Clear the Automatically Manage Paging File Size for All Drives check box. Under Drive Volume Label, click the drive that contains the paging file you want to change. Click Custom Size, enter a new size in megabytes in the Initial Size (MB) or Maximum Size (MB) box, click Set, and then click OK. Windows ready boost can be used to enhance your computers disk caching capabilities as flash drives can be up to ten times faster than accessing regular harddrives. This enables windows vista machines to access cached data on the flash drives rather than the local harddrives. This type of caching is applied to all disk content, not just the page file but the computer's overall performance is boosted.
3. Memory module type, memory chip type used on the module, memory module speed, error checking, allowable module sizes and combinations, the number of modules needed per bank of memory, whether the system requires or supports dual-channel memory, the total number of modules that can be installed. 4. Most commonly found memory modules in PC compatible personal computers and workstations. Stores its information in a cell containing a capacitor and transistor; these cells must be refreshed with new electricity every few milliseconds allowing the memory to keep its charge and hold the data as long as needed.
Using a magnetic charge c. Changing the disk’s surface so that later the light will reflect differently for 0 or 1 d. Holding a sound wave in a vacuum 12. Which of the following answers are true about an internal hard disk drive (HDD) as it is normally used inside a personal computer? (Choose two answers.) a. Used for short-term memory b.
5. What are the minimum system requirements for Fedora 15 with the GUI installed? The minimum system requirements for Fedora 15 with GUI is: Intel Pentium Pro processor with 400 megahertz. RAM 384-512 mebibytes. Hard disk space can be as little as 90 mebibytes.
b. The CPU reads all RAM sequentially, beginning with the first byte, until it happens to read the byte that the CPU wanted to read. c. The smallest unit of data that RAM supplies back to the CPU is 1 bit. d. The CPU must first find the file in the file system before reading the data. 6.
8) U.S.B. - (Universal Serial Bus) is an industry standard developed in the mid-1990s that defines the cables, connectors and communications protocols used in a bus for connection, communication, and power supply between computers and electronic devices. 9) H.D.D.-(Hard disk drive) is a data storage device used for storing and retrieving digital information using rapidly rotating disks coated with magnetic material. HDD retains its data even when powered off. Data is read in a random-access manner, meaning individual blocks of data can be stored or retrieved in any order rather than
d. Kilobyte 3. Which answer lists the correct number of bits associated with each term? c. 64 bits per quadruple wor 4. Which of the following answers are true about random-access memory (RAM) as it is normally used inside a personal computer? (Choose two answers.)
It also specifies that the storage environment should support 5,000 IOPS during its peak workloads. The disks available for configuration provide 66 GB of usable capacity, and the manufacturer specifies that they can support a maximum of 140 IOPS. The application is response time sensitive, and disk utilization beyond 60 percent does not meet the response time requirements. Compute and explain the theoretical basis for the minimum number of disks that should be configured to meet the requirements of the application. 3.
NT 1210 Chapter 1 2. Which of the following terms means approximately 106 bytes? Megabyte 5. This chapter describes the concepts behind ho a CPU reads the content from RAM. Which of the following is true about the process of read data, as described in the chapter?
Power saving: both types of computers can hibernate or sleep when not being used. Components: the internal components of a desktop computer are not designed of low power operation. This includes the CPU, which is Vulnerability: both types of computers are vulnerable to malicious code if not properly protected. Communications: Notebooks computers typically have infrared port and built-in video cameras and microphones, whereas these devices are add-nos for desktop computers. Unit 1 Assignment 1: Integrated Circuit Technology Assignment Requirements 1.