Free Essay

Back Log of Data

In:

Submitted By swinneym
Words 1423
Pages 6
ENGI 241

Experiment 5

Basic Logic Gates

OBJECTIVE
This experiment will examine the operation of the AND, NAND, OR, and NOR logic gates and compare the expected outputs to the truth tables for these devices. The NOT function will be implemented using NAND and NOR gates.
EQUIPMENT AND PARTS REQUIRED
1
Protoboard
1
DVM
1
Logic Probe
1
74LS00, 74LS02, 74LS08, 74LS32
2
each 1kΩ resistors
INTRODUCTION
The NOT circuit or inverter performs the basic logic function of complementation. It may be identified by the presence of a bubble on the input or the output of the traditional logic symbol or a triangle on the IEEE/IEC logic symbol as seen in Figure 1. The inverter has one input and one output and the output is the complement of the input. Figure 1 contains the truth table for the NOT function.
LOGIC DIAGRAM
TRUTH TABLE
A

Q

0
1

1
0

FIGURE 1
All logic gates have two or more inputs and one output. These logic gates accept digital logic levels on their inputs and will provide a digital logic level output which is dependent on the type of logic gate and the inputs applied to the gate. For the TTL logic family, any gate input that is not connected will be treated as if a logic 1 is present on that input. The number of different possible combinations of inputs is 2n where n is the number of inputs. Therefore, four unique combinations of inputs are possible for a two input gate.
A B
Q
0
0
1
1

FIGURE 2

0
1
0
1

0
0
0
1

The AND function is similar to the multiplication in mathematics, and provides a logic 1 output only when all the inputs of the gate are at logic 1, and logic 0 output for all other input combinations. Figure
2 contains the logic symbols and truth table for the AND function. The Boolean Equation for a 2 input
AND gate, the Boolean Equation is:
Q = AB
<1>

Page 1

ENGI 241

Experiment 5

Basic Logic Gates
A B
0
0
1
1

FIGURE 3

Q
1
1
1
0

0
1
0
1

The NAND function is the complement of the AND function and the logic symbols have the inversion on the output. The NAND function provides a logic 0 on the output only when both inputs are logic 1, and a logic 1 output for all other combinations. The logic diagrams and the truth table are in Figure 3. The Boolean Equation for a NAND gate is:
Q= AB

<2>
A B
0
0
1
1

FIGURE 4

Q
0
1
1
1

0
1
0
1

The OR function is similar to the mathematical function of addition and the output for the OR gate may be analyzed using the laws of addition. The logic operator for the OR function is a + sign. The output will be logic 0 only if all the inputs are logic 0, and the output will be logic 1 anytime any input is at logic 1. The logic symbols and the truth table for the OR gate may be found in Figure 4 and the
Boolean Equation for this function is:
Q=A+B
<3>
A B
Q
0
0
1
1

FIGURE 5

0
1
0
1

1
0
0
0

The complement of the OR function is the NOR function and the logic symbol has the inversion present on the output. Figure 5 contains the logic diagram and the truth table for the
NOR function and the Boolean Equation is:
<4>
Q= A + B
If we take all the inputs of a NAND gate or a NOR gate and connect them together, we will have an inverter or NOT function. This may be useful in logic design when an inverter is required. If we have a
NAND gate that is not used for the circuit and we need an inverter, we can construct the inverter by connecting all the inputs together and connecting the gate in the normal manner. The connection of the
NAND gate and the NOR gate as an inverter may be found in Figure 6.

FIGURE 7

FIGURE 6

Page 2

ENGI 241

Experiment 5

Basic Logic Gates

PROCEDURE
1.
Draw the entire logic diagram with pin functions for the 74LS00, the 74LS02, the 74LS08, and the 74LS32. Label all pins and note their function.
2.
Build the circuit of Figure 6 using the 74LS00. Fill in Table 1 with the logic levels using the logic probe, and the output voltage as measured with the DVM.
3.
Build the circuit of Figure 6 using the 74LS02. Fill in Table 2 with the logic levels using the logic probe, and the output voltage as measured with the DVM.
4.
Build the circuit of Figure 7 using the 74LS08. Fill in Table 3 with the logic levels using the logic probe, and the output voltage as measured with the DVM.
5.
Build the circuit of Figure 7 using the 74LS00. Fill in Table 4 with the logic levels using the logic probe, and the output voltage as measured with the DVM.
6.
Build the circuit of Figure 7 using the 74LS32. Fill in Table 5 with the logic levels using the logic probe, and the output voltage as measured with the DVM.
7.
Build the circuit of Figure 7 using the 74LS02. Fill in Table 6 with the logic levels using the logic probe, and the output voltage as measured with the DVM.
8.
Construct the circuit of Figure 8 using only the 74LS02. Fill in
Table 7 with the logic levels and voltages.
FIGURE 8
9.
Construct the circuit of Figure 9 using only the 74LS00. Fill in
Table 8 with the logic levels and voltages.
10. Leave one input of a 74LS08 unconnected and connect the other input to a logic level as indicated by the A input of Table 9. Fill in the table with the logic outputs observed.
11. Leave one input of a 74LS32 unconnected and connect the other input to a logic level as indicated by the A input of Table 10. Fill
FIGURE 9 in the table with the logic outputs observed.
12. Leave one input of a 74LS00 unconnected and connect the other input to a logic level as indicated by the A input of Table 11. Fill in the table with the logic outputs observed.
13. Leave one input of a 74LS02 unconnected and connect the other input to a logic level as indicated by the A input of Table 12. Fill in the table with the logic outputs observed.

Page 3

ENGI 241

Experiment 5

Basic Logic Gates

DATA TABLES
INPUT
A

OUTPUT
Q

INPUT

Voltage

A

0

Q

Voltage

0

1

OUTPUT

1
TABLE 1

INPUT
A

B

0

TABLE 2

OUTPUT
Q

INPUT

Voltage

A

B

0

0

0

0

1

0

1

1

0

1

0

1

1

1

OUTPUT

1

TABLE 3

INPUT
A

B

0

Voltage

TABLE 4

OUTPUT
Q

Q

INPUT

Voltage

A

B

0

0

0

0

1

0

1

1

0

1

0

1

1

1

OUTPUT

1

TABLE 5

INPUT
A

B

0

Voltage

TABLE 6

OUTPUT
Q

Q

INPUT

Voltage

A

B

0

0

0

0

1

0

1

1

0

1

0

1

1

1

OUTPUT

1

TABLE 7

Q

TABLE 8

Page 4

Voltage

ENGI 241

Experiment 5

INPUT
A

B

0

Basic Logic Gates

OUTPUT
Q

INPUT

Voltage

A

B

0

0

0

0

1

0

1

1

0

1

0

1

1

1

OUTPUT

1

TABLE 9
INPUT
A

B

0

Voltage

TABLE 10

OUTPUT
Q

Q

INPUT

Voltage

A

B

0

0

0

0

1

0

1

1

0

1

0

1

1

1

OUTPUT

1

TABLE 11

Q

Voltage

TABLE 12

QUESTIONS
1.

Explain the behavior of a 2 input TTL gate when one input is left open?

2.

Draw the logic diagram of a 2 input NAND gate using only a 74LS02.

3.

Draw the logic diagram of a 2 input AND gate using only a 74LS02.

4.

Draw the logic diagram of a 2 input NOR gate using only a 74LS00.

5.

Draw the logic diagram of a 2 input OR gate using only a 74LS00.

6.

Draw the logic diagram and the truth table for a 4 input OR gate using only a 74LS32.

7.

Draw the logic diagram and the truth table for a 3 input AND gate using only a 74LS08.

Page 5

Similar Documents

Free Essay

Introducing Transaction Log Files

...Introducing Transaction Log Files Each SQL Server 2000 database has at least one transaction log file and can have multiple transaction log files spread across a number of disks. Each transaction log file is a separate operating system file and is used by only one database. Each transaction log file generally has the .ldf filename extension (this extension is not required). Each transaction log has a logical filename that is used in Transact-SQL statements and a physical filename that is used by the Windows operating system. Additional file properties include the file ID number, initial file size, file growth increment (if any), and maximum file size. Unlike data files that contain pages, transaction log files contain a series of transaction log records. A sequential log sequence number (LSN) identifies each transaction log record. Regardless of the number of physical log files, SQL Server 2000 treats the transaction log as one continuous log. SQL Server 2000 logically divides each physical transaction log file into a number of virtual log files (VLFs). The number and size of virtual log files are determined dynamically based on the size of each transaction log file. Each transaction log file has at least two VLFs. Each growth increment (if any) is treated as a separate physical file with its own VLFs. The number or size of VLFs cannot be configured or set directly by the database administrator. SQL Server 2000 tries to maintain a small number of virtual file logs because it operates...

