Week 8 Managing Information Technology

Cards (46)

  • Information Technology Infrastructure Library (ITIL)
    A set of concepts and practices that manage the Information Technology (IT), IT Service Management (ITSM), IT Development, IT Operations.
  • Information Technology Infrastructure Library (ITIL)
    It gives a detailed description of several important practices on an IT and provide a comprehensive checklist, task, procedure, that any IT organization can tailor its needs.
  • Service Strategy
    A view of ITIL that align business and IT together. It more focus on customer outcomes.
  • Service Design
    Provides guidance and on the production and maintenance of IT policies, architecture, and documents for design of appropriate and innovative IT.
  • Service Transition
    Provides guidance and process activities for the transition of services in the operation business environment.
  • Service Operation
    Introduce, explains, and details delivery and control activities to achieve operation excellence on a day-to-day basis.
  • Continual Service Improvement
    Focusing on the process elements involved in identifying and introducing service management improvements, this publication also deals with issues surrounding service retirement.
  • Proactive
    You’re planning ahead and anticipating the problems before they disable or degrade the server, service, or application.
  • Reactive
    Waiting for the problems to occur before addressing the issues.
  • Specific Approach
    An approach when you are familiar with the problem and happened before, and already know what to do. Seeing the problem frequently should investigate further to permanently fix the problem.
  • Systematic Approach
    A formal approach that use a effective troubleshooting methodology to reduce the amount of guesswork needed to troubleshoot and fix the problem in a timely manner.
  • Discover the problem.
    Identifying the document problem symptoms and search technical information resources including searching Microsoft Knowledge Base (KB) articles to determine whether the problem is a known condition.
  • Evaluate System Configuration
    Ask the client or customer and check the system’s documentation to determine if any hardware, software, or network changes have been made including any additions.
  • List or track possible solutions
    Consider turning on additional logging or running diagnostic programs to gather more information and test certain components.
  • Execute plan
    Test potential solutions and have contingency plan if these solutions do not work or have a negative impact on the computer.
  • Check Results
    If the problem is not fixed, go back to track possible solutions
  • Take a proactive approach
    Documenting the changes that been made along the way while troubleshooting the problem.
  • System Information (msinfo32.exe)
    It shows the details about the computer’s hardware configuration, components, and software, including drivers.
  • System Summary
    It displays the general information about the computer and the operating system, such as the computer name and manufacturer the type of basic input/output system (BIOS) your computer uses, and the amount of memory that’s installed.
  • Hardware Resources
    Displays advanced details about your computer’s hardware and is intended for IT Professionals.
  • Software Environment
    Displays information about drivers, network connections, and other program-related details.
  • Components
    Display information about disk drives, sound devices, modems, and other components installed on your computer.
  • Event Viewer
    A Microsoft Management Console (MMC) that enables you to browse and manage event logs. A stand-along console. You can execute as a command as eventvwr.msc
  • Application log
    It contains the events logged by application or programs.
  • Setup log
    It contains events related to application setup.
  • Security log
    It contains such as valid and invalid log on attempts and access to designated objects such as files and folders, printers etc.
  • System log
    It contains events logged by Windows system components including errors displayed Windows during boots and errors with services.
  • Forwarded Events log
    Used to store events collected from remote computer allowing you to centralize Windows Logs.
  • Power-On Self Test (POST)
    It initialized the hardware and finds an Operating system to load. This happen when the server fails to load or start properly.
  • MASTER BOOT RECORD (MBR)
    The first 512-byte boot sector of a partitioned data storage device such as a hard disk. It is used to hold the disk’s primary partition table, contains the code to bootstrap and operating system, which usually passes control to the volume boot record and uniquely identifies the disk media.
  • VOLUME BOOT RECORD (VBR)
    A type of boot sector that stored in a disk volume on a hard disk, floppy disk, or similar data storage device that contains code for booting an operating system such as NTLDR and BOOTMGR.
  • Boot loader
    A section that configures the number of seconds that appears on the screen and responsible for booting the operating system.
  • Boot loader
    Timeout = 30
    Default = multi(0)disk(0)ridsk(0)partition(1)\Windows
  • Operating System
    A section that contains the list of available OS.
    multi(0)disk(0)rdisk(0)partition(1)\WINNT=“Microsoft Windows Server 2003”/fastdetect
  • Boot Configuration Data (BCD)
    A firmware-independent database for boot0time configuration data used by Microsoft’s Window Boot Manager. To Edit the Boot Configuration, it is typically used by Bcdedit.exe
  • ARC Path
    Used to specify the location of the operating system.
    multi(x)disk(y)rdisk(z)partition(a)
  • Repair Your Computer
    It shows the list of system recovery tools that you can use to repair startup problems, run diagnostic, or restore your system. This is only Available if the tools is installed to the hard disk
  • Safe Mode
    Starts a windows with a minimal set of drivers and services.
  • Safe Mode with Networking
    A start window in a safe mode that also includes the networking drivers and services needed to access the internet.
  • Safe Mode with Command Prompt
    Starts the window in safe mode with a command prompt instead of using the Window User Interface.