Clear the Automatically Manage Paging File Size for All Drives check box. Under Drive Volume Label, click the drive that contains the paging file you want to change. Click Custom Size, enter a new size in megabytes in the Initial Size (MB) or Maximum Size (MB) box, click Set, and then click OK. Windows ready boost can be used to enhance your computers disk caching capabilities as flash drives can be up to ten times faster than accessing regular harddrives. This enables windows vista machines to access cached data on the flash drives rather than the local harddrives. This type of caching is applied to all disk content, not just the page file but the computer's overall performance is boosted.
RAID 1 –Mirrored set- Creates an exact copy of data on two or more disks c. RAID 5 –Striped set- Parity uses blocked level striping with parity data distributed across all disks in the RAID array. d. RAID 6 –Blocked striped-uses dual parity, crates 2 parity blocks for each data block, handles two disk failures. 4. Why is RAID 0 of any use if it offers no redundancy? RAID 0 gives more storage capacity in that data is spread across multiple.
8) U.S.B. - (Universal Serial Bus) is an industry standard developed in the mid-1990s that defines the cables, connectors and communications protocols used in a bus for connection, communication, and power supply between computers and electronic devices. 9) H.D.D.-(Hard disk drive) is a data storage device used for storing and retrieving digital information using rapidly rotating disks coated with magnetic material. HDD retains its data even when powered off. Data is read in a random-access manner, meaning individual blocks of data can be stored or retrieved in any order rather than
How can a user demonstrate that their computer or device is malware free? By periodically performing real time scanning on system for malware that might have been missed by malware shield. 3. What are the steps necessary to establish a malware free computer or device Installing anti-malware software, Scanning and Auditing of system, and removal of malware. 4.
NT1110 Computer Structure and Logic Chapter 6: Memory and Storage 1. A computer storage location that allows information to be stored and accessed quickly from random locations within the DRAM (Dynamic Random Access Memory) on a memory module. 2. A page file is stored on the computer hard drive that is used as a temporary location to store information that is not currently being used by the computer RAM. 3.
d. Kilobyte 3. Which answer lists the correct number of bits associated with each term? c. 64 bits per quadruple wor 4. Which of the following answers are true about random-access memory (RAM) as it is normally used inside a personal computer? (Choose two answers.)
| RANDOM ACCESS MEMORY (RAM) | 4 GB (8 GB max) | Gives storage space for data to be downloaded to PC. | ADAPTERS | | Sound cards | Get audio, video, and memory storage. | | | Video cards | | | | SD memory cards | | PORTS | Serial (1), Ethernet (1), and USB (5) | Send and receive information. | STORAGE | Hard Drive | Hard drive (1 x 750 byte); flash drive | Store data even when PC is turned off. | | Optical Drive | CD/DVD drive | | Application Software Table APPLICATION | MANUFACTURER | REQUIREMENTS MET | Word processing; spreadsheets; presentations | Microsoft Word, Excel, Powerpoint, | Create and edit documents; make spreadsheets; create presentations.
(Choose two answers.) a. Used for short-term memory b. Used for long-term memory c. Used to process data d. Connects to the CPU over a bus using a cable e. Is installed onto the motherboard 5. This chapter describes the concepts behind how a CPU reads the contents from RAM.
In telecom closet 2, from the punch down block, to the switches, to the wall plates, and on to the offices workstation, plus one shared printer, cabling will change to Cat 5e UTP, using 1000 Base-T technology, achieving a throughput of 1000Mbps. A safety feature on Ethernet Lans, is its access method, CSMA/CD. CSMA/CD, means that your NIC checks the network to make sure it is not busy before transmitting, if two nodes do transmit at the same time having a collision, it will send out packets to inform other nodes of a data collision, then the NIC waits for the network to be inactive before retransmitting. On the
Here are a few of the more common methods: Kerberos, SSL, Microsoft NTLM, PAP and SPAP, CHAP and MS-CHAP, EAP, RADIUS, and Certificate services (Shinder, 2014). Kerberos uses temporary certificates called tickets and on these tickets the user information and password is encrypted. Originally developed at MIT, Kerberos provided UNIX networks an authentication protocol and is now a standard in the industry and has since expanded into being supported by Microsoft’s operating systems (Shinder, 2014). The next is Secure Sockets Layer or (SSL). The combination of public and secret key technology to secure access to websites is how this protocol works.