ࡱ> 5@ bjbj22 !>XX8ިb zz       $ R^H-Gɬ"GG-9B333G3G331H$n 'c<<X0]Bx,D,r3!\}--Chapter 13 File and Disk Maintenance LECTURE NOTES CHAPTER OUTLINE CHAPTER OVERVIEW How to avert hard drive problems and how to avert conditions that can cause data errors will be discussed. Will learn the purpose and function of and then use Check Disk, Disk Cleanup, Disk Defragmenter, and Task Scheduler. The importance of and procedures for backing up and restoring files are discussed. Will create an Automated System Recovery Disk for start up problems. The purpose and function of the Registry will be discussed. Will use the Computer Management tool to explore and manage your computer system. DETECTING AND REPAIRING DISK ERRORS WITH CHECK DISK Detecting and Repairing Disk Errors with Check Disk Physical hard drive problems. Wear and tear on hard disk. Minimize problem and conserve power with Power Management. Hibernation. Head crash. Minimize place system where it will not get knocked around. Software-related hard drive problems. Viruses. Causes. Installing infected program. Using a data file that has an embedded virus. To minimize. Purchase antivirus program. Error causing conditions that may be repairable. Power surges. Minimize with surge protector. Power outages. Minimize with UPS. Locked system. Minimize by following shutdown process. Check Disk comes with WXP Locates/repairs problems on hard disk. Checks for logical errors in file system. Invalid entries in tables that keep track of file locations Problems that involve physical disk, lost clusters or cross-linked files. Lost clusters not uncommon. FAT/directory work together to define where/what files are. Each file has entry in directory table which points to starting cluster in FAT. If file longer than one cluster - FAT pointer leads to next cluster Pointers chain together all clusters that make up file. If pointer lost chain broken. Broken chain is lost cluster Incorrectly marked by FAT as used - Unavailable for new data. Lost clusters Belong to no file. Cannot be retrieved/deleted. Data useless. Lose disk space. Reasons for lost clusters. Not exiting program properly. Power surge/failures. Check Disk Fix lost clusters automatically or Save them to disk as files. Cross-Linked Files. Two or more files claim same cluster as part of their chain. One file claims same cluster twice. Data in cross-linked file. Usually correct for only one file. May not be correct for any file. Check Disk CAN check/repair local hard drives, floppy disks, and removable drives. CANNOT find/fix errors on CD-ROMs or network drives. Only used on actual physical drives connected to system. System must have exclusive access to disk to complete job. Use on a regular basis. When using close all open programs. Dealing with disk structure. Open files/programs can cause data loss/corrupt files, etc. If disk (volume) formatted as NTFS, WXP automatically (without running Check Disk) Logs all file transactions. Replaces bad clusters. Stores copies of key information for all files on NTFS volume. ACTIVITYUSING CHECK DISK Using Check Disk MYDATADISK disk should be in Drive A. Activity steps. Open Windows Explorer Click My Computer Right-click Drive A icon Click Properties/Tools/Check Now/ Start/ OK/OK. Close all open windows Activity completed. CLEANING UP YOUR DISK Cleaning Up Your Disk Hard drive determines computers performance. All files stored on hard disk. Want easy/quick access to files. Need disk space for New files. Temporary files that programs create. Documents waiting to be printed. Cache files. Recycle bin. If files/caches not deleted frequently Hard drive runs out of space. System performance slowed down. Disk Cleanup. Utility tool. Helps maintain disk space. Intended for hard drives. ACTIVITYUSING DISK CLEANUP Using Disk Cleanup Activity steps. Click Start/Programs/Accessories System Tools/Disk Cleanup Down arrow in drop-down list box Outside drop-down list box/OK Recycle Bin/View Files command button Close Recycle Bin Click More Options tab/Clean Up (under Windows Components)/Cancel Clean Up (in Disk cleanup window under Installed Programs)/Close Clean Up (in disk Cleanup window under System Restore) No/Disk cleanup tab/OK/Yes Start/All Programs/Accessories System Tools/Disk Cleanup/OK/Cancel Activity completed. CONTIGUOUS AND NONCONTIGUOUS Contiguous and Noncontiguous Files To store and retrieve files (data). Disk divided into sectors (numbered blocks). Sectors grouped into clusters. Cluster set of contiguous sectors. Number of sectors in cluster on hard disk varies depends on: Size of hard drive. How it was installed. File (usually) larger than one cluster. WXP keeps track of location of all file parts. When File deleted in FAT or FAT32 Only entries in FAT deleted. Space file occupied available. Writing files to a disk. WXP tries to write to adjacent cluster. Easier to retrieve/store information when file is contiguous. Fragmented disk. Disk composed of noncontiguous files. Takes longer to read as head moves around disk to find all parts of a file. OPTIMIZING PERFORMANCE OF DISKS Optimizing the Performance of Disks Defragger, disk optimization program or disk defragger. Utility program fixes fragmented disk. Moves data around on a disk to make files contiguous. Directory table and FAT rewritten so new locations of files are available. Prior to running Disk Defragmenter. Run Check Disk and Disk Cleanup. Remove all lost or cross-linked clusters/unnecessary files. Close all open programs. Allow ample time. Back up disk as program manipulates disk. Disk Defragmenter used only on local drives. Must have administrator privileges to use this utility program. ACTIVITYUSING DISK DEFRAGMENTER Using Disk Defragmenter Place MYDATADISK disk in Drive A. Activity steps. Click Start/My Computer Right-click Drive A icon Click Properties/Tools tab/Defragment Now/OK/Drive C/Analyze button/View Report Scroll to bottom of Volume Information list box Click Close If you have another drive, select it Click Analyze When analysis is complete Click View Report and scroll to bottom of Volume Information list box then Click Close Close all open windows Activity completed. STARTING PROGRAMS AUTOMATICALLY Starting Programs Automatically Task Scheduler. Can schedule any program to run at any selected time. Make sure program Does not need user input. Can exit when task completed. Can be used to schedule tasks such as Disk Cleanup or Backup. ACTIVITYUSING TASK SCHEDULER Using Task Scheduler Activity steps Click Start/All Programs/Accessories/ System Tools/Scheduled Tasks/View/Tiles Double-click Add Scheduled