Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
MARKING SCHEME
Markers are advised that many answers in Marking Schemes are examples only of what might
be expected from candidates. Unless a question specifically states that an answer is demanded in
a particular form, then an answer, which is, correct, factually or in computing practice, must be
given the available marks.
If there is doubt as to the correctness of an answer the recommended textbook should be the first
authority. If doubt persists the scripts should be referred to the Examiner and, if necessary to the
Moderator, for a second marking.
This Marking Scheme has been prepared as a guide to markers. It does indicate what the
examiner was expecting candidates to produce in response to the question set and some questions
in some units will only have one correct solution. However, this is NOT ABSOLUTELY a set of
model answer; NOR is the Marking Scheme exclusive, for there will frequently be alternative
responses which will provide a valid answer.
Page 1 of 15
SECTION A:
COMPULSORY QUESTION
{30 MARKS}
QUESTION 1
a. Discuss FIVE types of operating systems
(10 Marks)
Page 2 of 15
(10 Marks)
either the entire disk (e.g. in an event of disk failure) or selected files (e.g. in an event of
accidental deletion).
Data compression utilities output a shorter stream or a smaller file when provided
with a stream or file.
Disk checkers can scan the contents of a hard disk to find files or areas that are
corrupted in some way, or were not correctly saved, and eliminate them for a more
efficiently operating hard drive.
Disk cleaners can find files that are unnecessary to computer operation, or take up
considerable amounts of space. Disk cleaner helps the user to decide what to delete when
their hard disk is full.
Disk defragmenters can detect computer files whose contents are broken across
several locations on the hard disk, and move the fragments to one location to increase
efficiency.
Disk partitions can divide an individual drive into multiple logical drives, each with
its own file system which can be mounted by the operating system and treated as an
individual drive.
Page 3 of 15
Disk space analyzers for the visualization of disk space usage by getting the size
for each folder (including sub folders) & files in folder or drive. showing the distribution of
the used space.
Registry cleaners clean and optimize the Windows registry by removing old
registry keys that are no longer in use.
System profilers provide detailed information about the software installed and
hardware attached to the computer.
c. Name FIVE preliminary Installation Checks that one needs to do before embarking on
installing windows Xp.
(6
Page 4 of 15
Marks)
ii)
You have the product key available. The product key is located on your Windows XP
CD case and is required to install and activate Windows XP.
iii)
Your computer hardware is set up. At a minimum, you should connect your keyboard,
mouse, monitor, and CD drive.
iv)
You have Windows XP drivers available. Drivers are software that Windows XP uses
to communicate with your computers hardware. Most new computers include a CD
containing drivers. If you do not have drivers available, Windows XP may already
include drivers for your hardware. If not, you should be able to download them from
your hardware manufacturers Web site after you set up Windows XP.
v)
If you are reinstalling Windows XP on an existing computer, you need a backup copy
of your files and settings. The installation process will delete all of your files.
(2 Marks)
Piece of software that works in conjunction with the operating system and whose function is to
allow the op sys to recognize a new device.
SECTION B:
QUESTION 2
a. List and explain five responsibilities of a computer support staff
( 10 marks)
Support users
Most users in any computer system are not specialists/techs and since most businesses rely on computer
systems to manage their information, the system support staff will be necessary to offer the users technical
support
Page 5 of 15
b. Outline FOUR steps that one can follow to create a new Remote connection
(10 Marks)
QUESTION 3
a. Outline the main benefits of implementing an effective help desk
(10 Marks)
(10 Marks)
Page 7 of 15
QUESTION 4
a.
(10 Marks)
a.
Remote desktop access makes data and applications on your home or business
desktop computer available from a laptop or other internet-connected computer
located elsewhere.
b.
An advantage of remote desktop access is that you dont have to spend time copying
data to disks, a pen-drive, or CD-RWs to bring with you, and there isnt the potential
that you will forget to copy an important file. Your home or business computers hard
drive is also less likely to fail than some types of removable media.
c.
In addition to copying data to removable media and bringing it with you, other options
include using an online desktop or a online file storage service. An online desktop
service lets you access a variety of browser-based programs and store data to a
remote hard drive on the services server, while an online file storage service enables
you to upload files to its server and access them from any internet connection.
d.
One of the better options for bringing large amounts of data with you is a USB pendrive; it is very compact, and most have capacities of 64MB-8GB and can be used with
new and relatively new computers. A portable Zip drive and one or more Zip disks can
also hold a large amount of data and be used with a wider variety of computers.
Standard 3.5 disks can hold more than many people believe, including fairly long
PowerPoint presentations and large numbers of documents.
Page 8 of 15
Overall, using remote desktop access is a good choice if you need to access both data
and specific applications on another computer, but other less expensive options with
fewer technical requirements shouldnt be overlooked.
