Premium Essay

Unit 8 Nt1110

In: Science

Submitted By Jordanc817
Words 257
Pages 2
Unit 8 analysis.
System Performance.
When it comes to system performance, having a slow system can be frustrating. There could possibly be multiple things wrong within your system. One problem could be too many processors running at the same time. Systems can also become infected with viruses of many different kinds and severely slow down.
However, by taking the right steps, someone can improve the performance of there system. To start with, the user can defrag there system which basically means cleaning out the hard drive. The user analyzes the hard drives programs that could be causing errors or bugs and deletes them so that the system can performe at its greatest potential.
Also, the user can check his system for hardware and software compatibility. If the user finds a compatibility issue it can be maintenanced and greatly improve the systems performance. The systems OS will always address if there is an system problem via alert messages. The user can easily fix whatever problem may be occurring by opening the systems alert message.
The user can always check a systems performance and reliability monitors. This is a windows feature that stores all records of past performance issues and can help find when a problem occurred. It helps the user find exactly what program that was installed caused a problem in the system. The systems user can find a manual for his or her system and by following simple steps of installing different internal hardwares for their system, they can greatly improve the performance of there...

Similar Documents

Premium Essay

Nt1110 Unit 8: Analysis - System Performance

...NT1110 Unit 8: Analysis System Performance Slow or sluggish system performance can be frustrating. There can be one or more things causing the slowdown of performance. Too many processes running in the background is only one issue of many possible reasons why the performance is sluggish. Virus, worms, and malware is another reason that can take up system resources and severely slow down a computer. By taking the necessary steps, one can improve the system performance of a computer. First one can perform routine maintenance like defragging a hard drive, cleaning up a hard drive. Checking the hard drive for errors and uninstalling unwanted programs will keep the Performance optimal. Checking for hardware and software compatibility and dealing with those issues will greatly enhance system performance. If there is a compatibility issue, address the issue and see an improvement. Address all system warnings that the OS alerts you too. One can resolve an issue by simply clicking on the warning popup window to help address the issue. Check the reliability and performance monitor. This feature in windows vista keeps a record of all past performance records and one can see when the problem started to have issues. One can accurately pinpoint the program or hardware that was installed when performance issues started happening. Disabling Windows Search indexer, vista aero interface, and vista sidebar will speed up your computers system performance. Those programs use up...

Words: 263 - Pages: 2

Free Essay

Nt1110 Unit 8 Video Summary

...Michael Hoss NT 1110-E3 Video Summaries: Unit 8 3.06 This video described the different operating modes and explained how they functioned. It also broke down the different operating system components; such as, the shell, the Kernel, and the registry. It also explained how the user interface interacts with the hardware through Kernel mode. * Real mode * Shell * API | * Protected mode * Kernel * HAL | * Long mode * Registry | 3.08 This video described the different installation types and the steps to install new operating systems on a computer. It also stated the advantages and disadvantages of a clean installation vs. an upgrade. Finally, it presented the different upgrade pathways of 9 x 05’ vs. NT OS’. * Clean install * Winnt.exe | * Dual boot * Winnt32.exe | * Upgrade | 3.22 This video described what driver signing means, and how unsigned drivers might affect your device. It also showed different steps to access the driver signing options, and what each choice did. It finally told you how to check the verification of your system’s drivers. * Driver signing * Signature verification | * Signed drivers | * Unsigned drivers | 3.23 This video described the uses for which you might change/add a hardware profile, and how to do it. It showed step by step instructions on how to add a profile and after restarting, how to use the device manager to enable/disable devices for that profile. * Device manager |...

Words: 413 - Pages: 2

Free Essay

Nt1110 - Unit 8: System Performance

...System Performance: Unit 8 Edward Greene NT 1110 When addressing system performance, a key element that is often overlooked is Disk Fragmentation.  Even on a brand new system with plenty of RAM and processing speed, the performance of the hard disk may be a bottleneck causing issues.  It takes time to load large data files into memory - issues become particularly noticeable when dealing with movies, video clips, database files or image files which may easily be several gigabytes in size.  On a freshly formatted disk, these files load fairly quickly.  Over time, however you may start to notice performance issues - caused by disk fragmentation. The different processes running in the back ground, (i.e. Windows Explorer, Power Manager) all take an allotted amount of RAM to perform at optimum levels. More free RAM means that the essential processes that are running have more priority of the space and the CPU. When you begin to run your RAM to its limits, The essential processes and even the non-essential processes begin to lag due to the overtaxing of the CPU and RAM. Your OS will use the hard drive as a “back-up” or virtual memory if your PC runs out of RAM while you are working away. Using your hard drive as memory causes a serious performance hit, as hard drives are way, way slower than RAM. So, the trick is having enough memory, adding more does not help if you are doing nothing that needs more memory. Today, with a modern PC and a modern OS, you need about 4 gig to......