Words: 2158 - Pages: 9

Free Essay

Amit Kumar

...HOMEWORK CAP613T: DATABASE ADMINISTRATION Q1. Profiles and accounts are managed in SQL Server 2008 using various stored procedures. Create profile and its accounts and manage them using those stored procedures and give the screen shots with results. Ans. sysmail_add_profile_sp [pic] sysmail_add_account_sp [pic] sysmail_add_profileaccount_sp [pic] sysmail_update_profile_sp [pic] sysmail_update_account_sp [pic] sysmail_update_profileaccount_sp [pic] Q2.  Create Event Notification for updation and deletion of table. Ans. Creating Event Notification for updation: CREATE EVENT NOTIFICATION NotifyUpdateEvents ON DATABASE FOR UPDATE_TABLE TO SERVICE '//AdventureWorks/EventNotificationService' , 'current database' GO Creating Event Notification for deletion: CREATE EVENT NOTIFICATION NotifyDeleteEvents ON DATABASE FOR DELETE_TABLE TO SERVICE '//AdventureWorks/EventNotificationService' , 'current database' GO Q3 “A common configuration is to use the same account for both SQL Server Service and SQL Server Agent Service” comment. Are there some extra conditions or rights in windows operating system for the accounts used by SQL Server Agent, if yes. Discuss them? Ans. • Adjust memory quotas for a process: This privilege determines who can change the maximum memory that can be consumed by a process. This privilege is useful for system tuning, but it can be misused, for example, in a denial-of-service...

Words: 876 - Pages: 4

Premium Essay

Transaction Management Ch 10

...it must be managed carefully even in a single-user database environment. Then explain why a multi-user database environment makes transaction management even more critical. Emphasize the following points: • A transaction represents a real-world event such as the sale of a product. • A transaction must be a logical unit of work. That is, no portion of a transaction stands by itself. For example, the product sale has an effect on inventory and, if it is a credit sale, it has an effect on customer balances. • A transaction must take a database from one consistent state to another. Therefore, all parts of a transaction must be executed or the transaction must be aborted. (A consistent state of the database is one in which all data integrity constraints are satisfied.) All transactions have four properties: Atomicity, Consistency, Isolation, and Durability. (These four properties are also known as the ACID test of transactions.) In addition, multiple transactions must conform to the property of serializability. Table IM10.1 provides a good summary of transaction properties. Table IM10.1 Transaction Properties. |Multi-user | |Single-user | |atomicity: Unless all parts of the executed, the transaction is aborted | |Databases | |Databases | | | | | | | |consistency. Indicates the permanence...

Words: 4230 - Pages: 17

Free Essay

Project

...Contents Exclusive summar 1 Check-in Process for XYZ Company 3 Organizational Overview 3 Process overview 3 Detailed process description 4 Membership sign up sub-process (Figure 2) 4 Equipment service sub-process (Figure 3) 5 Transaction and Object 5 Give a general name for this chapter, such as DATA BASE DESIGH 6 Overview of Flow Chart and Data base 6 Give a name here, such as Data Base Detail 10 Court Type (Category table) 10 Employee(Object table) 10 Equipment (Category table) 10 Member (Object table) 11 Membership Type (Category table) 11 Payment (Transaction table) 11 Rental Record (Intersection table) 12 Schedule (Transaction table) 12 Information Technology Controls for XYZ Recreation center 14 ADD A TiTLE, Such s overview of Controls 14 Control Details 14 Control classification zone 15 Type 16 Implementation 17 Metrics 17 Compensating Control 18 Change log 19 PRJ 1 19 PRJ 2 20 Exclusive summary Going to stadium is an enduring activities among Americans, especially among those college students. Those people are keen to exercise their body day by day. It brings our company, XYZ Stadium, large amount of clients and incomes. What’s more, other organizations are willing to rent our space to hold their activities such as sport event. However, these good news challenge us in management process especially in check-in process which we did not think it over carefully before. To mitigate these problem, our company pushes...

