« Home « Chủ đề Cách cài đặt hệ thống

Chủ đề : Cách cài đặt hệ thống


Có 40+ tài liệu thuộc chủ đề "Cách cài đặt hệ thống"

Configuring Windows 7 (Training Kit) - Part 34

tailieu.vn

So what identifies the computer and what identifies the subnet? To discover this, we need to look at the next value, the subnet mask . A one says that the corresponding bit in the IPv4 address is a network address bit . A zero says that the corresponding bit in the IPv4 address is a computer or host address bit....

Configuring Windows 7 (Training Kit) - Part 38

tailieu.vn

You can use the Route print, Netstat –r, or Netsh interface ipv6 show route command to view the local IPv6 routing table and verify that you have a route corresponding to your local subnet and to your default gateway . In this practice, you configure a static site-local IPv6 configuration on the Canberra computer running Windows 7 . You then...

Configuring Windows 7 (Training Kit) - Part 40

tailieu.vn

Take note of the items that have been installed and enabled on your computer while it is working correctly . You might not change these settings very often, but if something goes wrong, you can find out what the original settings were. You can also right-click a connection in the Network Connections dialog box and select Diagnose . If you...

Configuring Windows 7 (Training Kit) - Part 41

tailieu.vn

In Network And Sharing Center, click Connect to a Network . Click the Wireless Network icon at the bottom left section of your screen . In the Search box on the Start menu, enter \\aberdeen. Check that you can see the shared Test folder. Click the Wireless Network icon at the bottom left section of your screen. On the Aberdeen...

Configuring Windows 7 (Training Kit) - Part 42

tailieu.vn

Lesson 1: Managing Windows Firewall. In this lesson, you learn the differences between Windows Firewall and Windows Firewall with Advanced Security . You also learn about connection security rules, which you can use to limit your computer’s network communication so that it occurs only with other computers that have proven their identity. Windows Firewall. Firewalls restrict network traffic based on...

Configuring Windows 7 (Training Kit) - Part 45

tailieu.vn

FIgUre 7-27 Remote Desktop Client. When presented with the warning that the identity of the remote computer cannot be verified, shown in Figure 7-28, click Yes. Click the Windows PowerShell item . At the PowerShell prompt, type the command $env:ComputerName;$env:UserName. and press Enter . Verify that the command returns the values Aberdeen and Cassie Hicks . exercise 2 Using Windows...

Configuring Windows 7 (Training Kit) - Part 46

tailieu.vn

There are usually only a few computers, and the number of files that people need to share is minimal . When you do not have access to a dedicated file and print server, you can use the resource sharing options included in Windows 7 to share files, folders, and printers . n Configure sharing settings using Network And Sharing Center....

Configuring Windows 7 (Training Kit) - Part 48

tailieu.vn

You can assign these permissions to a user or group by viewing a folder’s properties and clicking the Security tab . You can configure permissions with the Allow or Deny setting, or provide no setting . When you set the Allow permissions for some permission types, other Allow permissions are included automatically . For example, if you set the Read...

Configuring Windows 7 (Training Kit) - Part 49

tailieu.vn

You are able to encrypt a file to another user only if that user has an EFS certificate in the computer’s store . If you want to encrypt a file to another user and are unable to locate their certificate, you need to get her to log on to the computer and encrypt a file . Once she does this,...

Configuring Windows 7 (Training Kit) - Part 51

tailieu.vn

To further practice and reinforce the skills you learned in this chapter, you can perform the following tasks:. n Review the list of key terms introduced in this chapter. n You can manage shared folders centrally using the Computer Management console. Do you know what these key terms mean? You can check your answers by looking up the terms in...

Configuring Windows 7 (Training Kit) - Part 53

tailieu.vn

In this lesson, you learn about the methods Windows 7 provides through which you can deal with a forgotten password, from the preventative creation of a password reset disk to having a member of the Administrators local group log on and reset the password . Passwords are not the only way that you can authenticate to a client running Windows...

Configuring Windows 7 (Training Kit) - Part 55

tailieu.vn

V irtual private networks (VPNs) allow you to access a workplace network remotely, whether you are just down the road from the office at a local coffee shop or in an airport lounge on the other side of the world . If the infrastructure in your office is set up correctly, all you need to use a VPN is to...

Configuring Windows 7 (Training Kit) - Part 57

tailieu.vn

VPN Authentication Protocols. Windows 7 supports different authentication protocols for both dial-up and VPN connections . There are two broad categories of authentication protocol: password-based authentication protocols and certificate-based authentication protocols . Certificate-based authentication protocols require the deployment of a PKI solution such as Active Directory Certificate Services . This protocol is not enabled by default for Windows 7 VPN...

Configuring Windows 7 (Training Kit) - Part 59

tailieu.vn

One of these challenges is ensuring that a person using a portable computer is able to use the computer for a maximum amount of time when she is not able to connect to a power outlet . Another challenge is ensuring that a user is able to access important files even when she is unable to connect to the network...

Configuring Windows 7 (Training Kit) - Part 61

tailieu.vn

Which of the following policies should you configure to allow a computer without a TPM chip that is running Windows 7 Enterprise to utilize BitLocker to protect its hard disk drive?. Which of the following BitLocker policies should you configure to ensure that BitLocker To Go Reader is available on all FAT-formatted removable devices protected with BitLocker?. Which of the...

Configuring Windows 7 (Training Kit) - Part 63

tailieu.vn

You can use the following questions to test your knowledge of the information in Lesson 2,. Answers to these questions and explanations of why each answer choice is correct or incorrect are located in the “Answers” section at the end of the book.. Which of the following commands can you use to generate a list of devices on a computer...

Configuring Windows 7 (Training Kit) - Part 64

tailieu.vn

Figure 12-3 shows the Russian Language Pack, which is an optional update for Windows 7. FIgUre 12-3 Optional language pack update. How Windows Update deals with this update depends on how you have configured update settings . You can manually configure how Windows Update deals with updates by clicking the Change Settings item . This opens the Change Settings dialog...

Configuring Windows 7 (Training Kit) - Part 66

tailieu.vn

FIgUre 12-20 Compatibility View settings. Group Policies related to Compatibility View are located in the Administrative Templates\. Windows Components\Internet Explorer\Compatibility View node . You can find this node in both the Computer Configuration and the User Configuration sections of Group Policy . n turn On Internet explorer 7 Standards Mode If you enable this policy, Internet Explorer will display all...

Configuring Windows 7 (Training Kit) - Part 68

tailieu.vn

To further practice and reinforce the skills you learned in this chapter, you can perform the following tasks:. n Windows Update is a feature built into Windows 7 that manages how software updates are downloaded and installed. n Windows Update can retrieve updates from the Microsoft Update servers on the Internet or from a local update source, such as a...

Configuring Windows 7 (Training Kit) - Part 69

tailieu.vn

FIgUre 13-3 Counters included in the System Diagnostics data set. FIgUre 13-4 Accessing a report for the System Diagnostics data set. For example, use System Performance instead of System Diagnostics whenever possible because System Performance includes fewer counters. Creating a Data Collector Set. If you have a performance problem or want to analyze and possibly improve the performance of a...