We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

The iexplore.exe system file is located in the Program Files/Internet Explorer booklet. This is an feasible file of the plan Microsoft Internet Explorer. The graphical user interface of the iexplore.exe file is composed of graphical cyberspace pages viewed by the user. The iexplore.exe is a web browser that connects to the Internet when a user enters a URL in the reference saloon found on its GUI.


The wmplayer.exe system file is located in the Program Files/Windows Media Player booklet. This is an feasible file of the plan Windows Media Player. Windows Media Player is an application for running most audio or video files.

The Types Of Windows System Files... TOPICS SPECIFICALLY FOR YOU


The explorer.exe system file is located in the Windows booklet. The explorer.exe file is an feasible file for Windows Explorer. In the Microsoft Windows runing system, the explorer.exe file tallies and has a graphical user interface that you can see when you are opening difficult thrusts or files. Sometimes, the graphical user interface of the explorer.exe file is referred to as Windows GUI Shell or Explorer.


The calc.exe system file is located in the Windows/System32 booklet. The system file calc.exe is a Microsoft Windows accoutrement which allows the user to do basic scientific computations.


The cmd.exe system file is located in the Windows/System32 booklet. The cmd.exe file allows entree to the Microsoft Windows Command Prompt, besides known as Microsoft DOS. The system file cmd.exe is a 32-bit bid prompt used in Windows NT, 2000 and XP and offers disc and file care maps to your computing machine every bit good as web maps.


This file is located in the Windows/System32 booklet. The system file svchost.exe is the Generic Host Process for Win32 Services used for administrating 16-bit based Dynamically Linked Library ( DLL ) files including other auxiliary support applications.


The system file spoolsv.exe is located in the Windows/System32 booklet. The spoolsv.exe file is described as the Spooler Sub-System Application or Windows Print Spooler Service and is the chief constituent of the printing interfaces. The spoolsv.exe file is initialized when the computing machine starts, and it runs in the background until the computing machine is turned off.


The system file console.exe is located in the Windows/System32 booklet. This file console.exe belongs to i-Catcher Console, from i-Code Systems Limited.


This system file is located in the Windows/System32 booklet. The file inetcplc.dll is a DLL library used by the Internet Control Panel.


The vmmreg32.dll system file is located in the Windows booklet. This system file vmmreg32.dll is a faculty associated with Microsoft Windows Operating System from Microsoft Corporation.

Part – B

Microsoft Management Control ( MMC )

Console Root Fig.52

This is the gap window of the Microsoft Management Console. From here you may obtain your picks to add or to pull off any plans.

Adding Group Policy Object Editor Fig.53

This snap-in allows you to redact Group Policy Objects which can be linked to a Site, Domain, or Organizational Unit in the Active Directory or stored on a computing machine.

Adding IP Security Monitor Fig.54

The IP Security proctor snap-in is used to supervise the IP Security position.

Adding Security Configuration and Analysis Fig.55

Security Configuration and Analysis is an MMC snap-in that provides security constellation and analysis for Windows computing machines utilizing security templet files.

Event Viewer

Using the event logs in Event Viewer, you can garner information about hardware, package, and system jobs. You can besides supervise Windows XP security events.

A computing machine running any version of Windows XP records events in three sorts of logs:

– Application Log

– Security Log

– System Log

Event Viewer ( Application Logs ) Fig.56

The application log contains events logged by applications or plans. For illustration, a database plan might enter a file mistake in the application log. Program developers decide which events to supervise.

Event Viewer ( Security Logs ) Fig.57

The security log records events such as valid and invalid logon efforts, every bit good as events related to resource usage such as making, gap, or canceling files or other objects. An decision maker can stipulate what events are recorded in the security log. For illustration, if you have enabled logon auditing, efforts to log on to the system are recorded in the security log.

Event Viewer ( System Logs ) Fig.58

The system log contains events logged by Windows XP system constituents. For illustration, the failure of a driver or other system constituent to burden during startup is recorded in the system log. The event types logged by system constituents are predetermined by Windows XP.

Undertaking Manager

Task Manager provides information about plans and processes running on your computing machine. It besides displays the most normally used public presentation steps for procedures. You can see the position of the plans that are running and terminal plans that have stopped reacting.

Undertaking Manager ( Applications ) Fig.59

From the Applications section a user may acquire an overall position of all the plans being executed by the Operating System.

Undertaking Manager ( Processes ) Fig.60

The Processes are a list of all the system files in usage.

Undertaking Manager ( Performance ) Fig.61

The Performance section gives you an thought about how your CPU is acting at the peculiar minute. It gives you graphical representations and besides shows you charts on the sum of CPU use and its history. It besides shows the Page File use and its history.

Part – degree Celsius

Installing Scanner

Welcome Screen for Installation Fig.62

Choosing My topographic point of Residence Fig.63

License Agreement Fig.64

Installation in Progress Fig.65

Completing the Installation Fig.66

After Connecting the Device to the System Fig.67

Installation Completed Fig.68

Installing Printer

After Connecting Printer to the Port Fig.69

Introducing the Driver from a Specified Location Fig.70

Choosing Printer Device Fig.71

Adding Printer Device Fig.72

Completing Installation Fig.73

Share this Post!

Send a Comment

Your email address will not be published.

Kylie Garcia

Hi there, would you like to get such a paper? How about receiving a customized one?

Check it out