Words: 365 - Pages: 2

Premium Essay

Nt1110 Unit 8 Assignment 1 Video Summary 6

...Corey Young Monday The first part of this video was talking about the history of the operating systems. The Microsoft OS were DOS that had a GUI interface, after that you had NT, 9x, 2000, XP, Vista which in my opinion was terrible, server 2003 and 2008. There are also other OS that have been out Unix and Linux is what Macintosh are built from and then you also have Mac OS X. Video 3.02 was talking about installing new hard ware, creating partitions and formatting partitions, and installing OS systems. Before you install an OS system after installing a new hard drive you need to create and format a partition which will be an c partitions. There are two types of partitions which are primary and extended. You can only create one of each with the FAT file system. The NTFS you can create four primary partitions or three primaries and one extended. In creating partitions you need to know the order they are created and deleted. The orders to create partitions are first primary then extended and logical. To delete a partition you will simple reverse the order. Video 3.03 is about comparing active, system and boot partitions. After creating partitions you need to mark one active which usually contains the boot file so you can start up the OS. The system and the boot partitions are part of this system. The system partitions contain boot files which contains the operating system which boots up the OS. The boot partition contains system files which contain the OS files. So......

Words: 279 - Pages: 2

Premium Essay

Week 6

...NT1110 Computer Structure and Logic Week 6 Unit 8 Quiz 1. Which graphical interface is used to explore the file system? a. Windows Explorer b. Internet Explorer c. Control Panel d. Command prompt This type of physical drive partition can only contain one drive letter. a. Primary b. Secondary c. Extended d. Logical Apple computers running Mac OS X can use which processors? a. Intel only b. PowerPC only c. Intel and PowerPC d. AMD only Which of the following is not a Linux distribution? a. PCnix b. Red Hat c. SuSE d. Ubuntu Which operating system has the largest market share? a. DOS b. Linux c. Mac OS X d. Windows Which of the following is not a Windows Vista GUI feature? a. Three-dimensional windows b. Translucent windows c. Self-modifying windows d. Window animations Mini applications that provide a variety of services, such as connecting to the Internet to access weather updates, are called: a. applicons b. gadgets c. sidebars d. windowizers 2. 3. 4. 5. 6. 7. NT1110 Computer Structure and Logic Week 6 Unit 8 Quiz 8. Viewing local and network drives is accomplished with which graphic utility? a. Internet Explorer b. My Computer c. Control Panel d. Command prompt The starting point for adjusting hardware and user interface settings is __________. a. Internet Explorer b. My Computer c. Control Panel d. the command prompt This type of drive partition can contain one or more logical drives. a. Primary b. Secondary c. Extended d. Logical To create a file system, you......

Words: 554 - Pages: 3

Premium Essay

Hello

...NT1110 Computer Structure and Logic Week 7 Unit 9 Quiz 1. Biometrics is used to authenticate based on: a. something you know. b. something you are. c. something you have. d. something you do. 2. Which of the following is used to encrypt an entire hard disk? a. EFS b. NTFS c. BitLocker d. Local Audit Policy 3. Which file system provides the most features? a. FAT b. FAT16 c. FAT32 d. NTFS 4. An example of something a user knows used for authentication is a: a. retina scan. b. thumbprint. c. PIN. d. signature. 5. A firewall that protects against malicious traffic inbound and outbound is called a/an __________ firewall. a. one-way b. two-way c. pass through d. filtering 6. Files encrypted with EFS cannot be opened by: a. the user who encrypted them. b. EFS key holders. c. administrators. d. guest users. 7. Which is not a good password management technique? a. Changing passwords periodically b. Enforcing a minimum password length c. Telling a friend your password in case you forget it d. Preventing old passwords from being reused NT1110 Computer Structure and Logic Week 7 Unit 9 Quiz 8. Sending an email that tricks a user into providing personal information is a form of: a. baiting. b. phishing. c. pretexting. d. Trojan horsing. 9. Which is not a Windows account level? a. Administrator b. Guest c. Limited d. Supervisor 10. Which permission is needed to access and run programs? a. List b. Modify c. Read and execute d. Write 11. This is a graphical......

Words: 591 - Pages: 3

Premium Essay

Homework

...UNIT 4 REASEARCH PAPER 1: pORT EXPANDERS Andrew Otano- Castro 04/10/2015 UNIT 4 REASEARCH PAPER 1: pORT EXPANDERS Andrew Otano- Castro 04/10/2015 NT1110 NT1110 What is a port expander? Port expander are hardware device designed to allow a user to utilize more than one device on a single port at one time. It’s able to connect several devices to one serial port, for example connecting mouse, and keyboard when you only have one USB slot to use, you would use a port expander to fix this problem. There are several different types of port available for expander hardware, but to list a few we have USB, Ethernet, Audio, SAS, VGA, Microphone, DVI, and Video ports.( see pictures below). Port expanders are made generic so it’s compatible with most computers if not all, as long as the computer has the ports for which you are trying to expand for. With anything there are always disadvantages, and advantages. Disadvantages to port expanders are that whenever you have it fully connected it takes away performance from all devices since they all share the same bandwidth. Example if you have a 6GBps port expander which can connect up to 8 devices, when all connected creates a traffic jam making the performance slow creating a bottle neck effect. Also most are external, requires a lot of power, for this reason you possibly overload/ruin the power supply, or PC may not start till all is disconnected. Advantages to port expanders are that......

Words: 263 - Pages: 2

Premium Essay

Intergrated Circuit Technology

...Nt1110 Integrated Circuit Technology Jerick San Gabriel NT1110 Unit 1 Assignment 1: Integrated Circuit Technology 2.) Processor Model | Year | Transistor Count | Intel 4004 | 1971 | 2,300 | Intel 8008 | 1972 | 3,500 | Intel 8080 | 1974 | 4,500 | Intel 8085 | 1976 | 6,500 | Intel 8086 | 1978 | 29,000 | Intel 8088 | 1979 | 29,000 | Intel 80186 | 1982 | 55,000 | Intel 80286 | 1982 | 134,000 | Intel 80386 | 1985 | 275,000 | Intel 80486 | 1989 | 1,180,235 | Pentium | 1993 | 3,100,000 | Pentium Pro | 1995 | 5,500,000 | Pentium II | 1997 | 7,500,000 | Pentium III | 1999 | 9,500,000 | Pentium 4 | 2000 | 42,000,000 | Atom | 2008 | 47,000,000 | Itanium 2 McKinley | 2002 | 220,000,000 | Core 2 Duo | 2006 | 291,000,000 | Itanium 2 Madison 6M | 2003 | 410,000,000 | Itanium 2 with 9MB cache | 2004 | 592,000,000 | Core i7 (Quad) | 2008 | 731,000,000 | Quad-Core + GPU Core i7 | 2011 | 1,160,000,000 | Six-Core Core i7 (Gulf town) | 2010 | 1,170,000,000 | Quad-Core + GPU Core i7 | 2012 | 1,400,000,000 | Dual-Core Itanium 2 | 2006 | 1,700,000,000 | Six-Core Xeon 7400 | 2008 | 1,900,000,000 | Quad-Core Itanium Tukwila | 2010 | 2,000,000,000 | Six-Core Core i7/8- Core Xeon E5 | 2011 | 2,270,000,000 | 8-Core Xeon Nehalem-EX | 2010 | 2,300,000,000 | 10-Core Xeon West mere-EX | 2011 | 2,600,000,000 | 8-Core Itanium Poulson | 2012 | 3,100,000,000 | 62-Core Xeon Phi | 2012 | 5,000,000,000 | 3.) Quad-Core Itanium Tukwila, 2010, 2,000,000,000 4.) Anonymous....

Words: 352 - Pages: 2

Premium Essay

Pentium Flaw

...Ariel Torrente NT1110 Unit 5 Analysis Pentium Flaw Ariel Torrente NT1110 Unit 5 Analysis 7/27/2013 Pentium Flaw The Pentium flaw also nicknamed the Pentium FDIV bug, was an identified error in the Intel P5 Pentium floating unit. The presence of the bug can be checked manually by performing the following application that uses native floating numbers, including Windows Calculator or Microsoft Excel in Windows 95/98 (Pentium FDIV bug). The Pentium flaw was discovered byProfessor Thomas R.Nicely at Lynchburg Collwge,Virginia USA (Emery, Vince). Dr.Thomas R Nicely is a mathematic professor, noticed a small difference in two sets of numbers, he always double-checks his work by computing everything twice, two different ways (Emery, Vince). Dr.Nicely spent months successively eliminating possible causes such as PCI bus errors and compiler artifacts (Emery, Vince). Intel wanted to keep to keep the Pentium flaw a secret, after Intel testers discovered a division error in the Pentium chip (Emery, Vince). Intel managers decided that the error wouldn’t affect many people, therefore no one outside of the company was not informed (Emery, Vince). The pandemonium over Intel’s Pentium chip cost the company millions of dollars and could have been prevented and became an uproar on the internet (Emery, Vince). This was Intel’s first mistake and the company was given a reputation that made Intel not a trustworthy company and not disclosing that information made them seem to be hiding a...