(10 Marks)
Alternate data streams (ADS) - Alternate data streams allow files to be associated with more than
one data stream. For example, a file such as text.txt can have an ADS with the name of text.txt:secret (of
form filename:streamname) that can only be accessed by knowing the ADS name or by specialized
directory browsing programs. Alternate streams are not detectable in the original file's size but are lost
when the original file (i.e. text.txt) is deleted with a RemoveFile or RemoveFileTransacted call (or a call that
uses those calls), or when the file is copied or moved to a partition that doesn't support ADS (e.g. a FAT
partition, a floppy disk, or a network share). While ADS is a useful feature, it can also easily eat up hard
disk space if unknown either through being forgotten or not being detected.
2.
Quotas - Disk quotas were introduced in NTFS v3. They allow the administrator of a computer that
runs a version of Windows that supports NTFS to set a threshold of disk space that users may utilize. It
also allows administrators to keep track of how much disk space each user is using. An administrator may
specify a certain level of disk space that a user may use before they receive a warning, and then deny
access to the user once they hit their upper limit of space. Disk quotas do not take into account NTFS's
transparent file-compression, should this be enabled. Applications that query the amount of free space will
also see the amount of free space left to the user who has a quota applied to them.
3.
Sparse files - Sparse files are files which contain sparse data sets, data mostly filled with zeroes.
Many scientific applications can generate very large sparse data sets. Because of this, Microsoft has
implemented support for sparse files by allowing an application to specify regions of empty (zero) data. An
application that reads a sparse file reads it in the normal manner with the file system calculating what data
should be returned based upon the file offset. As with compressed files, the actual size of sparse files are
not taken into account when determining quota limits.
4.
Reparse points - This feature was introduced in NTFS v3. These are used by associating a reparse
tag in the user space attribute of a file or directory. When the object manager (see Windows NT line
executive) parses a file system name lookup and encounters a reparse attribute, it knows to reparse the
name lookup, passing the user controlled reparse data to every file system filter driver that is loaded into
Windows 2000. Each filter driver examines the reparse data to see if it is associated with that reparse point,
Page 9 of 15
Volume mount points - Similar to Unix mount points, where the root of another file system is
attached to a directory. In NTFS, this allows additional file systems to be mounted without requiring a
separate drive letter (like C: or D:) for each.
6.
Directory Junctions - Similar to Volume Mount Points, however directory junctions reference other
directories in the file system instead of other volumes. For instance, the directory C:\exampledir with a
directory junction attribute that contains a link to D:\linkeddir will automatically refer to the directory
D:\linkeddir when it is accessed by a user-mode application. This function is conceptually similar to
symbolic links to directories in Unix except that the target in NTFS must always be another directory.
(Typical Unix file systems allow the target of a symbolic link to be any type of file.)
7.
Hard links - Originally included to support the POSIX subsystem in Windows NT, hard links are
similar to directory junctions, but used for files instead of directories. Hard links can only be applied to files
on the same volume since an additional filename record is added to the file's MFT record. Short (8.3)
filenames are also implemented as additional filename records that don't have separate directory entries.
8.
transferring files that are not used for some period of time to less expensive storage media. When the file is
next accessed the reparse point on that file determines that it is needed and retrieves it from storage.
9.
Native Structured Storage (NSS) - NSS was an ActiveX document storage technology that has
since been discontinued by Microsoft. It allowed ActiveX Documents to be stored in the same multi-stream
format that ActiveX uses internally. An NSS file system filter was loaded and used to process the multiple
streams transparently to the application, and when the file was transferred to a non-NTFS formatted disk
volume it would also transfer the multiple streams into a single stream.
10.
Volume Shadow Copy - The Volume Shadow Copy (VSC) service keeps historical versions of files
and folders on NTFS volumes by copying old, newly-overwritten data to shadow copy (copy-on-write). The
old file data is overlaid on the new when the user requests a revert to an earlier version. This also allows
data backup programs to archive files currently in use by the file system. On heavily loaded systems,
Microsoft recommends setting up a shadow copy volume on separate disk to reduce the I/O load on the
main volume.
Page 10 of 15
File compression - NTFS can compress files using a variant of the LZ77 algorithm (also used in the
popular ZIP file format). Although read-write access to compressed files is transparent, Microsoft
recommends avoiding compression on server systems and/or network shares holding roaming profiles
because it puts a considerable load on the processor.
Single-user systems with limited hard disk space will probably use NTFS compression successfully.[citation
needed] The slowest link in a notebook is not the CPU but the speed of the hard drive, so NTFS
compression allows the limited, slow storage space to be better used, in terms of both space and (often)
speed. NTFS compression can also serve as a replacement for sparse files when a program (e.g. a
download manager) is not able to create files without content as sparse files.
12.