Words: 5460 - Pages: 22

Free Essay

Intro Mainframe Exercise

...old pro. On the command line, type 0 and press Enter. This takes you to the ISPF Settings menu. Go to the field beside Command line at bottom. Delete the "/" using the delete key (the backspace key will bring you back a space but will not delete characters). Press Enter. The command line jumps to the top of the screen. : To get back to the ISPF Primary Option Menu, press F3. F3 almost always takes you one screen back If you accidentally hit F3 too many times, you'll be taken all the way back to the TSO READY prompt - to get back to the ISPF Primary Option Menu from here, type ISPF and press Enter. Log off of z/OS, by pressing F3 until you arrive at the TSO READY prompt. Type LOGOFF and press Enter: IF you have done more extensive work during your session, you will see this Specify Disposition of Log Data Set screen when you attempt to F3 past the ISPF Primary Option Menu: Whenever you encounter this screen, select option 2: "Delete data set without printing," and press Enter. You will then be taken to the TSO READY prompt, and the system informs you that a log that you don't need has been deleted. Type LOGOFF and press Enter to end your session. Should you not follow this logoff procedure, you will get a LOGON REJECTED error when you try to log back in: If this happens to you, enter LOGON on this screen, then supply your user ID at the next prompt. Once you get to this screen: enter your password (but don't press Enter yet). Now Tab down until the cursor...

Words: 2097 - Pages: 9

Premium Essay

Design and Implementation

...a conversion of description of the recommended alternative solution into logical and physical specifications for the system starting from the input until the output screens consists of report, databases and computer processes. By that action the company might ease to reveals the real systems from which all the programming and system construction can be accomplish. This system could be implemented into any hardware and software since it is not tied up to any of the specific one. However, the logical design will illustrate the functions of the system in all aspects. In the physical design, the logical design will be interpret into the physical or technical specifications by convert the systems data to the structured systems design. DIALOGUE INDIVIDUAL CUSTOMER INFORMATION Figure 1 0 | Log-OnScreenSystem | 1 | MainMenu0, System | 5 Reports 0, 1 4 Salesperson Information 0, 1 3 Order Status 0, 1 2 Individual Customer Information 0, 1 2.1.1.3 Customer’s Contact Number 1, 2.1, 2.1.1 2.1.1.2 Customer’s Address 1, 2.1, 2.1.1 2.1.1.4 Customer’s Order 1, 2.1, 2.1.1 2.1.1.1 Customer’s Name 1, 2.1,...

Words: 3417 - Pages: 14

Free Essay

Oracle for Dummies

...™ Everything Easier! Making cle 11g Ora ® Learn to: • Set up and manage an Oracle database • Maintain and protect your data • Understand Oracle database architecture • Troubleshoot your database and keep it running smoothly Chris Zeis Chris Ruel Michael Wessler www.it-ebooks.info www.it-ebooks.info Oracle 11g ® FOR DUMmIES ‰ www.it-ebooks.info www.it-ebooks.info Oracle 11g ® FOR DUMmIES by Chris Zeis, Chris Ruel, and Michael Wessler ‰ www.it-ebooks.info Oracle® 11g For Dummies® Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright © 2009 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online...

Words: 106399 - Pages: 426

Premium Essay

Deploying-Veritas-Backup-Exe

...PS Series Best Practices Deploying VERITAS™ Backup™ Exec 10 and Auto-Snapshot Manager Abstract This Technical Report describes how to back up and restore NTFS volumes, Microsoft Exchange e-mail, and SQL databases using VERITAS Backup Exec 10, the EqualLogic Auto-Snapshot Manager for Windows VSS provider, and PS Series storage arrays. Copyright © 2005 EqualLogic, Inc. August 2005 EqualLogic is a registered trademark of EqualLogic, Inc. All trademarks and registered trademarks mentioned herein are the property of their respective owners. Possession, use, or copying of the documentation or the software described in this publication is authorized only under the license agreement specified herein. EqualLogic, Inc. will not be held liable for technical or editorial errors or omissions contained herein. The information in this document is subject to change. PS Series Firmware Version 2.1 or later. ii Deploying VERITAS Backup Exec 10 and Auto-Snapshot Manager Table of Contents Technical Report and Software Revision Information......................................................... iv Introduction ............................................................................................................................1 Common Backup and Recovery Configurations ...................................................................2 Backup and Recovery Media .................................................................................................3 Backup to Disk...

Words: 9581 - Pages: 39

Premium Essay

Firm Analysis

...various reasons: Since Netflix is still getting revenues despite of the fierce comptetion in the movie sector. They still have a growing base of customers and consumers. Netflix did also manage in creating the new movie/tv shows rentals mentality after shifting from sending DVDs through mail into unlimited streaming. And now netflix expanded even more and began producing their own shows. That growth in their profit and Netflix's ability to adapt with the the market and consumer habbits netflix is still far away from stagnation. Sprint Sector: Technology. Industry : Wireless Communications. We need to fill this Step 2 we went to the Wharton Research Database Services (WRDS): http://wrds.wharton.upenn.edu/ and downloaded the following data for our two stocks: • ACT = current assets, total; • LCT = current liabilities, total; • AT = assets, total; • REVT = revenue, total; • DP = depreciation and amortization; • INTPN = interest paid, net; • TXT = income taxes, total; • DVT = dividends, total; • CSHO = common shares outstanding; • COGS = cost of goods sold; • XOPR = operating expenses, total; • NI = net income; • LT = liabilities, total. In addition to...

Words: 1804 - Pages: 8

Premium Essay

Inventory Management System

...CHAPTER I PROBLEM AND ITS BACKGROUND Introduction Nowadays new technologies have brought a lot advantage to us, especially to those who involve in business. One of those technologies is using a computerized system in their business, but not all business is using computerized system, some of them are using manual in their transaction. Classical inventory theory usually assumes that the inventory on record is accurate and thus reflects the actual inventory level. However, in practice the inventory on record is not always accurate. The exact inventory level is not known to managers, and can deviate from the actual inventory level. There are many possible reasons for such discrepancies between the inventory on record and the actual inventory level, including transaction errors, misplaced inventory, spoilage, defective product quality. As technology increasing and handling the business world, there are still businesses that are still attached in traditional or manual system because they are afraid to change the way of their existing system. One of those businesses is the Dory’s Restaurant that until now is using a manual in their Sales and Inventory System. Inventory system is used to track information of a particular goods or product it monitors the product left and the product that need to restock. Sales is important in the business, because it involves the money that goes in for the company, sales is the business asset and the customer business deals. Dory’s...

Words: 18918 - Pages: 76

Free Essay

Rererer

...Oracle DBA Interview Questions and Answers Compiled By Mohamed Fowjil Abdul Hameed Contents Oracle DBA Interviews - Overview 2 Oracle DBA Interview Questions and Answers – ARCHITECTURE 4 SENIOR ORACLE DBA INTERVIEW QUESTIONS 31 MID LEVEL ORACLE DBA INTERVIEW QUESTIONS 57 Oracle 11g Database New Features Interview Questions and Answers 65 Oracle RAC Interview Questions and Answers 70 Oracle RAC Interview Questions (10g) Questions and Answers 137 Oracle Data Guard Interview Questions and Answers 168 Oracle ASM Interview Questions and Answers 205 Oracle Patching,Cloning and Upgrade Interview Questions and Answers 219 Oracle Backup and Recovery Interview Questions and Answers 228 Oracle RMAN Interview Questions and Answers 232 Oracle Performance Tuning Interview Questions and Answers 237 Oracle Performance Tuning Interview Questions and Answers 245 Oracle Export/Import (exp/imp)- Data Pump (expdp/imp) Interview Questions and Answers 249 UNIX Interview Questions and Answers for Oracle DBAs 254 Oracle DBA Interviews - Overview Dear Readers, Hereby, I am sharing my experience of interviews asd technical discussion with various MNC Dba’s, Project managers and Project delivery managers and Technical architects, as part of my interview preparation, I used to refer my own work note as well as web sources below details are a consolidate form of my interview preparation and Oracle dba interviews questions and answers General Guide line:...

