answersLogoWhite

0

Computer Maintenance

Tasks and programs that are necessary for proper computer upkeep including Scandisk and Defrag

1,519 Questions

What is the format of an e-book?

Normally an e-book is of PDF format (.pdf) and it is opened using adobe acrobat reader. however there are other types of e books that are written in HTML or even in xml. it should be noted that an e-book is an electronic book, what i mean is that anything you see on your computer screen as a soft copy and not printed on papper can be considered as an e-book.

IDE cable DVD installation?

Not sure what you need to know exactly but all you need to do is plug the IDE cable into the IDE slot of the DVD drive.

If you have a CPU that gets very hot and will be used in a noisy industrial building what effect would these conditions have on your choice of coolers?

I would not be concerned with the volume of the cooling fan, go with something cheap and reliable rather than quiet and expensive (although quiet often means more reliable)

Personally, in a noisy building, a CPU cooler's noise level is not something I would worry about. I would get a cooler that produces the most air flow to keep the CPU cool.

A fan that moves the most volume of air along with the best coils and heatsink

would be the best choice.

I doubt you would even hear the loudest cooler there is.

How can files be damaged?

Files can be damaged in a number of ways. Here are some common examples:

1. Your file system may become trashed. If the file tables are damaged, then so are at least some of the files.

2. A failing hard drive or other bad media can cause files to become corrupted.

3. Files can be corrupted through transferring them. File sharing is popular and yet, bugs in the software, people moving incomplete files to share folders, PC problems, and other things can introduce corruption. Sometimes users have fake or corrupted files and don't even know it, and they share them to others. There are people representing various industries who deliberately put corrupt or fake files online to help discourage copyright abuse.

4. User error, deliberate sabotage, and overwriting files can damage them too.

5. Computer viruses can infect or corrupt files.

Why would a PC lock up?

Usually a PC locks up due to hardware or software conflicts. You can tell if it's a hardware conflict if the lock ups occur while using the same combination of equipment (e.g. printing while downloading something off the web). This was more common in older systems - but I haven't experienced this problem with newer PCs in the past few years due to their achievements in making equipment compatible with other vendors.

More commonly, a lockup is due to software conflicts. These are harder to troubleshoot, since they could appear randomly. Most times, this is due to a lack of memory. If you have a lot of software on your PC, they could be using most of your free memory. If you're running 128Mb or 256Mb with a Windows 2000 or greater OS, then you're probably lacking in RAM.

In the Task Manager, check out the Performance tab & peep the memory section (the 2nd graph Page File Usage History). If the yellow line is anywhere near 1/2 way through the grid, you might want to upgrade your memory or uninstall memory-hungry apps.

With today's prices, upgrading RAM is quite affordable. As for uninstalling unnecessary application, go to Control Panel & then to "Add/Remove Programs". Search for any unrecognized and unnecessary apps & remove them.

A computer may lock up when the hard drive is fragmented or almost full, and the registry is full of junk from previously installed programs. See related questions for advice on cleaning up.

If your PC doesn't give you any messages and screen is frozen, it might be hardware conflict or heat, but if your mouse still moves then I would check my video card, update drivers and check the temperatures.

Also, viruses and adware contribute to instability. So if you have tried nearly everything else, run some spyware and virus scanners. Back when Windows 98 was popular, some people complained of a green dot in the upper left corner of the screen and instability. That was spyware that did that. Removing the spyware made the dot disappear and the system lock up less.

If all else fails, it is probably the motherboard. Motherboards contain electrolytic capacitors which serve to filter the current (among other roles). With time, they may swell, leak, or explode. There are places which will replace them for you. Also, motherboards can develop broken traces and loose connections. In some cases, the problem is the ROM BIOS, and you can often flash it with a newer version that makes it more stable.

What is the function of fingers in computer?

If you mean literal fingers (human phalanges), they are used for entering data into the computer and controlling the computer.

"Finger" is also the name of a network protocol, though not a very secure one since unencrypted personal data is sent.

Then there are what people call "gold fingers" which are circuit board traces, pins off of chips, and other "gold" pieces of computer scrap. They are used to make electrical connections inside of computers. In reality, they don't contain a lot of gold and take many of these pieces to make an ounce.

How do you dial Techvedic UK number?

This is toll free number of techvedic uk no. CALL 0800 635 0716

What is the driver memory footprint?

Intel® DVMT 2.0 Graphics MemoryFootprint The driver determines the amount of pre-allocated memory needed and will make additional nonlocalvideo memory requests to achieve the total amount needed for the display and application graphics memory operational footprint. Factors in Footprint Variance The 865G chipset UMA memory footprint varies, and is determined using several factors. The key factors are system resources and system activity. Unlike the Intel® 81x chipset family, the 865G chipset memory footprint is not static. Memory footprint will vary in size as system requirements and demands vary. For example, when running a DVD in a window on the desktop, memory is needed for the DVD and the background desktop. However, when running a DVD full screen, the desktop frame buffer may be discarded or paged back to disk. This is the most efficient use of memory. DVD playback is just one of many activities that could effect memory allocation. The following section will describe some of the factors that aid in the request for page locked memory. Note: The operating system does not always grant the graphics driver's memory request. Base Allocations Part of the graphics memory allocation is dependent upon system activity. These are base allocations that the driver requests at the time it loads. For the 865G chipset, the driver allocates 204 KB for the command ring buffer and cursor/context buffer memory on all operating systems. Once loaded, the operating system and graphics driver allocates the buffers that the driver needs for performing graphics operations. The total graphics footprint allocates memory for commands, the frame buffer (resolution), the Z-buffer, GDI data, and off-screen memory. Maximum Allocations When graphics memory is being allocated from system memory, the total DVMT graphics footprint in system memory is capped to an upper-limit, ensuring the best usability and performance of the operating system, applications and graphics. The 865G chipset platform supports a minimum of 128 MB of system memory. For systems with 128 MB of system memory, the 865G chipset graphics driver will limit the graphics memory footprint to 32 MB. For systems with greater than or equal to 192 MB of system memory, the 865G chipset graphics driver will limit the graphics memory footprint to 64 MB. For PC14.X display drivers only, the 865G chipset graphics driver shall limit the graphics memory footprint to 96 MB.

What are the key requirements that memory management should satisfy?

Relocation, protection, sharing, logical and physical organization.

I believe this is an acceptable answer. These should be the functions that memory management deal with.

What is the origin of the term reboot your computer?

The term reboot comes from the middle age (before computers). Horses who stopped in mid-stride required a boot to the rear to start again. Thus the term to rear-boot, later abbreviated into reboot, widely used for WINDOWS!

How do you increase speed of a computer using a flash disk?

if your flashdisk has U3 on it then you can download programs on it that speed the computer up. some are free and some cost money.

Computer is not even 4 months old Hp Z400 and worked fine on Friday. Shut it down for the weekend and when it was booted up Monday morning Windows took ten minutes to load. Anyone have a idea why?

Sounds like a vius. Belive it or not but most computers you buy from retail stores come with a vius that will deploy itself. I am sure the computer came with a trial for norton, or macafee antivirus. Start windows with i am assuming it has windows 7. Click start, control panel, programs, uninstall a progrom or whatever it say, Click show all uses, uninstall any anti virus programs, go to www.AVAST.com download the 100% full free home edition, reboot computer, run the AVAST consol register it, perfrom a thourogh virus scan on all dives check mark scan archives and wait. If anything pops up move to chest. If that does not work delete it, If that does not work reinstall windows and download avast again.

Also most paid or free trial antivirus software comes with a virus so you will update and pay for the full version.

How can you make mabinogi download faster?

You can get anything to download faster by removing files and speeding up your computer.

Is a byte a single character?

In ASCII, EBCDIC, FIELDATA, etc. yes. However Unicode characters are composed of multiple bytes.

What happens if you overload a socket on a computer?

2 things could happen, one being that your motherboard recognizes that the part is too powerful and will give you the Blue screen or 2 it will fry the socket in the motherboard, but hopefully it will do the first one first.

How do you allocate unallocate disk space?

You can allocate unallocated disk space by creating a primary or secondary partition (or both if you have enough space). Start->Control Panel->Administrative Tools->Computer Management->Storage->Disk Management, right click on the unallocated space->Create partition and then follow instructions.

How can you convert torrent link to direct link?

You need not to.With every torrent link there is a direct Link given.

You can directly use that link.

What does redundant mean in Redundant Arrays of Independent Disks?

It means that there are more disks than are strictly needed to store the data at full capacity. The redundant disk space is used to keep copies of the data should one of the "independent" (or "inexpensive") disks fail. See other entries on redundancy.

What is the difference between antivirus and diagnostic software?

  • antivirus software are programs that locate, identify, and attempt to remove virus programs that have installed themselves on the computer. antivirus software, once installed and activated by the user often runs automatically without further human attention.
  • diagnostic software are programs used to find hardware problems on a computer, to help determine in a timely manner what needs to be fixed or replaced and get the computer working again. diagnostic software, is usually designed for use by trained technicians in a computer repair shop not the computer user/owner (although some owners do buy and use diagnostic software as they like to do the work themselves, just like some car owners like to work on their cars themselves).

Why do you still need mainframe computers even though personal computers and workstations have become very powerful?

Mainframe computers are immensely more powerful than standard PCs. They are usually fitted with massive hard-drives (many terabytes in capacity) - many megabytes of internal memory - and super-fast processors. Sometimes mainframe computers are networked together - providing huge amounts of computing power.

How do you change coolant from computer liquid cooling system?

<You are not suppose to do that.>

That is BS. I manufacture computers. Depending on what you are cooling and what substance you have running through your lines, the times differ. Ethylene Glycol is the most common coolant, because it is non-conductive, and almost as thermodynamic as water. You should change this every six months or so, to prevent it from gelling up and solidifying in your pump.

Water is popular, because you can simply get it from your tap, and add an anti algae additive. I personally don't use water, but if you use it straight out of your tap, every 2 months would be sufficient, and changing your tubes and pump is required every year, to prevent calcium from binding to parts. Distilled or de-ionized water should be changed every 4-6 months. Remember to use additives if you use water! Along with giving you cool colors and stuff, it will prevent the growth of algae and other plant and bacterium that will restrict flow to your components. Phil Owner: The ProngHorn Axiom: Self Evident. Necessary.

How is the syndrome for the Hamming code interpreted?

Hamming Codes are used for detecting multiple errors in a transmitted code. It can trace missing parts of a code that may have been lost through transmission and it can also tell you if an error has occurred in any bit of the code using Modulo Tow Arithmetic.

Read more: http://wiki.answers.com/What_are_hamming_codes_used_for#ixzz21gh0KNMn