Single Instance Storage (SIS) - When there are several directories that have different, but similar,
files, some of these files may have identical content. Single instance storage allows identical files to be
merged to one file and create references to that merged file. SIS consists of a file system filter that
manages copies, modification and merges to files; and a user space service (or groveler) that searches for
files that are identical and need merging. SIS was mainly designed for remote installation servers as these
may have multiple installation images that contain many identical files; SIS allows these to be consolidated
but, unlike for example hard links, each file remains distinct; changes to one copy of a file will leave others
unaltered. This is similar to copy-on-write, which is a technique by which memory copying is not really done
until one copy is modified.
13.
Encrypting File System (EFS) - EFS provides strong and user-transparent encryption of any file or
folder on an NTFS volume. EFS works in conjunction with th EFS service, Microsoft's CryptoAPI and the
EFS File System Run-Time Library (FSRTL).
EFS works by encrypting a file with a bulk symmetric key (also known as the File Encryption Key, or FEK),
which is used because it takes a relatively smaller amount of time to encrypt and decrypt large amounts of
data than if an asymmetric key cipher is used. The symmetric key that is used to encrypt the file is then
encrypted with a public key that is associated with the user who encrypted the file, and this encrypted data
is stored in an alternate data stream of the encrypted file. To decrypt the file, the file system uses the
private key of the user to decrypt the symmetric key that is stored in the file header. It then uses the
symmetric key to decrypt the file. Because this is done at the file system level, it is transparent to the user.
Also, in case of a user losing access to their key, support for recovery agents that can unencrypt files has
been built in to the EFS system.
Page 11 of 15
Symbolic links - Symbolic links were originally used to support the POSIX subsystem in Windows
NT.[citation needed] Symbolic links (or Soft links) are resolved on the client side. So when a symbolic link is
shared, the target is subject to the access restrictions on the client, and not the server.
15.
Transactional NTFS - As of Windows Vista, applications can use Transactional NTFS to group
changes to files together into a transaction. The transaction will guarantee that all changes happen, or none
of them do, and it will guarantee that applications outside the transaction will not see the changes until the
precise instant they're committed.
QUESTION 5
a. Discuss any FIVE tools that can be used to recover from disasters in Windows XP. (10 Marks)
Last Known good configuration
This is a tool used to recover from registry changes and damage to system files that prevents
windows XP from booting fully. It restores the operating system to the last configuration in
which it booted fully.
Device driver roll back
This is used when installing a new device driver makes the computer unstable. Using this, the
user can revert to the drivers that the device was previously using.
System Restore
This is a recovery tool designed for recovery from problems such as configuration problems,
system instability and installation of software that fails to work. It automatically creates restore
points that can be used to restore the computer to a specific configuration after the computer
encounters some problems. System restore keeps these restore points for 90 days before
deleting them
Uninstalling and reinstalling applications
If an application makes the system unstable, uninstalling it may solve the problem. The
application can then be reinstalled again if its files had been corrupted.
System Configuration Utility and Clean boot
It is a tool for modifying the configuration used to boot the computer. It overcomes boot and
startup problems when the problem is not so serious as to prevent Windows XP from booting
and the user from logging on.
Recovery Console
Page 12 of 15
(10 Marks)
Advantages
i)
The Windows centralized Registry has a number of advantages over legacy INI files:
ii)
Strongly-typed data can be stored in the Registry, as opposed to only textual information in
INI files.
iii)
Separation of machine configuration from user configuration. When a user logs into a
Windows NT/2000/XP/Server 2003 computer, the user-based registry settings are loaded
from a user-specific path rather than from a read-only system location. This allows multiple
users to share the same machine, and also allows programs to work for a least-privilege
user.
Page 13 of 15
v)
vi)
The registry can be accessed over a network connection for remote management/support,
including from scripts, using the standard set of APIs, as long as the Remote Registry
service is running and firewall rules permit this.
vii)
The entire registry can be backed up more easily as it is just a small number of files in
specific locations. However, it is much harder to back up and restore configuration of a
specific application.
viii)
Since accessing the registry does not require parsing, it can be read from and written to
more quickly than a text file can be. However, the registry becomes a large file to process
once per boot.
ix)
Portions of settings like any subset of an application configuration can be saved in a textbased .REG file, which can be edited with any text editor later. .REG files can easily be
merged back into the registry both by unattended batch file or by the user just doubleclicking on the file without harming any setting that is not explicitly stated in the . REG file.
This is very useful for administrators and support personnel who want to pre-set or preconfigure only a few options like approving the EULA of a certain application.
x)
The registry is constructed as a database, and offers DB-like features such as atomic
updates. If two processes attempt to update the same registry value at the same time, one
process's change will precede the other's, so one will only last a short time until the second
gets written. With changes in a file system, such race conditions can result in interleaved
data that doesn't match either attempted update. Windows Vista provides transactional
updates to the registry, so the atomicity guarantees can be extended across multiple key
and/or value changes, with traditional commit-abort semantics. (Note that NTFS provides
such support for the file system as well, so the same guarantees could be obtained with
traditional configuration files.)
Page 14 of 15
End of Exam
Page 15 of 15