Words: 97621 - Pages: 391

Premium Essay

Oracle Backup

...Oracle Backup There are two type of back • Cold backup (Offline) • Hot Backup (Export) Cold backup Procedure Setup 1. Copy backup from Source Check the Oracle version & Path Open Comd Prompt and typecomd Tnsping [database_name] Then type Sqlplus Type username /password @ DB name as sysdba Check the How many DB install on system Click on Start Button and type services.msc and press enter this screen display Press O and search Oracleservice[DB name] Stop the service Now press the stop button on the left side Now go to your Oracle home directory and open it . Go to DB directory and Copy the Folder and past to the backup path After finish the copy then start service of “Orlaceservice[DB Name] Your cold/hard back Complete. Restore the Backup (On Same Version and installation Path) Step 2. Create New DB Click Start Button and type dbca and press next Select Create Database and Press Next Select General Purpose and Press Next Type Globaldatabase and SID and Press Next Uncheck Configure the database with Enterprise Manager Enter the Password for Sys and System and press Next Select File System and Press Next Select Use Common Location for all database and click Browser Select the Path and Press Ok and then Next Uncheck Specify Flash Recovery Area Press next on simple Schemas Press Next Press Finish Press Ok Press Finish Database Creation...

Words: 662 - Pages: 3

Premium Essay

Database Security and Hipaa

...of federal and state governments, the amount of sensitive patient data has increased incrementally This data is moved from within and without of all stages of the healthcare process. From an office visit to the doctor, to the medications filled at the local pharmacy, to the bills handled by multiple insurance agencies, delicate patient information is being viewed, handled and passed along. The list of individuals who access the confidential information can include office staff, laboratory personnel, nurses, doctors, insurance agents, case managers and many more. The Health/Insurance Portability and Accountability Act of 1996 (HIPAA) was created to safeguard patients’ medical data security and privacy. HIPAA incorporates requirements that allow for a comprehensive review that will show anyone who has looked at confidential medical patient information. HIPAA is structured to provide a complete security access and auditing for Oracle database information. This framework designates data access points such as User Access Control, System Administration, Object Access and Data Changes that should be monitored and controlled. An accurate HIPAA compliant security execution assures all such access areas are plainly outlined and that applicable security measures along with audit controls are in place. This paper will review and describe these controls as they apply to an Oracle database instance used for medical data. Keywords: HIPAA database, database encryption requirements, database...

Words: 4360 - Pages: 18

Free Essay

Practice Activity 10

...organization's needs. A company needs to back up the following data: database, site-level file root, pipeline root and file content module files, server configuration and log files. Backup frequency for larger companies plan suggests performing incremental log file backups hourly. In the event of an epic failure, researchers will lose no more than 1 hour of work. For a nice size company I suggest a retention period of 7 years. The duration that you keep long-term backups may be decided by the company’s legal or accounting teams. A full backup of database should be done monthly. Differential/Incremental backup of database should be done nightly. Transaction Log backups should be backed up hourly. These backup should all occur on a weekend or during a period of low usage on the server. Test by restoring you backup to a computer that has a wiped or formatted hard drive. Do not restore the data to the original computer. Restore your data to a test computer of the type that you would actually use in the event of a disaster. Make sure all programs still work and can still update and save data. I believe the company’s best bet would be to hire a company that maintains and manages data. Data Recovery Group's Business Data Recovery Team is specialized in emergency recovery whether RAID Recovery, NAS / SAN Recovery, Encrypted Data Recovery, recovery of a Linux / Unix / Sun / Novell system, or something more complex, Data Recovery Group can handle server data recovery needs with...

Words: 278 - Pages: 2

Free Essay

Netw Lab 12

...Lab 12.1 1. The type of events are system log, application log, and security log. Errors will happen same as warning and information. 2. Applications and Services Logs vary. They include separate logs about the programs that run on your computer, as well as more detailed logs that pertain to specific Windows services. 3. Custom Views, it’s easier to call up a commonly used filter. You can easily remove old events and then show recurring events. 4. Yes you can 5. Edit custom view Lab 12.2 1. This process is of assigning alphabetical identifiers to physical or logical disk drives or partitions. 2. You would have to use start up repair. You would need to take ownership for this to work. 3. The System Volume Information folder (SVI) contains windows system restore files. If you do not have any important data on that drive, you could format and reclaim the space. 4. Driver Restore backs up your existing drivers and settings to create a restore point so that if you run into a similar issue in the future, the user would have an easy solution prepared. 5. When the user restores the system Lab 12.3 1. Disable Service helps you to disable services running in the background such as "push service”,” upload service" or "pull ad service" and so on. This would help keep out the viruses etc. 2. No 3. System Configuration is an advanced tool that can help identify problems that might prevent Windows from starting correctly. You can start...

Words: 335 - Pages: 2