Task Click Next/Disk Cleanup/Next/Weekly/ Next/Sunday/Next Enter password in second and third text boxes Click Next/Finish/View/Refresh/Advanced (on menu bar) Close menu Click Disk Cleanup/ key/Yes Close Scheduled Tasks window/all open windows. Activity completed. BACKING UP YOUR DATA Backing Up Your Data Critical task (often neglected). Backup = duplicate of file (s) on a disk copied to another medium. Retrieve files by restoring them to original medium. Advantage of backup vs. copy. Backup file can span multiple backup disks. Working with WXP Create settings, install/delete programs. Adding/making changes to system Registry. If Registry corrupt cannot boot WXP With backup restore to what you had previously. Backup program supplied with WXP supports five methods of backups: Normal or Full backup Copies all files from hard drive to backup medium. Archive bit turned off after files are backed up. Archive bit OFF Backup knows file has been copied. File edited - archive bit turned ON. Copying file attribute not altered by copy routine. Archive bit altered by certain programs such as Backup. Incremental Backup. Only copies files that have changed or created since last normal or incremental backup. Marks files as having been backed up by clearing archive bit. Differential backup. Copies files that have changed or created since last normal or incremental backup. Does not mark files as having been backed up. Does not clear archive bit. Daily Backup Backs up modified files only on day backup performed. Files not marked as having been backed up. Archive bit is not cleared. Option requires Backup run on daily basis. Copy Backup Backs up selected files. Does not mark files as having been backed up. Archive bit not cleared. Comparing full backups to incremental backups. Full backups Longer to backup but shorter to restore. Incremental backups Longer to backup but shorter to restore. Usually use combination of: Full backups and incremental backups Restore most recent full backup media and all incremental media that have changes on them. Takes least amount of storage Quickest method for backing up Restore takes longer need all tapes and disks. Full backups and differential backups. More time consuming Restore faster/easier because backup data stored on fewer disks/tapes. Restore most recent full backup media and all incremental media that have changes on them. Differential backup backs up selected files that have changed since last normal or incremental backup. All files that have archive bit on are backed up Backup complete archive bit is left on. Need regular backup schedule. Determined by computer usage and how often files are edited. If on network Network administrator takes care of full backup. You take care of data files. Wise to have more than one copy of backup media. Do not store both copies in one place (fire and theft problems). To access Backup Right-click a drive/Choose Properties/Tools Tab/and select Backup Now command button. Can also access Backup from Programs submenu. Backup can be used to Archive data. Make room on hard disk by copying seldom-used files to backup medium. Transfer programs/files to other computers. Make new computer look like old system. ACTIVITYUSING BACKUP Using Backup Place MYDATADISK disk in Drive A Activity steps. Click Start/All Programs/Accessories/ System Tools/Backup Switch to Wizard Always Start in Wizard Mode should have a check mark Click Next/Backup files and Settings/Next/Let me choose what to backup/Next/plus sign next to My Computer Expand Drive C Locate and expand WUGXP folder Click WUGXP in left pane be sure not to place a check mark in the box In right pane locate and check boxes in front of AST.99/AST.NEW/AST.TMP/ ASTRO.TMP/ASTRO.TXT Click Next Select Backup and key in ASTRO Click Next/Advanced/down arrow in drop-down list box/Next Clear all options Click Next/Next Now is selected Click Next/Finish/Report button Close Notepad then Click Close Open Windows Explorer/Drive A Close Drive A window. Activity completed. RESTORE Restore Backup option/Restore Wizard Used to copy some/all of files to original disk/another disk/or directory. Can choose which backup set to copy from. To restore Choose Restore and type of restoration. OR Choose Restore Wizard. ACTIVITYRESTORING FILES Restoring Files Activity steps. Click Start/All Programs/Accessories System Tools/Backup/Next Restore files and settings/Next MYDATADISK is in Drive A Click plus sign in left pane In right pane, click last entry in list In left pane, click check box (next to Drive C)/Next/Advanced command button/down-arrow (in Restore files to drop-down list box) Click Original location/Next Replace existing files/Next/Next Finish/Report command button Close Notepad/Restore Progress dialog box Click Start/All Programs/Accessories System Tools/Backup Advanced Mode/Restore and Manage Media tab/Schedule jobs tab Close Backup window Activity completed. AUTOMATED SYSTEM RECOVERY (ASR) Automated System Recovery (ASR) Built in repair system for a catastrophic failure of system. Saves information about disk partitions arrangements, system files and detected hardware Saves contents of system drive to some backup media. During process creates floppy disk that is pointing to location of backup files. Feature not available on WXP Home Edition. Repair system relies on creation of an Automated system Recovery (ASR) Created in Advanced Mode of Backup Need ASR, availability of backed up system files & WXP installation CD to: Boot system. Repair corrupted system. Fix corrupt Registry. Does not save program files or data files. Not substitute for backing up data. Used for system problems. Restores system, as it was when ASR was made/upgraded. To repair damaged version of WXP Boot system from WXP installation CD or setup floppy disk. Asked if you want to install WXP or repair damaged version. To Repair, press and follow directions. THE REGISTRY The Registry WXP is customizable OS keeps track of Configuration information System information i.e. hardware, applications, users. PREVIOUS VERSIONS OF WINDOWS Initialization files (used in previous versions of Windows). .INI file extension (comes from initialization files). Used to store information (users, environmental parameters, and necessary drivers.) Two types of initialization files in System initialization files. Windows created the system .ini files (WIN.INI and SYSTEM.INI). Configuration files contained info Windows needed To run itself. To run programs installed on specific computer. Private initialization files. Application programs create private .INI files. Kept track of state of application, i.e., screen position or last-used files. W had two primary initialization files. To run windows both files were needed. WIN.INI file Information on how system behaved. Primary location for software configuration information. Specific system-wide information added by software application. SYSTEM.INI file. Pointed OS to correct hardware and software components such as device drivers. Primary location for computer hardware system information. Also used REG.DAT file. Registration database Information about -- How various applications open. -- How some print file extensions. -- How OLE objects handled, etc. Not ASCII file Only edited by REGEDIT NOW WINOWS XP USES SINGLE LOCATION, CALLED REGISTRY FOR HARDWARE, SYSTEM SOFTWARE AND APPLICATION CONFIGURATIONS INFORMATION. Old files available for legacy application programs. Registry Information comes from Installation of Windows XP. Booting of Windows XP. Applications. System and user interaction. Every part of W uses Registry Registry files kept in %SystemRoot%\System32\Config. Registry files (backed up) kept in %SystemRoot%\Repair\RegBack. Registry can be restored by Use ASR disk choices available to restore Registry by using Recovery Console. Text based command interpreter allows system administrator to access hard disk and files. Beyond scope of text. Last Known Good Configuration option Use arrow to highlight title then press Safe Mode Press key Loads minimum drivers and functionality that allows Windows XP to run. Go into safe mode presented with Startup menu Allows you to troubleshoot different types of problems. System Restore easier way to solve many problems. SYSTEM RESTORE System Restore Used to undo changes made to computer and restore computer to Desirable State Does the following: Rolls back computer to more stable state. System Restore keeps track of changes made at specific times Tracks when new software program installed Above times called restore points Can create own personal points Restore points allow you to roll back your computer to when everything was working correctly. Saves email messages, browsing history, and so on Does not save or restore documents. For computer system not data files May select which dates you want to restore to (use calendar) Provides several restore points Creates initial system checkpoint when you upgrade or install WXP Regular checkpoints created daily and at significant events Restore points created prior to update if Windows Automatic update is used. All system restores are reversible. If restore point selected not successful can undo it. ACTIVITY USING SYSTEM RESTORE Using System Restore Activity cannot be done in lab environment Activity steps. Click Start/All Programs/Accessories System Tools/System Restore Create a restore point/Next Key in Pre-Wonder Click Create/Close/Start/All Programs Accessories/System Tools System Restore Be sure Restore my computer to an earlier time is selected. Click Next/Show previous button/Cancel Activity completed. PLUG AND PLAY AND DEVICE DRIVERS Plug and Play and Device Drivers Prior to W95, adding hardware was an involved process. Physically added hardware. Each component needs access to system resources (such as IRQ and DMA channels). Make software changes. Hardware devices need software support found in driver files that must be installed. Need some technical expertise to adjust settings so hardware devices work. Plug and Play (Plug it in and play it). Industry standard developed by Intel and Microsoft. Automates adding new hardware to computer. WXP better than W95/98/2K Professional Process. Install hardware. Boot system. Windows XP Detects hardware device. Makes appropriate adjustments to system. Windows XP added support for new types of devices. Universal serial bus (USB). USB devices share common connector do not need to be configured manually. IEEE 1394 high-speed serial bus. Used by devices that need fast data transfer (Scanners/Video cameras.) For Plug and Play to work, need Computer with Plug and Play compatible BIOS. Device to be installed is Plug and Play compatible. OS is Plug and Play compatible (W2000 is). Full support in WXP requires Advanced Configuration and Power Interface (ACPI) compliant system board. BIOS. OS WXP. Device to be installed. Drivers for that device. Legacy hardware. Hardware that is not Plug and Play compatible. WXP solves hardware conflicts with older computer/devices. Use Add/Remove Hardware wizard in Control Panel. If hardware conflicts occur use Device Manager. To add updated drivers. Help identify problems. ACTIVITYLOOKING AT PLUG & PLAY Looking At Plug and Play Activity steps. Click Start/My Computer/Properties Hardware tab/Device Manager Expand and then collapse Computer entry Locate and double-click System devices Right-click Plug and Play Software Device Enumerator. Click Properties/Driver tab (if available) Driver Details/OK/Cancel Minus sign next to System Devices. Select and expand Sound, video and game adapters Right-click sound card. Click Properties/Driver tab/Cancel Collapse entry Close all open windows. Activity steps. THE PAGING FILE The Paging File Previously called swap file. Space on hard drive used as virtual memory when system runs out of physical memory. Paging file is dynamic (shrinks/grows). Pros/cons of paging file. Slows down performance. Using disk vs. memory. Gives user more room to operate. Can set place and size of paging file. Microsoft recommends letting Windows manage paging file. Reasons for setting place/size of paging file. Second hard drive free of executable programs. Large hard drive with little information. Increases paging file size. Place paging file on drive with fastest access time. ACTIVITY LOOKING AT SETTING UP YOUR PAGING FILE Setting Up Your Paging File Activity steps. Click Start Right-click My Computer Click Properties/Advanced tab Settings command button (in Performance Options) Advanced tab/Change command button Question mark in title bar Initial size (MB) text box Cancel/Cancel/Cancel Activity completed. ADMINISTRATIVE TOOLS AND SYSTEM INFORMATION Administrative Tools and System Information System Information Collects/displays system configuration information for local/remote computers Includes hardware configuration, including driver information. Used to view/access different tools Use to find information required by support technicians. Saves data files in files with .nfo ext Microsoft Management Console (MMC) Tool to create/save/open collection of administrative tools (console). Framework that hosts admin tools. Go over