Want to create interactive content? It’s easy in Genially!
Mapa conceptual en ingles
Ducan
Created on November 11, 2024
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Essential Map
View
Akihabara Map
View
Frayer Model
View
Create Your Story in Spanish
View
Microcourse: Key Skills for University
View
Microcourse: Learn Spanish
View
January School Calendar
Transcript
Unit 2 Installation, Uninstallation, and Update of Free and Proprietary Applications
Title here
1. Installation, uninstallation, and updating of free and proprietary applications.
Title here
3. Boot process: Startup files of Operating Systems
Title here
4. System log
1. Installation, uninstallation, and updating of free and proprietary applications
The System Administrator (root in the case of Linux) is responsible for installing and uninstalling applications in the operating environment. Applications are generally provided in a format known as a package, which may contain documentation, libraries, icons, or anything else that comprises the necessary programs to make the application function
We must consider that current operating systems have a module designed to assist the administrator in installing and uninstalling applications, managing the dependencies between applications and the sharing of libraries
In the Linux operating system, applications are identified by a numbering system that indicates the intended distribution, package type, kernel type, etc., as follows:
1.1. Phases of installation and uninstallation of applications
When an application is installed, it is advisable to carry out a series of operations or implementation phases:
When we perform an uninstallation of the application, the following aspects must be considered:
- Ensure it does not affect other applications as it may cause dependency and integrity issues
- If the program has its own uninstallation tool, execute it
- Study the uninstallation mechanism by consulting the application manual
- It is advisable not to delete files that may be dependencies of other applications to avoid errors in their operation, data loss, and system instability. It is always better to investigate the function of the files before proceeding with their deletion
- It is necessary to make backups or export the data generated by the application, such as databases, emails, and user profiles, to be able to use the work already done in other applications
- Study and analysis of the software to be installed: verification of compatibility with hardware and other applications
- Before starting the installation, we should make system backups
- Analyze the need for disk partitioning
- Study the installation mechanism by consulting the application manual
- After installation, it will be necessary to configure the application to adapt it to the operating environment
- Often, it will be necessary to register the application for legal use
1.2. Installation/uninstallation of applications in the Windows operating system
During the installation process, the system requests the registration of the username that will act as the administrator within the system
The Windows package management system is located in the Add or Remove Programs tool or in Programs and Features found in the Control Panel. The package management system manages the information of the installed packages in the so-called package repositories
NTFS Compression:
1- Select the folder 2- In the Advanced Attributes window, check Compress content to save disk space 3- A dialog window called Confirm attribute changes will appear where we can choose to Apply changes only to this folder or Apply changes to this folder and all subfolders and files
- Compressed folders allow you to create compressed folders so that all files saved in that folder are compressed
1.2.1. Process of Installing and Uninstalling Applications on Windows
We may encounter three different cases or methods for installing an application:
From a CD or DVD Provided by the Manufacturer
To Uninstall Applications in Windows:
From an Internet Distributor: an Internet connection is required
Through the Local Network to Which the Device is Connected:
1.3. Installation/uninstallation of applications in the Linux operating system
To install applications in Linux, you can work in console mode to receive commands via text commands or with a much more pleasant environment that resembles other systems like Windows, in a windowed environment.
During the installation process of Linux, there is a step where the username is requested to start the session in the system (login connection) and a password. This will be the system user with which you can connect, open graphical sessions, and enter console mode.
The system enables a sudo command through which this generic user can perform root tasks without being one. A user with sudo is granted administrator privileges by including them in the admin user group.
password: is to enter the user's password.
exit: To exit as the root user, give the command:
passwd: To change the root password.
1.3.1. Types of installation and uninstallation packages in Linux
In Linux, during the installation process, we are given the opportunity to select additional application packages that are necessary for their proper functioning.
Binary .deb packages contain the following files:
- debian-binary: contains the version of the .deb file
- package control section (control.tar.gz) which contains:
- Control file
- Scripts that run before or after installing the package
Additionally, the system installs some type of package management system that, just by knowing the name of the package, will start installing it from remote repositories or package databases.
The installation tools or applications used by the most popular distributions are:
- data.tar.gz: contains all the files that will be installed, along with their destination paths
Source packages contain the following files:
- dsc: package description file
- orig.tar.gz: original source file
- iff.gz: file with Debian's changes to the original source code
Application or program packages can be in two different formats:
- Binaries: contains executables, configuration files, man/info pages, copyright information, and general documentation
- Sources: a set of files that define the package
1.3.2. Linux package management tools
The most common tools depending on the Linux distribution are:
Package management in Ubuntu can be easily performed using the application that runs in a graphical window called Synaptic. The Synaptic application is a graphical version of the apt-get package management system.
