above company according
to the specification in questions (a), (b), and (c) below:
(a)
Save power by configuring the computer system
to:
(i)
Turn off the monitor after 10 idle minutes
(2marks)
(ii)
Turn off the hard disk after 30 minutes (2marks)
(iii)
Standby after 20 idle minutes (2marks)
(iv)
Enable hibernation (2marks)
(b)
(i) To display a list of registry permission
that could be granted to users of registry information (2marks)
(ii) To configure the following permissions
for the system’s root classes information:
·
Power users: allow access but no modification of
the registry information
·
Guest users: deny both access and modification
(2marks)
(c)
(i) Change locale to “Uganda” (2marks)
(ii) Configure the input language for the
keyboard to be “English-United Kingdom” (2marks)
(iii) Set the digital grouping of threes,
running from the right and separated by a comma (,) (2marks)
(v)
Configure the currency symbol to be “sh”
Resize the screenshots in the word
processor document “Question Two”, in order to fir not more than two pages of
an A4 size printing paper. Print document
No comments:
Post a Comment