As a temporary solution you can quit some running

Info icon This preview shows pages 27–29. Sign up to view the full content.

View Full Document Right Arrow Icon
As a temporary solution, you can quit some running programs in order to decrease the demand for RAM. The only long-term solution is to add more physical RAM. Increasing the page file size will have no effect unless you are also experiencing out of memory errors. The problem is not that there isn't sufficient combined memory, but that the amount of physical memory is insufficient. Network Utilization Network utilization identifies the amount of traffic sent and received by a network connection. Utilization is listed as a percentage of the total available theoretical bandwidth (such as 100 Mbps for a Fast Ethernet connection). Poor performance that has low CPU, disk, and memory statistics but high network utilization could indicate a bottleneck at the network adapter. Users and Groups 0:00-0:07 In this lesson, we're going to talk about Windows Users and Groups. User Accounts 0:08-0:42 Let's first talk about user accounts. Anyone who wants to use this system running Windows must authenticate to that system before being allowed to do anything. Two pieces of information must be supplied, a username, and a password. Sometimes you will hear these two pieces of information referred to as "authentication credentials".If you supply valid credentials, you are granted access to this system. The tasks that you are then allowed to complete within the system are constrained by the permissions and privileges that have been assigned to your user account. Local Authentication 0:43-1:06 The authentication process can take place in several different ways. If the Windows system is configured to use local authentication, then usernames and passwords are stored on the local computer itself. When you supply your username and your password, your local system looks up the username in its own database and checks the password. If it matches, then it lets you into the system. Domain Authentication 1:07-1:49 It's also possible to store user accounts and passwords on a remote computer somewhere else in the network. Typically, this is done using a server that's configured to function as the domain controller.In this situation, the work station can be configured to forward the credentials supplied by the user to the domain controller. The domain controller verifies that the username and password are valid, and if so, tells the work station to allow the user access to the system. Notice that the user must specify the name of the domain where her user account resides along with her username when logging in. In this example, the user's account is stored on the domain controlleror the Eastsim.com domain.
Image of page 27

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Domain User Accounts 1:50-2:28 Using domain authentication has several advantages over using local authentication. The credentials stored on the domain controller can be used to authenticate the user to any computer in the domain. Without a domain controller, identical local user accounts would have to be created and maintained on every computer that the user needs to access.
Image of page 28
Image of page 29
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern