Virtualization software and operating systems

Assignment Help Computer Network Security
Reference no: EM13316748

To load an OS into the Virtual Machine (VM), you'll need anoperating system. When you create your virtual machine, you'll either need an operating system .iso file, or a CD with the loaded operating system. For this exercise, you'll be using a separate Windows operating system (Windows Vista, Windows 7, or Windows Server) as a Virtual system. You will be downloading and installing an .iso file from the same MSDNAA site as Virtual PC.

1. Log into the site, and click on the Operating Systems under Categories on the left. Select one of the Operating Systems on that page. Make sure it's one you're comfortable with. Follow the process to download the Operating System image (it's similar to Virtual PC).This time,there is a license number, so copy and save that number!The downloaded .iso will be in its own folder with the name "Windows ..."

2. Start the Virtual PC. You should see a window pop up with a title of ‘New Virtual Machine Wizard'. If you don't see the wizard, click on New...

3. Read the text and click Next.

4. You'll see three options. For this exercise, select ‘Create a virtual machine'. Click Next.

5. Name your new machine Windows7 (or whichever OS you are using) and click Next.

6. A window will appear that shows the default values for memory, virtual disk size, and sound card for the Windows OS. You might look through the different operating systems just to see what would be recommended for them. Before you move on, make sure that Windows XP is selected, then click Next.

7. You can now adjust the RAM for your virtual machine. By default Windows image has 128 MB of RAM. Adjust the RAM to 512 MB, then click Next.

8. You now have the option to either use an existing virtual hard disk, or creating a new one. Select ‘A new virtual hard disk', then click Next.

9. The new window will show you where the hard disk will be saved. Use the defaults, and click Next.

10. The wizard will be complete. Click Finish.
You should now see your Virtual PC Console window that shows your new virtual machine. At this point, it hasn't been started, and there is no operating system installed.

1. Click on Start.

2. You'll see your new machine start with some loading information appearing in a new window.Wait for the virtual machine to complete loading itself.

a. Note: If it appears stuck on DHCP...., then hit the Esc key.

b. Next, you'll either get a message about a disk image or the need to "Reboot and Select proper Boot device. When you get the message, click on the CD drop-down menu and select "Capture ISO Image...". Browse through your directory to your saved Windows Image or .iso file and select it.

c. After selecting the boot image, you may need to restart the virtual image, so it knows what iso file to use. This is done by selecting Action drop-down menu and "Ctrl+Alt+Del."

3. In a little while, you should see your new virtual operating system starting to load. Follow the default options for the install. Here's where you'll need that license number.

4. When you are installing, you are free to use your host machine and move back and forth between the two operating systems. To do this, you need to use the ‘hostkey'. With Virtual PC, it's the right (not the left) ALT key. To practice, click your cursor in the virtual machine, now try and move to your host machine... nothing happens!

5. To get to your host machine, hold down the right ALT key and move the mouse.

6. If you need information on loading other operating systems, you might go to: https://www.essjae.com/virtualization/.

7. You'll need to load two operating systems into your virtual machine. You can go back out to the MSNDAA site and download Windows Server 2003, or if you feel comfortable, try a Linux operating system.

a. Ubuntu Linux images are available here: https://www.ubuntu.com/download

b. Other distributions are available here: https://iso.linuxquestions.org/

8. To complete the exercise, supply each of the following:

a. Write a one page synopsis of your experience in loading the virtualization software and operating systems. Include what you learned in the process.

b. Take a snapshot of your Virtual PC Console with two machines running and include it in your written synopsis. To give you an example, here's a picture with one running.

Reference no: EM13316748

Questions Cloud

What annual volume savings will plant have achieve : The Pomdeterra wastewater treatment plant produces a thick sludge that has a suspended solids concentration of 3.8%. They are investigating a filter press that will yield a solids concentration of 24%.
Polygon traverse are measured : Five interior angles of a six-sided closed polygon traverse are measured as: A=117°20’33”, B=119°47’50”, C=66°36’29”, D=171°52’14”, E=92°55’18”. The angle at F was not measured. If all measurements are assumed to be correct what is the value of angle..
What is the weight of the displaced air : On a perfect fall day, you are hovering at low altitude in a hot-air balloon, accelerated neither upward nor downward. What is the weight of the displaced air
Virtualization software and operating systems : Write a one page synopsis of your experience in loading the virtualization software and operating systems. Include what you learned in the process.
Can the new device be justified at a toll gate : Cars arrive at a toll gate on a freeway according to a Poisson distribution with mean 90 per hour. Average time for passing through the gate is 38 seconds. Drivers complain of the longwaiting time.
Determine how many candy bars needs to take with woman : A 68 kg woman is planning to bicycle for an hour. If she is to meet her entire energy needs while bicycling by eating 30 g chocolate candy bars, determine how many candy bars she needs to take with her.
How deep hole in yards would be formed as result of excavatn : The Metrodome's inflatable roof covers 10.0 acres and its interior volume is 60.0x10^3 cubic feet. During construction, 40.0x10^3 cubic yards of concrete, 11.9x10^3 tons of reinforcing steel, and 5.00x10^2 tons of structural steel were utilized.
Compare and evaluate proprietary project management software : You need to select a tool for project planning and scheduling from various tools available in the market. What factors would you consider in selecting the most appropriate software tool for your company?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Cyber terrorism & information warfare

Risk Management, IT Related Risks, Radio Frequency Identification (RFID), Easy listing of special programs,  Social Engineering

  Compare u.s. and e.u. policies

Compare U.S. and E.U. policies and underlying philosophies of privacy. Include references to monitoring and privacy in the workplace, surveillance, and disclosure/data privacy. In your estimation, could self-regulation be effective or does it need to..

  Question about systems analysis

The owners of a store are looking for a lighted sign that could be mounted outside the store. The lights in the sign should be turned on when the outdoor light level falls given below a level defined through the owners.

  How many other messages expected to generate same hash value

A 1,048,576-bit message is used to generate 10-bit hash. One average, how many other messages could be expected to generate same hash value?

  Internet working equipment

Discuss and explain any of the internet working equipment that you have experience with and the advantages and disadvantages of them.

  Leaders and managers

One of business' contemporary rules states that organizations should move away from some top leaders and many managers to leaders at every level and few managers.

  Explain cross site scripting attack

Explain Cross Site Scripting attack

  Dealing with computer security

Computer Security is very important for organizations and if not impliedproperly it may have a very big impact on its overall working system.

  Discuss the risks of having a single root user

Originally Linux/UNIX systems had one all-powerful user called root that managed systems. Discuss the risks of having a single root user and how more limited management abilities can be given to others users on Linux/UNIX systems.

  Define ethics for the information age

Define ethics for the information age; cite your sources. You may use any original works but may not discuss your answers with fellow classmates.

  Selecting an expert for an expert witness opinion

Describe two IT certifications that may be considered when selecting an expert for an expert witness opinion.  Research and provide details on the hourly estimates for using these types of professional witnesses.   Then, discuss the typical backgroun..

  How network security be customized for risks management

If not, how can one of these network security best practices be customized to requrements or risks present in the organization? How are risks to particular organization discovered or established?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd