Technical Service Management: Windows Server 2016 vs Windows 10 Pro

Verified

Added on  2023/06/14

|5
|1590
|147
Homework Assignment
AI Summary
This assignment provides a detailed comparison of Windows Server 2016 and Windows 10 Pro, highlighting key feature differences in memory limits, CPU efficiency, network connections, and background task allowances. It outlines the system requirements for installing or upgrading to Windows 10, addressing potential issues when upgrading from Windows Vista. The assignment includes a training document for "Security Essentials in Windows 10," covering Windows Defender, cloud-based protection, and system restoration points. Furthermore, it defines Network Address Translation (NAT) and its security benefits, describes the role of the Windows Registry, lists issues requiring registry editing, and discusses the dangers of editing the registry. Desklib offers this document and many more solved assignments for students.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: TECHNICAL SERVICE MANAGEMENT
Technical Service Management
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1TECHNICAL SERVICE MANAGEMENT
1. Research and description of feature differences between Windows Server 2016 and
Windows 10 Pro
The server operating system developed by Microsoft is regarded as Windows Server
2016 and the desktop version is called the Windows 10 Pro (Ashraf, 2017). Although, both of
the operating systems were developed concurrently, however, these operating systems have
distinctive differences of features between them. These differences are listed in a tabular form
as below:
Key Points of
Difference
Windows Server 2016 Windows 10 Pro
Memory Limits
Physical memory limits for
desktop running Windows Server
2016 has a 24TB limit on X64
A desktop supporting Windows 10
Enterprise has a 4 GB memory limit
on an X86 and a 2TB limit on an
X64
Efficient use of
CPU
A server Operating System is
more efficient in using a CPU
A Windows 10 Enterprise, in
comparison with a server enterprise,
utilises a CPU and hardware
components less efficiently
Network
Connections
A Windows server has no
limitations on using network
connections and only depends on
the hardware capability
A desktop version of Windows has
limited connections to only 10 to 20
networks
Allowance for
background
tasks
Server Editions of Windows OS
are dedicated to provide
allowance to background tasks to
perform
Desktop editions of Windows OS do
not provide allowance to background
tasks, rather focuses more on the
foreground tasks
2. System Requirements for installing or upgrading to Windows 10 including the issues
that might be faced by jumping from Windows Vista to Windows 10
System Requirements The minimum system requirements for installing or
upgrading Windows 10 as suggested by Microsoft are listed as below:
RAM: The system should require a RAM of 1 GB (gigabyte) for 32-bit and
2GB (gigabyte) for 64-bit
Processor: A minimum of 1 GHz (gigahertz) processor or SoC is required in a
system to upgrade to Windows 10
Hard Disk Space (HDD): The hard disk space required for upgrading to
Windows 10 is 16 GB for 32-bit systems and 20 GB for 64-bit system
Graphics Card: DirectX 9 or a much latest version would be suitable with a
compulsion towards WDDM 1.0 driver
Display: A minimum resolution of 1024x600 display is required for
supporting Windows 10
Other than all these specification, it is essentially required that the system supports
internet connection and should be utilising one Microsoft account.
Issues while upgrading to Windows 10 – There could be a bit of a trouble in
upgrading from Windows Vista to Windows 10. It is not a free upgrading process; hence, it is
to be made sure that the system satisfies all the requirements that are needed for Windows 10
Document Page
2TECHNICAL SERVICE MANAGEMENT
(Rhodes & Bettany, 2016). If the system is of an older version, there could be blasphemous
effects of it resulting in the system to be malfunctioning. In addition, it is required that the
system upgrade all its programs to make them compatible to the Windows 10 environment.
3. Training Document for “Security Essentials in Windows 10”
After being appointed by Trans Laters, a training organization, training session has
been offered to the staff of Sloth Industries to familiarise them with the security essentials of
Windows 10. The first installation of Windows Defender as a security system for Windows
Vista has been an unsuccessful venture; therefore it is essential that after the implementation
of the Windows 10 Operating System, the employees in the industry be made familiar with
the environment (Silberschatz, Galvin & Gagne, 2014). The first and foremost task of the
trainer was to familiarise the trainees with the environment of Windows 10, then they have to
be made proverbial with the security systems that Windows 10 provides. The training was