Figure 11.5Administrative Tools, (PowerPoint slide) Component Services. Programming tool used to create/configure/maintain COM applications. Tool rarely used by user. Computer Management. Manage disks, and local and remote computers. Has information about computer system. Data Sources (ODBC). Programming/Administrative tool to access data from various database management systems. Event Viewer. Gathers hardware/software and system problems information. Monitors security events. Local Security Policy. Allows Security administrator to configure security levels for local computer policies. Performance. Logging counter/event data/generating performance alerts features. Services. Can start/stop/pause/resume services on remote and local computers. Can configure startup and recover options. Services include tasks as running scheduled tasks or starting network connection. ACTIVITYUSING SYSTEM INFORMATION AND COMPUTER MANAGEMENT Using Computer Management Activity steps. Click Start/All Programs/Accessories/ System Tools/System Information Expand Hardware Resources. Click IRQs/Tools Collapse hardware resources Close System Information window Click Start/Control Panel Double-click Administrative Tools/Computer Management Storage should be expanded Double-click Disk Management Close Computer Management/Control Panel Activity completed.TEACHING SUGGESTIONS  SLIDES 2-7 Chapter Overview duplicated in PowerPoint slides. After completion of lecture, suggest to students that they review Objectives and Outcomes found on first page of chapter as a check to see if they have mastered concepts. SECTION 13.1 (pp. 720-723)  SLIDES 8-20 A truism not if you will have problems with hard drive, but when. Support power management Places computer on standby (when idle). Monitor/hard disks turned off. Computer uses less power. Minimize wear on system. Hibernation. Turns off monitor/hard disk. Saves everything in memory on disk. Turns off computer. Head crash = Hard disk failure. Read/write head comes into contact with platter Magnetic coating where data recorded damaged. Virus = A program that has damaging side effects. Can be intentional/unintentional. Can destroy computers hard disk/data. Popular virus protection programs: Norton AntiVirus and Network Associates (formerly McAfee) VirusScan. Surge protector (surge suppressor) = Prevents surges from reaching computer. UPS (Uninterruptible power supply) =--Provides backup power supply. Locked system = Keyboard, mouse, and program are frozen. NTFS (New Technology File system) Volume = disk partition. Chain = A pointer, (when referring to FAT), that links clusters together. Lost clusters Marked by WXP as being in use but not representing any part of the chain of a file. Fat knows clusters are occupied by data does not know to which file clusters belong. Clusters have no directory entry in directory table and do not belong to any file. Lost clusters are debris resulting from incomplete data. Lost files converted into files View contents - see if you want data. Files stored in root directory. Have extensions of .chk. Discussion Question (1) What are three occurrences that can cause a loss of data on a hard drive? Discussion Question (2) What is the purpose and function of the Check Disk program that comes with Windows XP Professional? SECTION 13.2 (pp. 723-725)  SLIDE 21 Choose error checking invoke Check Disk Two check disk options: Automatically fix file system errors Scan for and attempt recovery of bad sectors Selecting this option automatically activates first option. Status bar indicates programs progression. SECTION 13.3 (p. 725)  SLIDES 22-24 Cache = storage area for often used information that can be accessed quickly. Many programs do not delete temporary files. Discussion Question (3) What is a cache? Discussion Question (4) What is the purpose of Disk Cleanup? What benefits do you gain from running this program? SECTION 13.4 (pp. 726-730)  SLIDE 25 Analysis of students computers not the same. Be sure to view files before eliminating them. Discuss other options that free up disk space. System Restore Utility used to restore computer to a previous state if a problem occurs with WXP Works with WXP files and Registry Does not affect data files. WXP creates a restore point daily and at time of significant events (installing new program/new device driver/etc. System restore points take up lots of disk space. Discussion Question (19) What is the purpose and function of System Restore? Discussion Question (20) What is a restore point? SECTION 13.5 (pp. 730-731)  SLIDES 26-30 WXP keeps track of data (grouped into files). File = Program, or collection of related information (data) stored on a disk. Contiguous - in contact or touching. Contiguous files = Files written to adjacent clusters on a disk. Noncontiguous files = Files written to a disk in nonadjacent clusters. Sector = portion of a track (data stored in tracks) that is 512 bytes long. Clusters = Smallest unit WXP handles. Discussion Question (5) - Compare and contrast contiguous and noncontiguous files. SECTION 13.6 (p. 731)  SLIDES 31-32 Defragger (disk optimization program) = A means to optimize performance on a disk. Rearranges files/programs/empty spaces on hard drive. Not a disk compression program -----Does not compress data. In System Tools, WXP provides Disk Defragmenter Good time to run disk defragmenter program is overnight, or when away from computer. Cannot use Disk Defragmenter on floppy/network. If disk defragmenter program run every couple of weeks decreases running time as program will have less to do. Discussion Question (6) - How does the Disk Defragmenter utility help optimize disk performance? Discussion Question (7) - List and explain two factors that should be considered before defragmenting your disk. SECTION 13.7 (pp. 731-735)  SLIDE 33 Floppy disks cannot be defragmented. Can start defragment from menus or from a property sheet Line color indicates files current status. Volume Information reports statistics describe volume size, cluster size, and used, free and percentage of free space. Show students how to interpret Analysis display bar. Discuss View Report. SECTION 13.8 (pp. 735-736)  SLIDES 34-35 Task Scheduler = wizard for scheduling any program to run at any time. Example of using Task Scheduler: Dial online during off-hours, search for certain topics, download results, hang up. Need program for this task before it could be scheduled. Discussion Question (8) List and explain two ways that the Task Scheduler wizard could be used. SECTION 13.9 (pp. 736-740)  SLIDE 36 Can schedule program to run at almost any interval Must identify user responsible for starting this task by keying in users name and logon password. When clicking Advanced on menu bar can: Pause or stop using Task Scheduler. Look at log of completed tasks. Notified of any missed tasks. Task Scheduler files have extension of .job. SECTION 13.10 (pp. 740-743)  SLIDES 37-46 Backup = Making copy of file for safekeeping. Prior - used floppies - time consuming. Now - use tape backup unit, removable drive (Zip or Jaz drives), or special tapes. Discuss difference in backing up files on different types of media. Making back ups critical if data on hard disk lost no need to recreate it (can copy data back to hard drive from tape/floppy/etc.) For back ups to be useful, need to back up data regularly. Archive bit = File attribute (archive flag). Gives backup history of a file. Archiving file = Archiving to save a file usually refers to long-term storage. Full backup = Backup procedure that backs up every file on a disk. Full system backup does what full back up does, but also copies system files including Registry. Registry = Contains all of systems settings and allows system to function properly. Differential backup = Backs up all selected files that have changed since the last time an All selected files backup was used. Incremental backup = Only backs up files that have changed since last full or incremental backup. Archive data = Information stored in archive files. (See Archive Bit above). - Archiving a file removes a file from hard disk and stores it on another medium for historical purposes. Compare and contrast differential and incremental backups. - Incremental saves time when doing backup. - Differential saves time when restoring files. Stress importance of doing test restore to be sure restore is working. Discuss - Various backup mediums. - How often backups should be done & why. - Importance of having more than one copy of backup. Discussion Question (9) - Why is it important to back up data? Programs? Discussion Question (10) - Compare and contrast full (normal) and incremental backups. Discussion Question (11) What is the difference between using a differential backup or using the daily option for incremental backups? Discussion Question (12) - Why is it wise to have more than one copy of your backup? Discussion Question (13) List and explain two ways that the Backup Program can be used. SECTION 13.11 (pp. 743-751)  SLIDE 46 Backup requires writing information to hard disk each system unique steps are only one example of how to use Backup If doing activity on PC only doing incremental backup of some files. Should not and cannot perform this activity if on a network. Discuss Backup and Restore Wizard. Backup files and settings 4 backup choices Personal documents and settings Documents/settings of everyone who is a user on system All information on computer (includes creating ASR disk including Registry and other key system files. What you want to back up Note: default \setting is to back up My Documents and settings. Compare Backup Wizard window with Explorer Window. Wizard wants to know where to back up to. Backup creates file. - User decides device/file name to use. Discuss types of backups. - Normal, Copy, Incremental, Differential. SECTION 13.12 (p. 751)  SLIDE 47 Suggest to students to periodically do a practice restore to ensure that backup is working correctly (i.e., bad tape, not copying, etc.) SECTION 13.13 (pp. 751-758)  SLIDE 48 Activity one example of how to restore. If doing activity on PC only doing incremental backup of some files. If on a network do not/cannot do this activity. Files can be restored to original location/alternate location/single folder. Discuss option buttons to select and restore files that are on disk. Restore remembers which drive and folder files came from. Wizard used but Backup/Restore can be used. Discussion Question (14) Explain how you can restore files. SECTION 13.14 (pp. 758-759)  SLIDES 49-51 Process is automated requires a fair amount of preparation. Choose location that can handle large files Zip disk or another drive on a network. Update ASR when any change made to system. Emergency repair process also relies on data saved in %SystemRoot%\Repair Folder Notation %SystemRoot% indicates a variable name. Substituted name of your Windows folder. Discussion Question (15) The Automated System Recover (ASR) is not a substitute for backing up data. Explain. Discussion Question (16) What is the purpose and function of the Automated System Recovery (ASR)? SECTION 13.15 (pp. 759-761)  SLIDES 52-60 Initialization of files discussed because of downward compatibility. Initialization files = Files that initialize program/process. - Earlier Windows version, OS and most application programs stored information about users, environmental parameters and necessary drivers in .INI files WIN.INI and SYSTEM.INI files were needed to run Windows and programs installed on specific computer. SYSTEM.INI for hardware settings. WIN.INI for user settings. Also needed REG.DAT for file associations, various private initialization files, and object linking & embedding. Discussion Question (17) Compare and contrast system and private initialization files found in previous versions of Windows. Discussion Question (18) What is the purpose and function of the Registry? SECTION 13.16 (pp. 761-762)  SLIDES 61-62 Making changes to system settings (hardware/software) can cause computer/devices to no longer work or to work incorrectly. System is in an undesirable state. Discuss why System Restore cannot be used to save data. Amount of changes saved depends on computer usage, hard disk size, amt. of space allocated to store System Restore Information Typically one to three weeks. Discussion Question (21) If you use System Restore, is it still necessary to back up your data files? Why or why not? SECTION 13.17 (pp. 762-765)  SLIDE 63 Created restore point make description brief but meaningful Displayed restore points - Any date that is in bold on calendar holds a restore point SECTION 13.18 (pp. 765-766)  SLIDES 64-68 IRQ = (Interrupt Request Line) signals CPU to get its attention. DMA (Direct Memory Access) devices. Use DMA channels to access memory. Do not go through CPU. Hardware conflict (device wont work). Devices competing for same IRQ or DMA channel. Software drivers = Provide software support for/or drive the hardware. Called drivers because they drive the hardware. Sometimes called Plug and Pray. Computers manufactured between 1995 and 1998 use Advanced Power Management (APM) BIOS\ or Plug and Play BIOS. Plug and Play setting in BIOS needs to be set to off. See computer documentation on how to do this. SECTION 13.19 (pp. 766-771)  SLIDE 69 Determine if computer is compatible with Plug and Play. ISA Plug and Play BIOS. ISA Plug and Play bus on older system. Not all devices have a Driver tab because not all devices have drivers. Driver tab Driver Details Update driver Roll back driver Uninstall Device manager window tells you if devices are working properly. ? = Problem and device is disabled. Explanation point enclosed in a circle = Device has a problem. Can look at each device on system and review its properties and attributes. Discussion Question (23) Why would you want to roll back a driver? Where would you accomplish this task? SECTION 13.20 (pp. 771-772)  SLIDES 70-73 Computers system performance impacted by Amount of physical memory. Processor. Swap file = Windows swaps information to and from hard disk when needed. Demand paging = Process of swapping information to and from hard disk. Virtual memory = Memory that doe snot actually exist. Can extend size of computers memory by using a disk to simulate memory space. Compare virtual and regular memory. Discussion Question (22) What is a paging file? Explain some of the advantages and disadvantages of paging. SECTION 13.21 (pp. 772-774)  SLIDE 74 ACTIVITY IS SPECIFIC TO MACHINES USED FOR DEMONSTRATION. Can specify virtual memory settings. For best performance follow Windows suggestions Set initial size to equal or greater than recommended size Must be administrator to make any changes SECTION 13.22 (pp. 774-775)  SLIDES 75-77 Console = Collection of administrative tools. Full exploration of MMC beyond scope of this textbook. Administrative Tools folder found in Control Panel. Many tools in Administrative Tools require user to have administrator privileges. Can add Administrative Tools to Start menu using Taskbar and Start Menu Properties sheet. Counter log Can record data about items as hardware usage and also provide alerts. Can set an alert on counter defining that message be sent when counters value equals, exceeds, or falls below some specified setting. Discussion Question (24) What is system information? Identify two kinds of information you could locate in this tool. Discussion Question (25) What is the Microsoft Management Console (MMC)? SECTION 13.23 (pp. 776-777)  SLIDE 78 System Summary View all info about computer system Tools that can be used. System Restore Net Diagnostic checks network connections File Signature Verification Utility maintains integrity of system detects changes Direct X enhances multimedia capabilities provides access to display and audio cards Dr. Watson detects system information and program failures records information in log file (used by technical support professionals) Disk Management Graphical tool for managing disks. Support for partitions and logical drives. Allows online administrative tasks without shutting down system or interrupting users. Provides shortcut menus to show tasks that can be performed on a selected object. Must be administrator to use. Instructor: Prof. Michael P. Harris Chapter 13 ITSC 1405 Intro to PC Operating Systems File and Disk Maintenance Carolyn Z. Gillay, Bette A. Peat, Windows XP Command Line Page  PAGE 20 Franklin, Beedle & Associates 2003 ISBN: 1-887902-82-1   3456 ) 9 ; F H R AMNgjgjkp $45 h>l5CJh>l5CJ\ h>l5] h>l56 h>l\ h>l>* h>l5\ h>l5>*h>l5>*\jh>lUmHnHu h>l5hvh>lB%5FW7 ] ^ `'DDDb0Db0DՃDՃDՃDՃDDuDՃ & F$If$If$If & F h$If^` & F h$If^` & F h$If^` & F h$If^`$If$Ifdgdv  ) ; H T  & B s DHDHDՃDHDHDHDՃDDDDDDHDHDHDHDՃDHDHDՃDH 8$If^8gdv & F$If^ & F$If^ & F8$If^8 & F$If^  : d D1NDHDHDHDHDՃDHDHDHDՃDՃDHDՃDՃDՃDՃDHDHDՃDHDH & F h$If^ & F h8$If^8 & F$If^ & F8$If^8 & F$If^%;Gk:[gDHDHDHDDDHDHDHDHDHDHDHDՃDHDHDHDHDH & F h$If^ & F8$If^8 & F$If^ & F h8$If^8 h8$If^8gdv & F h$If^gXpB^uDՃDՃDՃDՃDHDՃDHDՃDb0DHDHDՃDDDDDDDDDD$If  !$If & F$If^ & F$If^ & F8$If^85G`5VjDDHDHDHDHDHDDՃDHDHDDDHDՃDHDHDH & F8$If^8 & F$If$If & F8$If^8 & F$If^ & F 8p @ $If^ & F 8p @ $If$If5:;FRS`ef<Hnt=>wx*2BDZb(~ h>l>*hv h>lCJ h>lCJ hvCJ hv5CJhvh>lCJ h>lCJ\h>l h>l5CJ h>l5 h>l\Hju<JXsDHDՃDHDHDHDHDHDHDHDHDHDHDDDHDHD & F8$If^8 & F 8p @ $If  !$If & F8$If^8 & F$If^ & F h8$If^ & F$If^ *Hn>YxD^D^D^D^D^DDv:Dv:Dv:DDDDD^DDDHDDDD$If$If & F$If^ $If^gdv & F8$If^8 & F$If^EdGi$5[DHDHDՃDHDHDՃDHDHDHDՃDHDHDHDHDHDՃDHDHDՃ & Fp$If^p & F$If^ & F$If^ & F8$If^8 & F$If^ & F$If*QSl~DDDDDDDDDHDՃDHDՃDՃDHDHDՃDHDHDՃDՃDՃD  !$If & F8$If^8 & F$If^ & F$If$If$If~4:ej     R b l!!!!!!!!! " """""=">"a"n"s"t"x"y""""""""-#3###M$V$$% h>l5>*hv hv5 h>lCJ\ h>l\ h>lCJ h>l5CJ h>l5h>l5CJ\h>lh>l5>*\J9Qs4@et   2 DDDDHDHDHDDDx!DDD^D^DEDDHDDD & F8$If^8 & F$If^ & F 8p @ $If` & F 8p @ $If$If  !$If2 R b !!"!#!$!B!W!f!!! "8"n"DHDHDՃDHDHDHDՃDDDDDHDHDDHDDՃD & F8$If^8 & F 8p @ $If$If$If & F$If^ & F8$If^8 & F$If^ & F$Ifn"y""""""" #-#p#######$DDDDHDDDDHDHDՃDՃDHDՃDDDDH $If^gdv & F8$If^8 & F$If^ & F$If$If$If h$If^hgdv & F$If^ & F8$If^8$-$W$}$$$%;%m%%%%5&I&&&&G'u'''''(DHDՃDՃDՃDՃDHDՃDՃDՃDHDՃDՃDHDb0DՃDHDb0DՃDHDHDՃDՃDH & F$If^ & F$If^ & F$If^ & F8$If^8%;%F%x%%%%%%%5&G&I&&&&&F'G't'u''''F(H(T(0)1)z))))**7*8*h*i********E+F+++++,,c,g,.....//"/)/*/E/F/_/e//ʱʽh>l56CJ\] h>lCJ h>l5CJh>l5CJ\ h>l5\h>l5>*\ h>l>* h>l5>* h>l\hv h>l5h>lF(F(G(H(T(m((((()1)^)z)))*8*i****F++DՃDDDHDHDՃDHDՃDHDՃDHDՃDHDHDb0DHDHDՃDHDHDb0Db0D & F$If^ & F8$If^8 8$If^8gdv & F$If^++,&,c,d,e,f,g,u,,,,7-H-----6.b...DՃDՃDHDՃDDDDDHDՃDHDՃDՃDHDb0DՃDHDHDՃDՃDՃD$If $If^gdv & F8$If^8 & F$If^ & F$If^...../*/_////@000000011&161V1DDHD^DHDD^DDx!Dv:DHDDDDDv:Dv:Dv:DDDD^D $If^gdh & F8$If^8 & F$If^ & F 8p @ $If$If//////00?0@0q00000000001 11161<1V1\1c1o1u1z1111112_3e3333333#4%4+4444444"5(565J5K5L5l5>7C7n9999ȼȼ h>l>*hh h>lCJ\ h>l\ h>l5CJhh5CJ\ h>lCJ h>l5\ h>l5h>l5CJ\h>lh>l5CJ\CV1u1111111162`2k22222DDDHDHDDDHDHDՃDHDHDHDHDD$If & F8$If^8` & F$If^` & F 8p @ h$If^h`  !$If$If & F$If^ & F8$If^82222 3&3F3_3|33%4,4C4d444444"565DHDHDD^D^D^D^DD^Dx!DD^D^D^DDD^D^DD & F$If^ & F8$If^8 & F$If^ & F 8p @ $If65J5K5L5l555"6W6667>77DHDDDDHDՃDb0DՃDՃDՃDՃyDHyDՃ & F 8p @ 8$If^8 & F 8p @ $If^ & F$If & F$If & F$If & F 8p @ $If$If$If h$If^hgdh & F$If^ 777778.8e8888*9+9,999F9Z9DHDHDHDHDHDHDՃDHDՃDՃDՃDDDDHDH & F$If^ & F$If$If 8p @ $If & F 8p @ 8$If^8 & F 8p @ $If^ & F 8p @ $If^Z9999999:U::::,;^;m;;;;9<a<<<<DՃDՃDDD^DՃDՃDՃDb0DHDHDՃDՃDHDՃDHDՃDb0DHDHDHDՃ & F$If^ & F$If^ $Ifgdh & F$If^ & F8$If^89999>:R:::;;==>>?AAABBDDDDVFWFYFZFzFFFF(G/G:G@GGGGGGH"HHHHH,I8I#JJJJJ(N1N2NLNNN䮢 h>lCJh>l56CJ\]h>l5CJ\h>l5CJ\ h>l\hhh>lCJaJh>l56>*\]hh h>l>*h>l h>l5h>l5>*\hhhhCJaJ:<<1=B==========>x>>>?Q?q?????DՃDՃDHDb0DՃDDDDDDDHDHD DHDHD| DՃDHDHDHDHDH & F$If^ 8$If^8gdh & F8$If^8 & F$If^??"@b@@@+AAAkAAAAAAAAAAAB5BmBDHDՃDՃDHDb0Db0DHDՃDՃDDDDDDDD^DHDb0DՃDՃ & F$If^ 8$If^8gdh & F$If^ & F8$If^8 & F$If^mBBBBBC%COCCCCCZDDDDE0EDՃD^DDHDՃDHDՃDՃDՃDHDHDb0DՃDHDHDՃDH & F h$If^ & F h8$If^8 & F h$If^ & F 8p @ $If$If 8$If^8 & F$If^0ErEEEFWFYFZFzFFFFFF G(GDՃDՃDb0DHDՃD^DDDHDDHDD^D^D^ & F$If^ & F8$If^8 & F$If^ & F 8p @ $If$If$If 8$If^8gdh & F h8$If^8 & F h$If^(G:GAGaGzGGGGHH"HCHzHHHHQIDDD^D^D^DDDHDDDHDՃDHDb0DHDb0 & F"$If^ & F"$If^ & F"@$If^@ & F"$If  !$If$If & F$If^ & F$If^ & F8$If^8QIIII#JJJSJeJsJ~JJJJJK\KKKKDՃDHDՃDՃDDHDHDHDHDHDՃDDՃDHDՃDHDՃDH $If^gdh & FO$If^ & FO$If^ & FO$If^ & FO$If^ & FO$If^ & F"$If^KLGLrLLLLLMM,M[MMMMN'N(N)N*N+NDՃDՃDՃDHDb0DHDHDHDHDHDՃDՃDՃDՃDHDHDDDD$If  !$If & FO$If^` & FO$If^ & FO$If^ & FO$If^`+N,N-N.N/N0N1N2NRNkN{NNNNN OAOHOmOOOODDDDDDD^DDHDHDD^D^D^DHDDHDDDHD & F$If^ & F8$If^8 & F$If^ & F 8p @ $If$IfNNNNN OO?OAOHO]OlOmOOOOOOOOOOOPPP%P,P>PNPOP^P_PnPoPPPQQRR S SSSS%S0S7SiSxSySSSSSSSSSTT1T]TpTh>l5>*\h>lh>lCJaJh>l5CJ\hh h>l>*hhh>lCJaJh>l5CJ\ h>lCJh>l h>l5 h>l\ h>l5CJ h>lCJ\@OOP&P>PNPOP_PoPPPQ"Q:QQQtQQQR2R\RDHDHDDDHD^DDHDHDb0DHDHDHDHDHDHDՃDՃDՃDH & F$If^ & F8$If^8 & F$If$If$If & F$If^ & F8$If^8\RxRRRRRR SS1S8SPSSSSSSTDHDՃDDDDHDDDHDD^DD^DDDDH & F$If^ & F8$If^8 & F$If^ & F$If$If$If $If^gd>l & F8$If^8gdh & F$If^TT1T]TpTTT!UZUUUUVJVD^DDHDHDՃDՃDHDՃDDHDՃDHD & F h8$If^8 & F8$If^8 & F 8p @ $If^ & F 8p @ 8$If^8 & F 8p @ $If^ & F 8p @ $If$If pTTTZUUUUUUU VV7VJV^VVVVVVVW&W'W(W)W*W?WWWWWWXiXwXXXYY2Y3YYYYY/Z0Z7ZIZKZLZRZ]ZZZZZZZZ[[ [ż h>l5CJh>l5CJ\h>lh>l5CJaJh>l5CJaJh>lh>lCJaJh>lh>l5h>l5>*CJ\ h>l5h>l5>*\ h>lCJ h>l5\h>l?JV^VVVVW'W(W)W*W?WWWWWXjXwXXXY3YYYDHDb0DHDHDՃDՃD^D^D^DHDb0DHDՃDHDHDb0DHDb0DHDb0DՃDb0D^ $If^ $If^gd>l & F$If^ & F$If^YYYY0ZLZ]ZyZZZZ[![I[][r[[[[DDHDHDDHDD^D^DHDD^DHDDD%DD & F$If$If $If$If $If^gd4 & F8$If^8 & F$If^ & F 8p @ $If$If [!['[I[\[][r[s[u[[[[[c\\\\\\\\\\\\\k]y]]]P^Q^R^Z^]^^^5_6_7_Y_____`#`$`-`<`=`B````BaCaaaaa h>lCJ h>l5CJ h>lCJ\ h>l5>* h>l\hv hv5 h>l56jh>l5Uh>l5>*CJjh>l5U hJnvhJnvh>l5CJ\h>l h>l5<[^\_\`\a\b\c\\\\\k]]P^Q^R^^7__DO DDDDDDD%DDD DO D DDDO DeD & F$If $Ifgdv & F$If & F$If & F$If  !$If $If$If & F$If__`$`=``aaRbSbb3c4c5c6c7c8c9c:c;cDDDKJDKJDDSDsD DDB DB DsDDDDDDD$If  !$If & F !$If h$If & F$If h$If^h & F h$If & F$IfaSbjbbb4cTcYc\chccccccc&dadbdddddddd1e2e4eKe_eveeeeeefff4fffff9g:gggg1hIhfhhhhhhj9h>l5U hvCJh>l5>*\jh>l5Ujh>l5U h>l5\h>l5CJ\h>l5>*CJjJh>l5U h>l5 hv5hv h>lCJ h>l5CJh>l9;cc?c@cAcBcCcDcEcFcGcHcIcJcKcLcMcNcOcPcQcRcScTcUcVcWcXcDDDDDDDDDDDDDDDDDDDDDDDDDDDDD$IfXcYcZc[c\c]c^c_c`cacbcccdcecfcgchcccccbddddDDDDDDDDDDDDDDDDDD%DDKJDQ DKJDD$If & F$If & F 8p @ $If$Ifdddde3e4e_eeeeeeeeeeeeffDD%DDDKJDD[D{ DDDDDDDDDDD%D  !$If & F$If & F$If 8p @ $If^`$If$Iff4fcffffffff:gggggg1hehfhhhhD?DKJDKJDDDDDDDQ D&D?DsDsDsDDDsDD%D  !$If & F$If$If & F  8p @ $If $Ifgdv & F $Ifhhi5ivii j0j1jjjjjjjjjjjjDKJDDKJDDDDKJDDDsDDDDDDDDD$If  !$If & F$If h$If^` & F $If & F $If & F  8p @ $Ifhhhhii5iEiviiiiii jj1jHjjjjjjjjjjj}kkllmmvmmmmmmn o ooooo*op*pupvpppppqrrrrr r'rrrsjrh>l5Ujh>l5Uj( h>l5Uj h>l5Uh>l5>*CJj h>l5U h>lCJ h>l5CJ h>l\ h>l5h>lBjjj}kkl4lllmvmmmmmm)nnnD%DD DDDDeDDB DB DD%DDKJDDKJDeD & F $If & F  8p @ $If & F !$If & F$If & FJ$If & FH !$If  !$If$Ifnnnnnnn ooocopupvppp5qqqqDKJDDDDDDD%DDD DDDD%D DO DKJD & F$If & F$If & F$If & F' 8p @ $If & F&$If  !$If$If & F $Ifqqqrr rrsssss!tpttuDDDD%DDO DDeDDDDDDDe & F,$If & F+$If h8p @ $If^`gdv & F3 8p @ $If & F2 8p @ $If & F4$If h$If$Ifssstt!t2tpt~tttuu uiuuuuHvIvJvYvaxbxyxxxyyyyyyyy=zzzzzz{{{}}~~~~~~~~~~~~~~jah>l5Ujh>l5U h>l5\h>l5>*CJjh>l5U hvCJ hv5CJ h>lCJ h>l5CJhvh>lCJaJ h>l\ h>l>*h>l h>l5hv;uiuuJvwwwaxbxxyyyyy>zDDeDeD DO DD D^DDDB DsDsDD $Ifgdv & F$If 8p @ $If^` & F1 8p @ $If & F- 8p @ $If & F+ 8p @ $If & F+$If & F6$If>z?z@zAzBzCzDzEzFzGzHzIzJzKzLzMzNzOzPzQzRzSzTzUzVzWzXzYzDDDDDDDDDDDDDDDDDDDDDDDDDDD h$If  !$IfYzZz[z\z]z^z_z`zazbzczdzezfzgzhzizjzkzlzmznzozpzqzrzsztzuzDDDDDDDDDDDDDDDDDDDDDDDDDDDD h$Ifuzvzzzz{_{{};}e}}}}}~~~DDD%DD&DDDDDKJDDDKJDDD%D & F9 8p @ $If & F9$If & F7 8p @ $If  !$If$If  h$If h$If~~~~~~~~~5e1^DO DDDDD%DDKJDDDDDDDDsDs & F$If & F !$If & F<$If & F7 8p @ $If & F;$If  !h$If h$If & F: 8p @ $If~5c^v̀΀=UƂ %DEGSqrs{ل$+ !Wo:}9:;SﻰҰh>l5>*\jPh>l5U h>l5\hhhhCJaJhhCJaJjh>l5U hh5hhh>l5>*CJjh>l5U h>lCJh>l h>l5 h>l5CJ;΀π b=DsDsDsDD%DDDDKJDDDD DB DB DDDDDDD  !h$If & F$If  !$Ifgdh & F !$If$If h$If !"#$%&'DTUqrsDDDDDDDDDDDDDDDD%DDD D^D^D' & FM$If $Ifgdh & FK$If & FL 8p @ $If h$If VWXYZ[\]^_`abcdefghijkDDB DDsDDDDDDDDDDDDDDDDDDDD  !h$If & F$If & F !$If h$Ifklmnopqrstuvwxyz{|}~DDDDDDDDDDDDDDDDDDDDDDDDDDD  !h$If h$Ifb89:;DDDDDDDDDDDDDDD%DDO DD DDD^DB DD & F$If & F 8p @ $If h$IfSوڈ܈Ԋ_3Vstv~ʍˍz Aiuď˛ h>l5\h>l5>*CJ\j h>l5U hhCJ hh5CJ h>l5CJh>l5>*\j?h>l5U h>l\jh>l5Uh>l5>*CJjh>l5U h>l5hhh>l h>lCJ6و$z{|}~DDDDDDDD%DDDDDDDDDDDDDD%D & F !hh$If^h h$If  !h$IfRDDeDeDDDDDDDDDDDDDDDDDD h8p @ $If^`gdh & Ff 8p @ $If & Ff$If & Fb$If=_456789:;<=DDDDDDDO DKJD'DDDDDDDDD h$If$If & Fb 8p @ $If & Fb$If h8p @ $If^`gdh=>?@ABCDEFGHIJKLMNOPQRSTUVDDDDDDDDDDDDDDDDDDDDDDDDD h8p @ $If^`VsA.ziDD%DDO DD D DDB DsDsDsDD%DDDDDO & F$If  h$If$If $Ifgdh & F$If & F=$If  !h$If h$If 89;CDE}~B_`bnopx #Vޕ3Ylʘ˘֭hJnv6CJaJh+hJnv6CJaJh>l5CJ\ h>l\j%h>l5Uj.$h>l5U h>l>*CJh>l5>*CJh>l5>*CJj"h>l5U h>lCJ h>l5CJh>l h>l558DE~:;<=>DKJDDB DsDDDDDD%DD DKJDO DKJDDDD & F  8p @ $If & F $If  !h$If h$If & F$If$If & F 8p @ $If>?@AB_opՒ [ VWXYZ[DDDDDD%DDKJDDDDD DsDB DDDDDD & F$If & F$If & F 8p @ h$If & F h$If h$If$If[\]^_`abcdefghijklmnopqrstuvDDDDDDDDDDDDDDDDDDDDDDDDDDD  !h$If h$Ifvwxyz{|}~ߕmDDDDDDDDDDDD%DDͽDYD$If & F$If h$If  h$If  !h$If̘^`'`'j`'j}`'{q`'jq`'jl`'{{`'gdv  !%gdvgdv  !R&gdv !lkdx'$$Ifl0'04 la 5LRSYZ\]h>lh4CJaJmHnHujh+hJnvCJUaJh+hJnv6CJaJh+hJnvCJaJhJnv hvhJnv 0/ =!"#$%Dd\  C *Abd14578_"@@b^,֋S#ޠ"Dn^,֋S#ޠ"PNG  IHDRF}sRGB PLTE3*ծ cmPPJCmp0712 7tRNS@f8IDATWc``d !$$<[UBS#B@> Heading 2$@& 5CJ\DA@D Default Paragraph FontVi@V  Table Normal :V 44 la (k@(No List HOH ChapNum 5CJ$OJQJtH uLOL A headdh$d 5CJOJQJ>O> ChapTitled$dCJ02B@"2 Body Text5<@2< Header  !tH u4 @B4 Footer  !LC@RL Body Text Indent h^htH uVObV IM/ h8p @ h^h`tH uXR@rX Body Text Indent 2 & F^`HS@H Body Text Indent 3 ^.)@. Page Number>zzzzzzzz z z z z zzzzzzzz G f$(K-159Y>B1FJ)O]SQV9[g[^bfkqfruyr|u~:CAi     bRPSOONNOIQ N "M FL J HFXDA@?B>%5FW7 ]^);HT&Bs:dD1N%;Gk : [ g  X p B ^ u   5 G `  5 V j u <JXs *Hn>YxEdGi$5[*QSl~9Qs4@et2Rb!"#$BWf 8ny -p-W};m5IGu F G H T m !1!^!z!!!"8"i""""F###$&$c$d$e$f$g$u$$$$7%H%%%%%6&b&&&&&&&'*'_''''@((((((())&)6)V)u))))))))6*`*k******** +&+F+_+|++%,,,C,d,,,,,,"-6-J-K-L-l---".W.../>//////0.0e0000*1+1,191F1Z11111112U2222,3^3m333394a4444415B55555555556x6667Q7q777777"8b888+9A9k99999999999:5:m:::::;%;O;;;;;Z<<<<=0=r===>W>Y>Z>z>>>>>> ?(?:?A?a?z????