Words: 906 - Pages: 4

Free Essay

Nt1110 Unit 6 Student Study Guide

...NT1110 Unit 6 Student Study Guide 1. What are the two types of memory found in your computer? RAM & ROM 2. Discuss the features of RAM. RAM can be changed at any time and loses its data when power is turned off 3. What is an important characteristic of DRAM? DRAM is Dynamic 4. What type of RAM does not require refreshing? SDRAM DRAM 5. Discuss the main feature of DDR and DDR2. DDR – Double Data Rate DDR2 – Double Data Rate Enhanced 6. What is a RDRAM module? Discuss its application. A dynamic variant of the RAM 7. Compare and identify memory modules. 168 pin DIMM 100 pin DIMM 172 Pin Micro DIMM or DDR 8. Which type is used in laptops? 144-pin SODIMM 9. Discuss the geometry of hard drives. The Geometry of hard drive is organization of data on Platters 10. How many drives can be attached to one PATA cable? 2 Drives 11. How are they identified? IDE or SATA 12. Define UDMA. The UDMA interface was the fastest method used to transfer data between the computer and  ATA devices until serial ATA.   13. Discuss the major features of ATA drives. ATA drives are the standard interface that connect hard disks and optical units to a computer. 14. What information is provided by the PATA BIOS? LBA Translation, Hard drive geometry and Data transfer rate 15. List the three geometry factors. Number of cylinders, write/ read heads and......

Words: 287 - Pages: 2

Premium Essay

Nt1230 Syllabus

...processes and procedures involving the installation, configuration, maintanence, troublshooting and routine adminstrative tasks of popular desktop operating system(s) for standalone and network client computers, and related aspects of typical network server functions. Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course relates to other courses in the NSA program: 1 Date: 8/31/2012 Client-Server Networking I Syllabus NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420...

Words: 1834 - Pages: 8

Free Essay

Bussiness

...NT1110 Unit 2 Assignment 1: Transfer Time – Step by step processRef: http://www.t1shopper.com/tools/calculate/downloadcalculator.phphttp://luckylarry.co.uk/programming-tutorials/how-to-calculate-data-transfer-speeds/Formula: Transfer Time = File Size / Transfer Rate 1.For file size - > Convert all KBytes to bytes (x 1024) and then to bits (x 8) 1.e.g. 2GB = 2 * 1024 * 1024 * 1024 * 8 bits = 17,179,869,184 bits2.For transfer rate -> convert to bits ( x 1000) 1.E.g. 56 Kbps = 56 * 1000 bps = 56,000 bpsProblem: Calculate Transfer timeFile SizeTransfer RateTransfer Time2 GB56 Kbps?Solution:Formula: Transfer Time = File Size / Transfer Rate Step 1: Convert file size to bytes. (Multiply by 1024 to get to GB -> MB -> KB -> bytes). 2 GB x 1024 = 2048 MB= 2048 * 1024 = 2097152 KB= 2097152 * 1024 = 2147483648 bytesStep 2: Covert file size from bytes to bits. (Multiply by 8).2147483648 * 8 = 17,179,869,184 bitsYou can combine Steps 1 and 2 by doing it in one step: 2 * 1024 * 1024 * 1024 * 8 (will give file size in bits)Step 3: Covert transfer rate to bits per sec. (Multiply by 1000).56 Kbps * 1000 = 56,000 bpsStep 4: Divide Step 2 result by Step 3 result to get transfer time in seconds.17,179,869,184 / 56,000 = 306,783.3783 secondsStep 5: Convert Step 4 answer in seconds to minutes, hours, days etc.306,783.3783 seconds / 60 = 5113 minutes (Divide by 60 to convert secs to mins)= 5113 minutes / 60 = 85.22 hours (Divide by 60 to convert mins to hours)= 85.22 hours /......

