Windows 2000 hardware requirements


















This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:. For inquiries and questions, we collect the inquiry or question, together with name, contact details email address, phone number and mailing address and any other additional information voluntarily submitted to us through a Contact Us form or an email.

We use this information to address the inquiry and respond to the question. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes. Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites.

Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey. Occasionally, we may sponsor a contest or drawing. Participation is optional.

Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information informit.

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email.

Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature. We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson but not the third party web trend services to link information with application and system log data.

Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser.

Disabling or blocking certain cookies may limit the functionality of this site. Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure. The hardware requirements listed in Table 1. Check Microsoft's Web site at www. Network card and any other hardware required by your network topology if you want to connect to a network. These requirements represent the operating system requirements.

Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended. Please note: Do not post advertisements, offensive material, profanity, or personal attacks. Please remember to be considerate of other members. All submitted content is subject to our Terms Of Use. General discussion. Based on operating in a production environment what are the "real" system requirements to effectively operate Win2K?

Share Flag. All Comments. Collapse -. Windows "Real" System Requirements. The Recovery Console is run from outside the installed copy of Windows to perform maintenance tasks that can neither be run from within it nor feasibly be run from another computer or copy of Windows It is usually used to recover the system from problems that cause booting to fail, which would render other tools useless, like Safe Mode or Last Known Good Configuration, or chkdsk.

Windows introduced Windows Script Host 2. Screenshot of Windows Server When users try to access a network share off the DFS root, the user is really looking at a DFS link and the DFS server transparently redirects them to the correct file server and share.

Domain-based DFS roots exist within Active Directory and can have their information distributed to other domain controllers within the domain — this provides fault tolerance to DFS. DFS roots that exist on a domain must be hosted on a domain controller or on a domain member server. A new way of organizing Windows network domains , or groups of resources, called Active Directory, is introduced with Windows to replace Windows NT's earlier domain model.

Active Directory's hierarchical nature allowed administrators a built-in way to manage user and computer policies and user accounts, and to automatically deploy programs and updates with a greater degree of scalability and centralization than provided in previous Windows versions.

It is one of the main reasons many corporations migrated to Windows User information stored in Active Directory also provided a convenient phone book-like function to end users. Active Directory domains can vary from small installations with a few hundred objects, to large installations with millions.

Active Directory can organise and link groups of domains into a contiguous domain name space to form trees. Groups of trees outside of the same namespace can be linked together to form forests.

Active Directory services could always be installed on a Windows Server , Advanced Server , or Datacenter Server computer, and cannot be installed on a Windows Professional computer. However, Windows Professional is the first client operating system able to exploit Active Directory's new features.

As part of an organization's migration, Windows NT clients continued to function until all clients were upgraded to Windows Professional, at which point the Active Directory domain could be switched to native mode and maximum functionality achieved. There should be one or more domain controllers to hold the Active Directory database and provide Active Directory directory services. Along with support for simple, spanned and striped volumes, the server family of Windows also supports fault-tolerant volume types.

The types supported are mirrored volumes and RAID-5 volumes :. Windows can be deployed to a site via various methods. It can be installed onto servers via traditional media such as CD or via distribution folders that reside on a shared folder. Installations can be attended or unattended. During a manual installation, the administrator must specify configuration options.

Unattended installations are scripted via an answer file , or a predefined script in the form of an INI file that has all the options filled in.

An answer file can be created manually or using the graphical Setup manager. The Winnt. The ability to slipstream a service pack into the original operating system setup files is also introduced in Windows The Sysprep method is started on a standardized reference computer — though the hardware need not be similar — and it copies the required installation files from the reference computer to the target computers.

The hard drive does not need to be in the target computer and may be swapped out to it at any time, with the hardware configured later. Sysprep allows the duplication of a disk image on an existing Windows Server installation to multiple servers. This means that all applications and system configuration settings will be copied across to the new installations, and thus, the reference and target computers must have the same HALs , ACPI support, and mass storage devices — though Windows automatically detects " plug and play " devices.

The primary reason for using Sysprep is to quickly deploy Windows to a site that has multiple computers with standard hardware. Systems Management Server can be used to upgrade multiple computers to Windows These must be running Windows NT 3. Using SMS allows installations over a wide area and provides centralised control over upgrades to systems.

Remote Installation Services RIS are a means to automatically install Windows Professional and not Windows Server to a local computer over a network from a central server. Images do not have to support specific hardware configurations and the security settings can be configured after the computer reboots as the service generates a new unique security ID SID for the machine.

This is required so that local accounts are given the right identifier and do not clash with other Windows Professional computers on a network. RIS requires that client computers are able to boot over the network via either a network interface card that has a Pre-Boot Execution Environment PXE boot ROM installed or that the client computer has a network card installed that is supported by the remote boot disk generator. The remote computer must also meet the Net PC specification.

Microsoft released various editions of Windows for different markets and business needs: Professional, Server, Advanced Server and Datacenter Server.

Each was packaged separately. Windows Professional was designed as the desktop operating system for businesses and power users. It is the client version of Windows It offers greater security and stability than many of the previous Windows desktop operating systems.

Windows Server shares the same user interface with Windows Professional, but contains additional components for the computer to perform server roles and run infrastructure and application software. This also provided a purely transitive-trust relationship between Windows domains in a forest a collection of one or more Windows domains that share a common schema , configuration, and global catalog , being linked with two-way transitive trusts.

Windows Server supports up to 4 processors, requires MB of RAM and 1 GB hard disk space, however requirements may be higher depending on installed components.

Windows Advanced Server is a variant of Windows Server operating system designed for medium-to-large businesses. It offers clustering infrastructure for high availability and scalability of applications and services, including main memory support of up to 8 gigabytes GB on Physical Address Extension PAE systems and the ability to do 8-way SMP. System requirements are similar to those of Windows Server , however they may need to be higher to scale to larger infrastructure.

Windows Datacenter Server is a variant of Windows Server designed for large businesses that move large quantities of confidential or sensitive data frequently via a central server. Like Advanced Server, it supports clustering , failover and load balancing.



0コメント

  • 1000 / 1000