@@"@C@z@@@@QAAAA#BJBSBeBsB~BBBBBC\CCCCDGDrDDDDDEE,E[EEEEF'F(F)F*F+F,F-F.F/F0F1F2FRFkF{FFFFF GAGHGmGGGGGH&H>HNHOH_HoHHHI"I:IQItIIIJ2J\JxJJJJJJ KK1K8KPKKKKKKLL1L]LpLLL!MZMMMMNJN^NNNNO'O(O)O*O?OOOOOPjPwPPPQ3QQQQQQ0RLR]RyRRRRS!SIS]SrSSSS^T_T`TaTbTcTTTTTkUUPVQVRVV7WWWX$X=XXYYRZSZZ3[4[5[6[7[8[9[:[;[<[=[>[?[@[A[B[C[D[E[F[G[H[I[J[K[L[M[N[O[P[Q[R[S[T[U[V[W[X[Y[Z[[[\[][^[_[`[a[b[c[d[e[f[g[h[[[[[b\\\\\\\]3]4]_]]]]]]]]]]]]^^4^c^^^^^^^^:______1`e`f`````a5avaa b0b1bbbbbbbbbbbbbb}ccd4dddeveeeeee)fffffffff gggcghuhvhhh5iiiiiijj jjkkkkk!lpllmimmJnoooapbppqqqqq>r?r@rArBrCrDrErFrGrHrIrJrKrLrMrNrOrPrQrRrSrTrUrVrWrXrYrZr[r\r]r^r_r`rarbrcrdrerfrgrhrirjrkrlrmrnrorprqrrrsrtrurvrrrrs_ssu;ueuuuuuvvvvvvvvvvv5wewww1x^xxxxxxxxxx ybyyyyy=zz{{{{{{{{{{{{{{ {!{"{#{${%{&{'{D{T{U{{q|r|s|}} ~V~W~X~Y~Z~[~\~]~^~_~`~a~b~c~d~e~f~g~h~i~j~k~l~m~n~o~p~q~r~s~t~u~v~w~x~y~z~{~|~}~~~~~~~~~~~~~~~~~~~~~~~~~~~b89:;ـ$z{|}~R=_456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVsA.zi8DE~:;<=>?@AB_opՊ [ VWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~ߍm̐^0000!0!0!0!0!0!000 0 0 0 0 0 0 0 000000 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0!0!0!0!0!0!0!0!0!0!0!0!000!0!0!0 0 0 0!0!0!0!0!0!0 0 0 0 0 0 0 0 0 0 0 0 0 000000000000 0 0 0 0 0 0 0 0 000 0 0 0 0 0 0 0!0 0 0 0 0 0 0 0 0 000 0 0 0 0 0 0 0 0 0000 0 0 0 0 0 0 0 00000 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 000000000 0 0 0 0 0 0 0 0 0 0 0 0 00000 0 0 0 0 0 0 0 0 0 0 0 0 0000 0 0 0 0 0 0 00000 0 0 0 0 0 0 0 0 0 0 0000 0 0 0 0 0 0000 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 000 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 00000 0 0 0 0 0 0 0 0 0 0 0 0 000 0 0 0 0 0 0 0 0 0 0 0 0 0000 0 0 0 0 0 0 0 0 000 0 0 0 0 0 0 000 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0000!0!0!0!0!0!0!0!0!0!0!0!0!0!0!0!0!0!0!0!0000 0 0 0 0000 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0000000 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 000000000 0 0 0 0 000 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0000 0 0 0 0 0 0 0 0 0 0 0 0 0 0 000"!0"!0"!0"!0"!0"!0"!0O!0O!0O!0O!0O!0O!0O!0O!0O!0O!00O!0O!0O!0O!0O!0O!0O!0O!0O!0O!0O!0O!0O!0O!0O!0O!0O!0O!0O!0O!0O!0O!0000000000000 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 000 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0000 0 0 0 0 0 0 0 0 0 0 0 000!0!0!0!0!0!0!0!0!0!0!0!0!0!0!0!0!0000!0!0!0!0!0!0!0!0!0!0!0!0!000 0 0 0 0 0 0 0 0 0 0 0 00 000!0!000000000 0 0 0 000 0 0 0 0 0 0 0!0!00!00!0!000000000000000000000000000000000000000000000000000000000!0!0!000000!0!00!0!0000000000000 !0 !0 !0000000 !0 !0 !0000!0!00000 !0 !0 !0 !0 !0 !0 !00!0000000000000H!0H!0J!0J!0J!00!0!0000 !0 !0 !0 !0 !0 !000000000&!0'!0!0000!0!0!00000004!04!02!03!000+!0+!0+!0,!06!0+!0+!0+!0+!0-!01!00!0!0!000!0!0000000000000000000000000000000000000000000000000000000000007!07!07!09!09!09!09!09!09!00000:!0000000;!07!0;!0zYzuz~k=V>[vNPQRSTVWXY[\]^`abdefghjklmnopqstuwxz{}~O!t8@(  VB  C D"B S  ?5p'tlastff 4z& 5zd"6z_7zt]8z\9zlr:zd" ;z6 >>??@z@@@@JBBBCrDDD,EE(F2FFAGHGmGGGNHOHH"IQI\JxJJPKKpLMMJN^NNN*O?OOOOPjPwPPPQQ0RRRScTTUU$X=XZSZh[[\\]^f``bbveefffgvhhi jppvrruvvvxxz=zzz'{U{~~=b;RPV҄^iEBp{^RS[SDefaultDefaultDefaultDefaultDefaultDefaultDefaultDefaultCarolyn Z. GillayMichael P. HarrisȂ4EQ6ʖ``LkV_ LjdBf;TʖEgLkV`Jtʖ|dʤ=$ʖIuBf;Vu8[I2 ?^_ c  zʖL( o MBf;ʖ)4&<;Y&3ʖYPʖ4Z6fN9dʤ"ʖ%F&[y  0,dʤWʖE  Bf;xT 25%c nkr t6Gx :>_XT dʤtmf F $i9&  I ʖ ʖ ʖ$4 Bf;2A Z6"D 2U  *U,Bf;QLkV1` ʖNBf;5ʖnMʖTʖ!&e6 Ll2)p dV2>6FBf;Gu2}?ʖPA2NCNʖUeiBf;{Ɨ&R$dʤUJ5Zx~0E2fXSBf;@I2Fwʖ'22" T2J:cdʤ!X&Bf; ms%ʖ]B2({VBf;PXʖjHƗ ('2qB`ʖBBf;_Sdʤʖ> LkV@dʤckʖur ʖhs'F&[eBf;GK-ʖ9ʖzBf;3ʖfLkVʖo, Bf; *\ $<G \y.6 ʖl LkV] rք !LkV!XD!LkV*d[!S>db!ʖ$!2Q"Bf;^ 5"n~Eo"ʖ3I"2"]F J"dʤAK.#2&N#dʤ-#Bf;6m#` $X0UP$ʖY$dʤA $ʖ+ %Bf;N@%ʖ1a%Bf;+g%2E%LkVx&2dE&Bf;OK&ʖ<&nO& }RB'LkVD'ʖcM'Ljdc;(Bf;>(_(#S(ʖzj(~NTz;)S:e)iw)Dn=%*2 q.*LkV C*ʖX9dʤbZ9Bf;LW9lH9W:&335:LkVw :ʖ7:*_X;Bf;,a;26;;ʖu<ʖL<ʖfF<@<Bf;R0-=ʖWn=/Ce=n= fID?*j?2/?T?3 Aʖ ALkVT%B)7?BLkVn*C2dcCʖHyD2,&DLkVq1_D2\kDLkV8E2:E/FBf;rFʖS-G֒hGdʤ(HLkVHʖ7 IBf;X-IʖoLdIF&[FI2 QIʖj}I AILkVm<,J/OlJʖaJoJ:JBf;J1Kdʤ,eK\=KBf;{KʖK26L/LʖoeLBf;MLkVM/0Odʤ~]OʖO~m~rPʖ{P2PHPʖ$ QLkV1aQBf;8AuQ ~Qʖ@WRʖg$RLkV*{RʖaS|<{.AS21 DSsFSBf;xkS+OTdʤ1~bTʖUʖI^UʖuULkVj8VLkV,icVBf;<VdzsbWʖ;tW!Xp6 X2X gX2WXF&[|4YyZY'JIYY_IYʖY 1gYʖ,ZFݴjA[(xQP[2jo[X,[ʖ).\G,P\ʖ0f\/\dʤ]LkV}]ʖ]dʤ*^2zC^'JIY*^Bf;lp^h{L_^LkVP_ʖ{t_~NT_3_ʖ~r_ʖg~1`ʖ( E`2J5k`dʤiaLa`b b2GbBf;t \cBf;&`c_+(dBf;8?Qd2]d2,xd2@3dʖddʤ}dXZQe220eeʖ&QjeʖeBf;af myfLkV9^0gʖeMagBf;y g,gʖbOhF&[Wh 9z]hBf;ePh23iʖ3iʖgojLkVj_([sktmldʤD+l fmBf;Q+mʖ/7mdʤ<^6Fq1_DgXt({VG V~cM',icVeBu/ ('QP[ @x+{.ASTzs-#Y]BIu`xey.Y*^[IP0]qtWXbOhhs'TT3n+oLdI~6Lz;);tW1 DSJLaV~tp3`/yCe=*} S4 3dE&fXSE+_uZY9& 8 +-<;+p+iao, "zjxkS)3$vQ|j?_ '^~{P8?Qd @<8EW:'Gux&AK.#sFSxT %*q=3( E`PA8fID?@I/m7 I~0E7:6Gx !&e *\ S-G42A :J+ %).\*d[!]!AqHeMagjy?->(}d` $jo[Mm<,JO#syaSP+6Tetx~,+hG, , Ir|&R$>9d1KsH0fN9]_SY$_x=/z 0,{ 5J:c/\@+OTx,dVr#{,af,xd.-D+lLlFIL()pD*oHyD bU drWhn= cZQe".yvjU}y]ddcC:z |=|ck I t6/J5k`qB`w :.AI q.*7`6``> 7?B_^] s|2h3uUg$Rs\|7E2 A"*s5:0"D |J"Xdb!3iPHP~r_3,gov6#S(P_8}zO~,&D q ~Q1gY=$sbWE%X-Iu<(HW6 TG,P\,[HL1I^U@WRYPl goj1Y|T-ym2~Eo" C*$!9RB'myfQ$ Qf{835:yhp4\kDEg5+n{wUJ585%c ^ 5"*b5<&Vukr [sk3x1a%:E/F?L<.:1O&lp^S:e)jA[B\{YYg~1`wy\=KlYy1~bT|4Ytmf R0-= ?^[yy&`c5M0!XT%BWn=,ZLW9,eK<V6m#"zj({t_B_u mspp)B  1` Mf1B }/ @xh h^h`OJQJo( `d@xhh^h`56CJ OJQJo(T&                !        !        !T&       n>       n>        x*ڥ`VL       n>       !        !                 !        !                 !        T&T&               T&        4>lvJnvh5]S@\S\S \S\Sp@UnknownG Times New Roman5Symbol3&  Arial;WingdingsQ& CommonBulletsSymbol?5 z Courier New"hi&sfRf{I{I!>4dRR3QH(?v2C:\Program Files\Microsoft Office\Templates\IM.DOT!Ch 13 File and Disk Maintenance IM - Lecture OutlineKathryn Emilie MaurdeffMichael P. Harris,                           ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ; < = > ? @ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ^ _ ` a b c d e f g h i j k l m n o p q r s t u v w x y z { | } ~                                   ! " # $ % & ' ( ) * + , - . / 0 1 2 3 4 5 6 7 8 9 : ; < = > ? @ A B C D E F G H I J K L M N O P Q R S T U V W X Y Z [ \ ] ^ _ ` a b c d e f g h i j k l m n o p q r s t u v w x y z { | } ~                                                                          Oh+'0 0@ \h    "Ch 13 File and Disk Maintenance crIM - Lecture OutlineMaiKathryn Emilie MaurdeffathWUGXP-czg-doneMIM.DOTzMichael P. Harrisrd5chMicrosoft Word 10.0@b@H;@Hf"]@B_'{՜.+,0$ hp  Franklin, Beedle & AssociateskIRA "Ch 13 File and Disk Maintenance Title  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~Root Entry Fh¤'Data '1TableWordDocument!>SummaryInformation(DocumentSummaryInformation8CompObjj  FMicrosoft Word Document MSWordDocWord.Document.89q