Microsoft Windows are one of the most used operating systems in the whole world. It is estimated that 80% of the computers in the world are run using Windows mainly because the GUI is very user-friendly and relatively easy to use. The software that runs using Windows is very easy to find, and the use of graphical user interface to manage files in the system is one of its core functions. The file management system is an administrator located in the operating system and is responsible for creating illusions on the existence folders in the memory of a computer. ...
Essays on Hard Disk
55 samples on this topic
Crafting piles of Hard Disk papers is an immanent part of contemporary studying, be it in high-school, college, or university. If you can do that unassisted, that's just awesome; yet, other learners might not be that savvy, as Hard Disk writing can be quite laborious. The collection of free sample Hard Disk papers presented below was assembled in order to help struggling learners rise up to the challenge.
On the one hand, Hard Disk essays we showcase here clearly demonstrate how a really exceptional academic piece of writing should be developed. On the other hand, upon your request and for a reasonable cost, a professional essay helper with the relevant academic experience can put together a top-notch paper example on Hard Disk from scratch.
Introduction
This paper enlightens the plan to deploy the Windows Server 2012 in Worldwide Advertising Inc. in an effective manner. The plan also incorporates the effective configuration and implementation of Windows infrastructure to support the work processes of the company. The company wants to keep pace with the technological requirements due to which the decision of deploying Windows Server 2012 is incorporated to provide the company with the technological sustainability for next two to three years. The company will be operating at two sites, Los Angeles and New York, due to which the integrated deployment of the system will be ...
Abstract
The paper investigates state and international policies on e-waste and on so called “planned obsolescence”. But first it explores the personal emotional story behind the most important and meaningful electronic device in the author’s life. Keywords: favorite personal electronic device, international policies on e-waste, planned obsolescence problem
My favorite device
My favorite and really meaningful for my whole life electronic device now is the Seagate Fast HDD Portable Drive which can store up to 4 terabytes of files and documents of any nature. It looks like a black cigarette package with attached to it a short 40 cm cable with the ...
Introduction
The current paper presents the proposal for the deployment of windows server in Contoso. The plan for the effective implementation and configuration for Windows Infrastructure is also enlightened. It is implied that the company possesses adequate capital for the effective deployment of the Windows network infrastructure due to which the proposal is focused to present the effective plan rather than incorporating the extreme cost efficient measures.
Features of Windows Server 2012
The features of Windows Server 2012, as inferred by Carvalho (2012), are discussed below:
Multi-server Support
A new and redesigned server is introduced in which cloud concept is incorporated so that server manager can manage ...
Introduction
Windows operating systems provide certain advantages over other operating systems in specific environments. However, for certain operations such as those required by Linx LLC new research and development group, a new version of Linux operating system triumphs Windows operating system. It is imperative to point out that Microsoft no longer offers support for Windows XP operating systems. Also, it is worth noting that the new research and development group for Linx LLC has several computers and systems running and operating on Windows XP. Given the lack of support by Microsoft in addition to other factors such as security issues ...
Cybercrime and many other crimes are justified by the collection of appropriate evidence by detectives and other law enforcement agencies. The forensics team to collect evidence from the crime scene uses various techniques and tools. Interviewing the witnesses to gather evidence and being able to incorporate the correct method to investigate the crime scene is expected from professional detectives. The paper highlights four mini cases and knowledge of methods used in these cases to collect evidence by forensics experts. Cyber crimes are crimes done by computer experts through their knowledge of software, programming, and networking techniques. In addition to ...
Management Information Systems
Linux is an open source software that can be downloaded free from the internet and used by the end users. Though the original creator of the software gave it freely, some firms have redesigned the operating system and sold it for profit. Other software firms have used it to create their commercial applications such as Oracle. The free availability of Linux has led to its wide use in mobile phones, enterprise software and consumer electronics. Despite its wide use for other purposes, only a small fraction has been used in desktop computers. There are various reasons why this occurs ( ...
Introduction
Lenovo is the Chinese company headquarters in Beijing, china and the second head quarter is in North Carolina, United States. The company Lenovo is indulged in the making of the personal computers, tablets, smart phones, and a lot of IT software, workstations, televisions, servers, and smart televisions. The Lenovo is successful in getting the largest unit sales. They develop, design and manufacture all the items mentioned above. They market the think pad for the notebook computers. Similarly, idea pads for the notebook computers. Idea center helps the desktop line, and yoga line helps in marketing the notebook laptops and ...
Part one
Personal computers have now become not just used for computation but also, a source of entertainment inform of PC games. The personal computing industry is now in growing at unprecedented levels regarding the hardware and software components. Hardware and software sales are up, and the challenge that computer consumers face now is identifying the computer model they need that will fit their requirements. Especially for the hardware components, the users will need to consider their hardware choice combination than include, graphics card, processors, storage, memory and power consumption. To do this, computer users will require determining whether the product ...
RAID Hard Drive Configuration
“RAID which stands for Redundant Array of Inexpensive Disks” is nothing but a configuration where a logical unit of large storage space is created by putting together a number of different hard disk drives. The purpose of doing this is that it is very robust and can be fault free with higher efficiencies that a single or various individual hard disk drives. RAID is a very good and tested technology across platforms and geographies which help the users in a fast access of data with a lot of reliability. RAID is now commonly becoming a part of every network ...
There are different laws and regulations that guide searching a personal property. One of the permission required searching this workplace is a warrant of search. The American constitution through the 4th Amendment protects private citizens from any manner of search if the searching authority does not have the probable cause for a search (Dutelle, 2016). Therefore to search this property, there is a need to find probable cause to search this facility. As an investigation officer, there is a need to obtain a court order and a police abstract detailing the need for the search and the probable cause ...
Sony Play station has been one of the most successful products of the century. Since the release of the first Play Station in December 1993, Sony has released three subsequent Play Stations with great success. Sony released the original play station in December 1993, and sold more than 70 million play stations worldwide by the time Play Station 2 was released in 2000 (USA Today, 2014). Play Station 2 sold more than 155 million by the time it was discontinued in December 2012 (USA Today, 2014). Sony released Play Station 3 in 2006, and had sold 80 million units ...
Linux is an open-source desktop and server operating system that is collaboratively developed (Fox, 2014). Linux is free; free of charge and free of patent restrictions. The operating system is secure, stable, highly configurable, and has regular updates. Additionally, it runs on x86 32bit and 64-bit CPUs and supports even ‘out-of-date’ hardware. Linux users enjoy support from the worldwide Linux community through various community sites and forums. Major Linux distributions include Ubuntu, Fedora, CentOs, OpenSUSE, Debian and Linux Mint.
Hardware
HACKD, LLC’s new research and development group LSDG has 500 computers that run Windows 7 and Windows XP Operating ...
Solid State Drives (SSD) are storage devices that have solid state memory, emulate a hard disk drive to store data, and uses hard disk drive (HDD) interfaces as well as Non-HDD interfaces. CPU performances have increased due to multi-core architecture, but HDD performance has stalled due to mechanical parts. Due to this, they have become bottlenecks while accessing data. An SSD with NAND flash memory can improve access speeds.
Advantages of SSDs
SSDs are very expensive. However, due to the benefits that are offered by the SSDs, more and more enterprises are considering the use of SSDs over HDDs. The SSDs offer ...
Abstract
The energy consumption in the high performance computing and cloud services is enormous. This requires energy efficiency techniques to reduce power consumption in operation and cooling of the data servers and high performance computers. To search for more energy efficient techniques to save power, companies across the world share data and conduct survey. This article gives an overview of requirement of energy efficiency, different energy efficiency algorithms for supercomputers, cooling and energy efficiency techniques used across the globe.
Introduction
There are multiple sources for energy consumption in high performance computing such as power consumption in running High Performance Computing (HPC), ...
Mind map
Introduction The application of computers is widespread in the current generation. Computers form a fundamental part of our daily lives as well as activities. The application of computers ranges from simple mathematical computations in devices like calculators to complex mathematical computations in industries. Virtually everything depends on computers for operation and completion of various tasks and processes in equal measure. The use of computer presents a variety of advantages over other alternative methods of accomplishing tasks (Krishnamoorthy, et al, 2009).
Background Research
A computer is an electronic device used to perform arithmetic operations which are employed in attaining different tasks a ...
The introduction of technology to the world brought about significant changes in how people work. Industries and companies placed huge budgets on manpower and equipment necessary in creating their products or completing their work. At the time, what they received as returns were enough to sustain them though it was quite hectic. Technology made most of the processes easy to complete and automate. On a downside, it affected the job opportunities for most of the employees as it replaced their spots in the different companies. In recent years, the adoption of Information Technology in companies is on an increase ...
The information management allows not only to focus in the processes and phenomena in the surrounding working environment, but it also helps to speed up and to optimize the decision-making process (Robertson, 2005). All these operations require qualified professionals, and, first of all, they require modern computer technologies. In order to choose the best computer of a high quality, the deep analyze should be done. Our choice will be made between three brands of computers: ‘Asus’; ‘Dell’; ‘Lenovo’. Chosen computers are the computers of the type All-in-One. The first computer is ‘Asus ET2701IGTH-C2’. His heart is a processor Intel ...
Introduction
We had a detailed meeting with company’s technical support team and we inferred that the current need for the company is an immediate upgrade of the computer hardware involved along with an additional purge from safety software, so as to ward off hacking attacks and purge existing malwares.
Statement of the problem
As we discussed the issues with your team, one of the key problems diagnosed was obsolete computer systems with overrun memory (Hard disk capabilities) and lesser RAM. Further, we found a tragic scenario when some computers were diagnosed to already been hacked by some anonymous hackers, consequently resulting in data ...
In the age when the entire world runs on the boon of scientific advancement and technology, Google docs is one of the best ways to conduct work or academic activities in an institute. This facility makes life easier and engages people to bring out their best, owing to the features that are provided and the ease of usage.
Google doc is very simple to use, and it is compatible with the following web browsers: Internet Explorer version 6 or higher, Safari 3.1 or higher and Firefox version 1.07 or higher (not Firefox 3). Also, the user needs to enable ...
Question 1
The first amendment of the United States constitution states; “Congress shall not make any law respecting an establishment of prohibiting the free exercise or religion thereof; or abridging the freedom of the press or speech; or the right of the people to assemble peaceably, and petition the Government for a redress of grievances”. This amendment gives freedom of speech in cyberspace to every citizen.
However, there are some states that have implemented laws that are specifically meant for the internet. There are those that prohibit filling of prescriptions over the internet and those that prevent auto manufacturers from selling ...
It is always a frustrating experience when my computer screen freezes, it takes too long to start up or it takes too long to open programs and perform simple tasks. The main causes are a fragmented hard disk, running heavy programs with little ram, too many temporary files and a full hard disk. It is always important to defragment the computer’s hard disk if one wants to optimize computer speeds. This is because a fragmented hard disk takes a lot of time to find data and thus reduces my computer’s speed.
Today there are many programs and games that I want ...
Q1.Main categories of hard disk drive failure?
According to Elerath there are basically two types of hard disc failures, the first one which is also referred to as operational normally prevents access to the data stored on the hard disc while the second type which do not in any case affect the hard disk but rather corrupts the stored data. In the second category the problem can be identified only when data is read and is found to be corrupt, these are called latent defects. Operational failures are results of bad tracks, dysfunctional electronics, and head failure to stay on track, defective read head and exceeding ...
A system that I use on daily basis is my home computer. My processor is a core i7 with 4GB RAM. My internal memory is 1 terabyte and runs on windows 8, the latest Microsoft operating system. The main components of my computer include: power supply, motherboard, the hard disk drives, monitor, keyboard, and mouse. The power supply serves the purpose of supplying power to the system. Without a power-backup, a computer cannot function. A motherboard hosts the key components of the computer. The components of a motherboard include a microprocessor which is the brain of the computer. A microprocessor performs commands and controls ...
The windows 7 operating system can be better maintained through the control panel where the operating system status can be monitored. In this section, backups to create an alternate location for information to be stored can be configured. This will allow for automatic backups to another location such as a drive. When set, information and other sensitive data will remain safe in case of virus attack at one drive or any other location within the operating system. In other cases, reliability and system history can be used to configure the operating system to enable it perform optimally. The following ...
Hewlett Packard (HP) did a great deal when he successfully innovated one of the smallest computer hard disk in middle 1992; it was so tiny especially compared to those of the previously made computer. Those hard drives that were made in early 1956 were almost the same size as that of two modern fridges placed together. In spite of the fact that the HP team did not achieve their sale expectation on the hard drives as they had anticipated by the year 1994, it was still a great successes and one can easily say they still had thrived in the market ...
Good Causes And Effects Of Laptop Failures Using Failure Mode And Effect Analysis Case Study Example
Question 1
Computers have been embraced by most people due to their benefits like speed of work, a complex storage area hence space saving, and the accuracy of the data and information. Nevertheless, laptops are prone to some failures which can have adverse effects on the organizations and individuals who solely rely on it (Liu, Ashok 165). The failure mode of laptops and the effects they have are all diverse in nature since they are different and affect different soft wares and hard wares in the laptop.
Failure mode
The power supply failure is the most common modes of failures in laptops especially if ...
Educational Institution
Correspondence concerning this paper should be addressed to Student Name, Introduction Pirated software is on the rise. With the introduction of the internet and the various technological advances, it is even easier for individuals to illegally copy and use unlicensed software. The Business Software Alliance (BSA) defines software piracy as an “intentional act of an individual or organization to obtain software through illegal means” (BSA, 2014). Pirated software may include copied DVD’s, downloaded materials from the internet, and software installed on multiple computers that was only registered for a single use. All of these acts constitute piracy ...
<INSTRUCTOR’S NAME> <COURSE NAME>
Investigation, collection of photos, videos and other artifacts are becoming sophisticated to scrutinize criminal cases and discover bad perpetrators in illegal actions. The employment of scientific or technical data to address the questions in court law refers to forensic. As defined by CNN, “digital forensic refers to branch that focuses on the identification, acquisition and analysis of information found on digital devices, digital cameras, cellular phones or any computer-based systems .” Since the introduction of personal computers 30 years ago, the advent of the internet 20 years ago and the continuous usage ...
- Introduction This research paper focuses on emerging technologies that promote sustainable computing systems. According to Bhattacharya, Govindan & Sankar (2013), sustainable computing encompasses the design, manufacture, use and disposal of computers and its subsystems (monitors, networking devices, printers, communication devices and storage devices) efficiently without interfering with the environment. Contemporary computing systems such as HPC (High Performance Computing Clusters) and Data centers face the challenge of high cooling and power costs. Gupta, Mukherjee & Banerjee (2011) state that the high consumption of power is a concern because it impacts on the cost, environment, reliability and scalability of the computing systems. ...
Introduction
Brand Design Decision: Portable brand The basis for coming up with a portable brand is to enable business persons who needs to travel with a computer device that can get used in business trips and has all the applications that get used in a computer based in an office. The name that got chosen for the creation of the portable brand is mega machine SB1. When customers hear of Strong Brand, what will get into their minds will be fine, fast and sleek machines. This brand image is what the company wants to get executives attention and put into their consideration ...
- Purpose Linux has different versions that are free to distribute and use. The liberty accorded to the distribution of Linux operating system has created a situation where the users have developed their own versions of the operating system. It is this public access and modification that is referred to as distributions. Linux distributions are made for various purposes and are tailored to solve and address several issues and problems. Some Linux distributions were developed to be used in network servers that receive heavy traffic this include web servers. Others were developed to be used by networks that ...
Gladys is a business lady who specializes in offering computer services such as typing and printing of thesis, scanning and other computer related services. In having a conversation with her, she seemed to have a lot of complaints regarding the inefficiency of computers and other hardware devices she uses to accomplish her work. She added by saying that of late, even her previous customers tend to divert to her competitors after realizing the persistent queue of customers at her business place who continues to complain of slow service delivery.
Process used to elicit information
In order to solve this problem, I decided to obtain more information from ...
As we approach the so-called ‘digital age’, more and more complex forms of technologies are invented designed to make our lives easier and fast. From beepers and telephones up to the latest tablets, iPhones and high speed computers, indeed man is continuous in developing newer forms of technologies for today’s fast paced living. The ‘computer’ according to the Free Dictionary, is an electronic device used in computation and is programmable for performing operations like surfing the internet, storing, inputting and retrieving data at high speeds. The first ‘mechanical computer’ was invented by the British mathematician, Charles Babbage in ...
Organization
When it comes to the world of personal computers, it becomes absolutely impossible to ignore the flourishing personal computer (PC) giants namely IBM, Dell, Apple, Sony, and Hp ( Iserlis). It becomes increasingly difficult for an individual to choose from the wide range of options available in the market. A number of companies have introduced their distinguished series of personal computers. They are primarily inclusive of a base model and several other advanced models derived from the basic model. This paper aims to provide a comparison between three different models of personal computers and recommend the best model of the three. ...
Discussion Paper on "Analyzing Intellectual Capital Cluster Index in Thailand's Hard Disk Drive Cluster"
Introduction: Thailand is considered the major exporter of the hard disk drive (HDD) in the world. The main four hard disk drive(HDD) giants include Seagate Technology, Fujistu, Western Digital and Hitachi Global Technology(HGST) where are production activities are based in Thailand. Thailand also holds almost the whole supply industry dealing with supply of materials in this industry. The other companies dealing with materials in this industry are also based in Thailand making it the sole controller of the HDD industry. The formal transfer of technology between multinational companies and the local small and medium sized enterprises ...
There are many issues and details that one has to put in place when dealing with forensic laboratory. The computer forensics lab is designated place either permanent or mobile for carrying out computer based investigations. It is also a collection of techniques, processes ad procedures that are used in collection, storage, analysis and presentation of digital evidence in relation to cybercrime. Building a forensic laboratory is therefore a complicated task. Some of the key issues that one must look out for is the design of the building because it is not a just like any other ordinary structure. The key issues that should ...
Windows 7 is an operating system from Microsoft Corporation. It has a Disk Management tool used to manage partitions. The Disk Management tool is used with the Windows 7 and Windows 8 versions. Windows Disk Management tools allow the creation, resizing and deletion of hard disk partitions without the need to use a special disk utility or additional software. The Disk Management utility is located in the Computer Management section of the operating system. It is accessible through elevated administrative rights by executing the diskmgmt.msc query in the Run dialog box. Once loaded, the disk management tool displays ...
Preserving the Crime Scene
The preservation of a digital crime scene requires that standard recommended procedures be followed. According to Houck, Crsipino, and McAdam, (2012), preserving the crime scene is aimed at reducing chances of tampering the digital evidence. The preservation of the crime scene forms part of the digital investigation process (Wiles and Reyes, 2011). All parties concerned with the crime will be required to be asked questions and the location of the crime scene will need to be identified prior to the preservation. Performing a live analysis will require the computer to be disconnected. This will ensure that data cannot be modified ...
Introduction
The computer hard disk drive, also known as hard drive, hard disk or simply HDD is a storage device which is non-volatile (HDD Scan, 2010). According to Mamun, Guo & Bi, (2007), it is used for the storage of digitally encoded data on platters which have magnetic surfaces. The platters are secured on an axle which holds then centrally to allow them to rotate. The motorized and mechanical aspect associated with the computer hard disk gives it the name “drive” (Bhargava, 2008). This is a distinction from other storage media like tapes or floppy disks in that it has an internal motor ...
Abstract
The use of encryption and decryption techniques for securing communication is as old as the art of communication. Technically, a code is used instead of data which is a signal for intent to keep data secret. In order to recover the contents from an encrypted signal, accurate decryption key is needed. The key is basically an algorithm that is used to reverse the work of the encryption technique and get original form of data. There is always a potential threat from hackers to decode encrypted signal, to avoid such issues specialized intellectuals have worked hard and defended these threats by developing more ...
Data Acquisition and Analysis
Part II. What types of forensic image formats does Adepto support? First Computer forensic software is going to be the stress of the note on Computer Forensic Tools which is Adepto, Adepto is an imaging processor that parts on the Helix Live CD and essential to the drive imaging software GUI (Graphical User Interface) that use for DD and DCFL-DD in commanding the imaging software that essentially use to create a forensically media services and sound imaging and so on. As today it fall into the discussion of Computer Forensic the goes to the board of categories the ...
In computer network analysis, there are several network designs usually deployed by different users due to different adaptations and the type of processing or transactions required for the business. This is mainly because there are some factors that affect the basic design and the type of networking equipment required. However, in each and every network design, there are six sub-sections which are present. These subsections are discussed below in some details to enable the network owner understand operation of the required network and how it will be set up. These subsystems or subsections include: entrance room, backbone cabling, ...
32 bit and 64 bit Operating System The 64 bit operating system allows a machine to process instructions with a maximum length of 64 bits per second. The 32 bit operating system allows machines to process instructions that are 32 bit length. The 64 bit operating system will handle longer instructions than the 32 bit operating system. The applications developed for 64 bit operating system are not compatible in the 32 bit operating system. Applications developed in the 32 bit platform works well but slow in the 64 bit operating system because the 64 bit platform is developed with ...
Part One
A. When the anti-virus program was downloaded, installed and a scan done on the whole computer system, no viruses were detected. B. After a day, the antivirus program was updated and a scan done on all disks and mails. A virus contained in an email attachment in the form of an executable file was detected and deleted.
Part Two
Generally, a virus is an executable program that replicates itself without the user's knowledge, and can have varied effects on the computer system depending on the intention of the programmer. Below are some descriptions or viruses that exist in the current technology world (Stamp, 2011). ...
Abstract
The experiment is about reverse engineering in a laptop machine with a faulty hard disk. One is supposed to examine the laptop machine with a problem. The matter subject at hand is supposed to educate one on how to open up the hardware components in a machine with a suspected faulty operating system. Components involved in the experiment at hand would entail and highlight on the need for using tools in troubleshooting a problem and solving or either upgrading system components from conclusive detail.
The list of components that would be involved would include specialized screwdrivers, for this case in opening and loosening nuts. Other ...
Building own personal computer rather than buying an already built PC is better because, with this option, one is able to get a computer that suits the needs they have. It will also be a lot easier to do the upgrading of the PC in the times to come because the owner understands the machine well. Another reason for this option is that it saves money when opting it build own machine when compared to purchasing something that is already built. Getting personal computers that have already been built is expensive as the sellers include the cost of assembling the computer. ...
Introduction & Purpose
Typing is one of the essential skills that a white-collar or even a blue-collar employee should learn (David 2-5). An aerospace firm situated at the heart of Seattle, Washington is concerned about the keyboard typing skills of it’s over 2000 white-collar employees. Most of the tasks involved in the company require the use of a computer and other gadgets that utilizes a QWERTY pad. Mr. Underwood, the firm’s personnel manager, together with the director of training is planning to conduct a company-wide training program so that aims to enhance their slow and poor keyboard-typing skills.
In order to make the process of ...
Throughout much of world history, the advent of the rainy seasons has been seen as a positive. Indeed, in ancient Egypt, the arrival of floodwaters down the Nile River were a vital part of the cycle of life, as those floodwaters brought with them the fertile silt that would line the riverbanks the rest of the year, allowing farmers to plant and cultivate crops. The Nile river god and the sun god, Ra, were the two primary deities of that culture – if they did not deliver, then people would starve. Throughout much of Asia, the monsoon season – characterized by long periods ...
Introduction
There are four different types of hard disks. These are Parallel Advanced Technology Attachment (PATA), Serial Advanced Technology Attachment, Small Computer System Interface (SCSI), and Solid State Drives (SSD).
Description of equipment
In this discussion, we are going to concentrate on SATA. Consequently, the discussion is going to outline some little information regarding the SATA hard disk, and then proceed to the installation of the same hard disks in the computer. Finally, after installing the hard disk, we are also going to see how a windows operating system can be installed to the hard disk drive.
List of materials and equipment or tools needed
1. A screwdriver, preferably Phillips, and four ...
Part One - Computer Viruses Manual
Understanding computer virus
A computer virus is a term used to describe malware or basically, any computer program that has the potential of copying itself onto a computer without the intervention of other programs or users. Viruses include malware like adware and spyware, though this malware do not have reproductive ability (Amoroso 1999). A computer virus has a reproductive ability to regenerate itself and infect other computers or other applications within the same machine. A virus can spread rapidly over networks or insecure intranets. It can also be spread by removable medium like USB drive and CDs.
Computer viruses term implies all ...
One example of a large number is bits that are found in the computer hard disk. As of the year 2011, the largest hard disk has a size of 1000 Gigabytes (GB). Computer scientists make use of bits when representing data and when doing scientific computations. 1 GB is equivalent to 1024 Megabytes (MB) while 1 MB is equivalent to 1024 Kilobytes (KB). 1 KB is equivalent to 1024 Bytes. 1 Byte is equivalent to 8 bits. The latest hard disk is therefore equivalent to 1000*1024*1024*1024*8 which translates to 8589934592000 bits. In scientific notation, this is equivalent ...
Introduction
The network administrator has given instructions that there is a port no. 25rc1 from which a user has raised a ticket, complaining about the slow down of a machine and there is a certain message which is being received that highlights some issue with the hard disk. This case study is about the solution provided to the user and the steps taken to analyze the complaint and the necessary steps followed during the eradication of the issue. During the analysis of the problem it was observed that this machine has windows XP installed and has proportional other hardware which includes a Pentium IV, Celeron ...
1. Introduction
Computer hard disk drives are storage devices for digital data. The digital data is stored on high-speed rotating magnetic surfaces. They are non-volatile and use the random access technique to access data stored on them. It consists of fast rotating discs which have magnetic surfaces onto which data is stored. They are permanently mounted on the computers and cannot be easily detached like floppy disks. It is known as hard disk drive as both the disk and the drive are contained inside the same unit. The costs of hard disk drives have fallen in the last few years and ...
Information Systems
There are various and diverse methods of data input into a computer from different media, each of which suits a given source of information. Printed papers such as questionnaires would best be entered into the computer system through optical data readers. This method is suitable because a person only uses pens and pencils to write, then the machine reader scans over the paper and automatically inputs the data into the computer. Telephone surveys are best entered into the computer system using the voice-recognition devices. This device recognizes human voice and records the data. It also saves people from making calls and asks ...