Words: 282 - Pages: 2

Free Essay

Nt1110 Unit 1

...Computer Structure and Logic NT1110 Unit 1 Assignment 1: Integrated Circuit Technology Anthony Smith Intel Processor Transistor Count Processor Model Year Transistor Count Intel 4004 1971 2,300 Intel 8008 1972 3,500 Intel 8080 1974 4,500 Intel 8085 1976 6,500 Intel 8086 1978 29,000 Intel 8088 1979 29,000 Intel 80186 1982 55,000 Intel 80286 1982 134,000 Intel 80386 1985 275,000 Intel 80486 1989 1,180,235 Pentium 1993 3,100,000 Pentium Pro 1995 5,500,000 Pentium II 1997 7,500,000 Pentium 4 2000 42,000,000 Itanium 2 McKinley 2002 220,000,000 Itanium 2 Madison 6M 2003 410,000,000 Atom 2008 47,000,000 Itanium 2 with 9MB cache 2004 592,000,000 Dual-Core Itanium 2 2006 1,170,000,000 Core 2 Duo 2006 291,000,000 Core i7 (Quad) 2008 731,000,000 Six-Core Xeon 7400 2008 1,900,000,000 Quad-Core+GPU Core i7 2011 1,160,000,000 Six-Core Core i7 (Gulftown) 2010 1,170,000,000 Quad-Core Itanium Tukwila 2010 2,000,000,000 8-Core Xeon Nahalem-EX 2010 2,300,000,000 Six-Core Core i7/8-Core Xeon E5 2011 2,270,000,000 10-Core Xeon Westmere-EX 2011 2,600,000,000 Quad-Core+GPU Core i7 2012 1,400,000,000 8-Core Itanium Poulson 2012 3,100,000,000 62-Core Xeon Phi 2012 5,000,000,000 Source: Wikipedia August 29, 2013 A History of Microprocessor Transistor......

Words: 516 - Pages: 3

Free Essay

Papers

...Unit 5 Assignment 1 Homework David Thompson NT1110 Oct/21/2013 1 Three reasons why overheating would occur in the CPU would be the result of having a lot of dust inside your computer, dirt buildup. Having a faulty fan. Another reason would be not enough air flow coming and coming into your computer. 2 Overclocking is to run a microprocessor faster than the speed for which it has been tested and approved. 3 Throttling process is a process responsible for regulating the rate at which application process scene is conducted either static we are dynamically 4 Thermal compound increases the thermal connectivity of a thermal interface five billion microscopic air gaps in imperfect flat smooth surfaces 5 Since the core or processor is a unit that reads and executes programs instructions, such as copy or move data. multiple cores can do multiple instructions at the same time increasing overall speed of the programs itself 6 Hyper threading is used to improve parallelization of computations or doing multiple tasks at once performed on the PCs microprocessor. It addresses two virtual or logic corps and shares the workload between them when possible the main function of hyper threading is to decrease the number of depending instructions to one core. 7 A cache is used to reduce the average time to access memory cache is a smaller faster memory which stores copies of the data from frequently used memory locations. There is instruction cache......

Words: 440 - Pages: 2

Free Essay

Nt1110

...!!!Rosa Cano NT1110 SAT 9AM July 15, 2015 Unit 1 Assignment 1: Integrated Circuit Technology Number 1 and 2 question Model of Processor | Year implemented | Transistor Count | Intel 4004 | 1971 | 2,300 | Intel 8008 | 1972 | 2,500 | Intel 8080 | 1974 | 4,500 | Intel 8085 | 1976 | 8,500 | Intel 8086 | 1978 | 29,000 | Intel 8088 | 1979 | 29,000 | Intel 80186 | 1982 | 55,000 | Intel 286 | 1982 | 134,000 | Intel 386 | 1985 | 275,000 | Intel 486 | 1989 | 1,200,000 | Intel Premium | 1993 | 3,100,000 | Intel Premium II | 1997 | 7,500,000 | Intel Premium III | 1999 | 9,500,000 | Intel Premium 4 | 2000 | 42,000,000 | Intel Itanium | 2001 | 25,000,000 | Intel Itanium 2 | 2003 | 220,000,000 | Intel Itanium 2(9MBcache) | 2004 | 592,000,000 | Core 2 duo | 2006 | 291,000,000 | Core i7 | 2008 | 731,000,000 | Quad-core Itanium | 2010 | 2,000,000,000 | Six-Core core i7/8 | 2011 | 2,270,000,000 | 8-Core Itanium | 2012 | 3,100,000,000 | 62-Core Xeon Phi | 2012 | 5,000,000,000 | 3. The Processor model that placed two billion transistors in a single processor chip was the Quad-core Itanium in 2010. 4. Citation: http://www.wagnercg.com/Portals/0/FunStuff/AHistoryofMicroprocessorTransistorCount.pdf 5. The growth of the transistors seems to be fairly reasonable, because since the power of the computations is growing rapidly so this has to also and it will continue to do so as new technology arises. Looking at this chart, it is showing......

Words: 351 - Pages: 2