- The dpkg command
- The apt command
- The tar command
- Rpm
- The Gzip command
- The Bzip2 command
- The Zip command
- Installs, removes, configures, updates, and downloads packages.
- Updates the entire system.
- Allows management of package repositories.
- Allows comparison of the installed version of a package with the available version
- in the corresponding repository.
- Dependency resolution.
- Searches the list of packages using filters, such as name,
- description, and other properties of the packages.
- Filtering the list of known packages by status, section, or properties.
- Sorts package listings by initial letter, status...
- Displays all online documentation related to the package.
3. Boot Process: Operating System Startup Files
To access these options, you can follow these steps:
1. Restart your computer
2. Press the appropriate key
3. Select the desired option
4. Access the boot options
5. Select the boot options
6. Restart the system
3.1 Windows 10 Boot Sequence
Let's show what really happens when we press the power button on the device and Windows 10 starts up, allowing us to use the computer with this Microsoft platform
When you press the power button on your PC, the first thing that loads is the firmware settings, which check that the disk system is valid to initiate the PC boot. After this, the Windows boot manager takes over, determining whether multiple operating systems are installed on the system or just one. Therefore, when choosing Windows 10, as in this case, the "Winload.exe" file is launched, which begins the loading of Microsoft software. At this point, the system kernel uses drivers to communicate with the hardware installed and ensures that the boot process proceeds smoothly. The final phase involves loading the Windows Registry configuration, as well as additional drivers and other elements necessary for the operating system to function properly. Once this is loaded, the system management process takes over, and the user interface, along with other hardware and software, is loaded. After this step, the usual Windows 10 login screen appears so that you can enter the required login credentials
How to enter the BIOS of your PC
Steps to enter the BIOS:
1. Restart your computer and immediately press the designated key to access the BIOS. This key may be "F2," "Del," "Esc," or any other key set by the manufacturer.
4. Finally, click on UEFI Firmware Settings.
2. Then, click on the Recovery tab (on the left panel), and then click on the Restart now button under the Advanced startup section
Once these steps are completed, you will be inside the BIOS.
3. Click on Troubleshoot
3.2. Boot Process of the Linux Operating System
In the Linux boot sequence or process, we must consider the following aspects:
- After turning on the computer, the first thing the CPU does is execute the machine code stored at a predefined memory address
- As mentioned earlier, the MBR is the sector of the hard drive that contains the bootloader (LILO or GRUB). Once loaded, the bootloader will search for the Kernel, load it into memory, and give the CPU the address to execute it.
- Once the BIOS has found and loaded the bootloader into memory, it hands over control of the boot process to it
- The bootloader will then locate the binary of the selected system's kernel in the /boot/ directory.
- Next, the kernel will mount the root partition as read-only. At this point, the kernel is loaded into memory and operational.
3.2.1. GRUB Bootloader Configuration in Linux
GRUB has a series of features such as:
1. GRUB is command-based and supports specific options.2. GRUB supports the LBA addressing mode used to search for files on IDE hard drives and all SCSI 3. Hard drives. GRUB can read almost all types of partitions.
Here are the most important commands to configure GRUB:
- boot
- chainloader
- initrd
- kernel
- root
- rootnoverify
- makeactive
- hide
3.2.2. Configuration of Runlevels and the Init Program in Linux
A Linux system is not started or stopped; it simply changes its runlevel. Some commands that allow us to manage the system's runlevels are the following, executed with the root user:
The runlevels are the different operating modes of init. Linux always runs in a specific runlevel from eight possible levels numbered from 0 to 6 and the called S
3.2.3. Configuration of Linux Boot rc Files
In Linux, the SysV style organizes the startup scripts in the directory /etc/init.d or /etc/rc.d/init.d. These scripts allow you to manage services with commands like start (to start), stop (to stop), as well as others like reload, restart, and status. There are subdirectories such as /etc/rcX.d (where X represents the runlevel, for example, /etc/rcS.d, /etc/rc0.d), which contain links to the scripts in /etc/init.d according to the corresponding runlevel. In these directories, the scripts are named with an S (to execute them when entering the runlevel) or a K (to execute them when exiting), followed by a number indicating the order of execution.
3.2.4. Environment Variables Generated During the Linux Boot Process
An environment variable is a dynamic value loaded into memory, which can be used by multiple processes running simultaneously. In most operating systems, the location of certain libraries or the executable files of important system components may vary depending on the installation.
Here is an incomplete list of the main environment variables in a Linux system:
4.1. Windows Operating System Registry
The Windows registry is a database where the operating system itself, as well as many applications, store all kinds of configurations. All the features of the operating system, both enabled and disabled, are stored here. Within this registry, we can find all sorts of values and configurations that allow us to modify even the most unexpected elements of the operating system. The Windows registry was introduced in Windows 3.11, and to this day, it remains an essential part of the system.