conducted on duration of two weeks and 20 employees have participated in the training
procedure, successfully completing the training module in due course of time. The training
document for the required training session is as below:
TRAINING DOCUMENT – SLOTH INDUSTRIES
Training Session
No. 1
Training offered on Security Essentials of Windows 10
Training Duration 3/5/2018 – 3/19/2018
Number of Trainees 20
Training tasks
completed
Making the participants familiar with the Windows 10
Environment
Training on Windows Defender or Windows Security
Essentials on Windows 10
Familiarising with cloud-based Protection
File and Application handling for Windows 10
Auto-upgrading on system training
Training on Automatic, Manual and Real-time functions of
Windows Defender
Functioning and modifying configurations for Windows
Defender
Training on System Restoration Point
Training on manual handling of MAPS (Microsoft Active
Protection Service)
4. a. What is NAT?
Network Address Translation or NAT is an internet standard method enabling a Local
Area Network or LAN to remap an IP Address Space or Internet Protocol Address Space into
another with the modification of information of network address while the IP headers are in
transition over a routing device facing the traffic. It uses the first address set for the internal
traffic and the other second set for the external traffics. However, the technique was
originally used to shorten the requirement of addressing every host whenever the network
was shifted. Ever since, it has become an essential and popular tool to conserve the address
spaces globally.
Document Page
3TECHNICAL SERVICE MANAGEMENT
4. b. Why is it considered a useful security tool?
The Network Address Translation or NAT is an address management technique. Even
though, it is being used in often as a security tool. This is due to all of the internal private
transmissions emerging from a single outside public address. NAT is often used to “cloak”
internal addresses, which is a process to make them invisible to some extent. Besides hosting
the communication between overlapping address spaces NAT provides for the connection
between hosts in a network more than available IP address spaces (Tidrow, Boyce & Shapiro,
2017). It limits the use of the number of public IP addresses, which are being used by an
organization providing security to those addresses. Thus, NAT could be considered a useful
security tool.
5. a. Describe the role of Windows Registry.
Windows Registry is used as an archive that has the capability of collecting
configuration information about the settings of Windows system or the installed hardware,
software and applications and storing them as well (Schulz, 2017). Every time a Windows
component gets started, a Windows registry entry or key is retrieved. The Windows registry
modifies the registry entries while its execution as well as the keys corresponding to it.
5. b. List some issues that would require editing the Registry
A Windows registry is involved with everything in a system, therefore, editing any
part of it would be dangerous to implement, which can further cause a PC to stop functioning
or malfunction (Arambatzis, Lazaridis & Pouros, 2015). However, few issues may arise that
may require editing or modifying the registry. These are listed as below:
If malware and virus attacks occur in the registry
Uninstalling a program
Backing up and restoring the contents of a registry
5. c. What are the dangers of editing the Registry?
Since, registry contents are related to every aspect of a PC system, editing or
modifying any part of it may result into dangerous outcomes (Arambatzis, Lazaridis &
Pouros, 2015). This is the reason that editing a registry needs expertise. It could even be
possible that editing a registry had started malfunction of a system, or it may even stop
working further.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4TECHNICAL SERVICE MANAGEMENT
Reference
Arambatzis, T., Lazaridis, I., & Pouros, S. (2015, September). Modern Windows Operating
Systems Vulnerabilities. In The Second International Conference on Information
Security and Digital Forensics (ISDF2015) (p. 53).
Ashraf, M. N. (2017, October). Scratching the Surface of Windows Server 2016 and System
Center Configuration Manager Current Branch. In Proceedings of the 2017 ACM
Annual Conference on SIGUCCS (pp. 73-79). ACM.
Rhodes, C., & Bettany, A. (2016). Upgrading the Windows Client Operating System.
In Windows Installation and Update Troubleshooting (pp. 67-88). Apress, Berkeley,
CA.
Schulz, M. S. (2017). MCSA 70-741 Cert Guide: Networking with Windows Server 2016.
Pearson IT Certification.
Silberschatz, A., Galvin, P. B., & Gagne, G. (2014). Operating system concepts essentials.
John Wiley & Sons, Inc..
Tidrow, R., Boyce, J., & Shapiro, J. R. (2017). Windows® 10 Anniversary Update Bible.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]