Premium Essay

Introduction to Operating System– Unit 1 Db 1 Unit 2 File System

In:

Submitted By THRISTE
Words 671
Pages 3
Windows 7 comes with a utility called the disk management utility which will allow you to create, resize, and delete hard disk partitions on the fly without having to boot into a special disk utility.
The Disk Management utility can only manage file systems compatible with Windows operating systems, such as FAT16/FAT32 and NTFS. Let’s say you want to make a partition smaller so you can create another partition on a hard drive this utility will allow you to do so.

ScanDisk- A DOS utility included only in Windows 95/98/ME it is used to scan the suface ofthe hard disk and repair errors on the hard drive scan disk scans for lost clusters on the hard drive and turns them into .chk files.

Chkdisk -is a command line program that also scans the hard drive and looks for lost clusters on the hard disk. It reports the current amount of free memory and disk space. If you use the chkdsk /f command which is Chkdsk with the /f = fix command it reclaims the lost clusters and turns them into .CHK files.

FDisk- Is a program that runs in MS-DOS and non-NT versions of Windows and creates partitions on the hard drive Windows 95b first added support for FAT-32 partitions into fdisk. Before that it only supported partitions up to 2 GB using FAT-16.

Disk Manager- A driver first introduced in 1985 from Ontrack Data Recovery, a Kroll Ontrack subsidiary, Eden Prairie, MN (www.ontrack.com) that allowed older DOS PCs with a 32MB disk limit to access larger drives. Since PCs made before 1994 may have had a system BIOS that did not support larger drives, the Disk Manager utility grew in popularity and was often bundled with new hard disks. Over 150 million copies of the software have been sold. In 2004, Disk Manager 5.0 was released for drives over 137GB in size. (Computer Language Company, 1981-2010)

ResEdit on Legacy Windows- You can create your own window resources

Similar Documents

Premium Essay

Srs for Lgu System

...PROVIDED BELOW, DO NOT COVER ALL OF THE MATERIAL, BUT MERELY, THE GENERAL NATURE OF THE INFORMATION YOU WOULD USUALLY FIND IN SRS DOCUMENTS. IT IS BASED ON THE IEEE REQUIREMENTS AND WAS ADAPTED SPECIFICALLY FOR THE NEEDS OF SOFTWARE ENGINEERING COURSES. MOST OF THE SECTIONS IN THIS TEMPLATE ARE REQUIRED SECTIONS, I.E. YOU MUST INCLUDE THEM IN YOUR VERSION OF THE DOCUMENT. FAILURE TO DO SO WILL RESULT IN MARKS DEDUCTIONS. OPTIONAL SECTIONS WILL BE EXPLICITLY MARKED AS OPTIONAL. IF YOU HAVE ANY QUESTIONS PLEASE CONSULT WITH YOUR LAB INTRUCTOR.> ................................................................................................................................III 1 INTRODUCTION ......................................................................................................................... 1 2 OVERALL DESCRIPTION...

Words: 2799 - Pages: 12

Free Essay

Dell Sun

...Dell PowerEdge 6450 and 8450 with Microsoft® Windows® 2000 Advanced Server 1 Enterprise Systems Group (ESG) Dell White Paper 2 By Dave Jaffe and Todd Muirhead 3 dave_jaffe@dell.com 4 todd_muirhead@dell.com 5 [pic] Contents Executive Summary 3 Introduction 4 Solution Overview 6 The Database Servers 8 The Hardware 8 The Software 9 The Application Servers 11 The Hardware 11 The Software 11 Migrating the Application 13 The Tests 15 Conclusions 17 Acknowledgements 18 Bibliography 19 Appendix A : Baseball Database Organization 20 Database Tables 20 Master 20 Teammaster 20 Batting 21 Pitching 21 Fielding 22 Sample Query 22 Figure 1: The Dell and Sun Solution Implementations 6 Table 1: Database Server Comparison: PowerEdge 6450 and 8450 vs. Sun Enterprise 4500 8 Table 2: RAID Organization for Three Configurations 9 Table 3: Oracle Database Layout 9 Table 4: Oracle9i Tuning Parameters 10 Table 5: Application Servers: Dell PowerEdge 1550 vs. Sun Enterprise 220R 11 Table 6: Oracle Pricing 12 Table 7: 4-CPU Test Results: PowerEdge 6450 vs. Sun E4500 w/ 4 CPUs 15 Table 8: 8-CPU Test Results: PowerEdge 8450 vs. Sun E4500 w/ 8 CPUs 16 Section 1 Executive Summary Following studies showing the advantages of migrating Tier 1 web servers and Tier 2 application servers from Sun Microsystems, Inc. servers to Dell PowerEdge servers...

Words: 4937 - Pages: 20

Premium Essay

Notes

...2014 Technology and Employment Skills Training Ministry of Education, Fiji. 28th November 2013 Year 11 Computer Education 1 Preface This text book has been written to cater for the new Year 11 Computer Education syllabus trialed in Fiji secondary school for the year 2014. It is a new text book and the first of its kind to be written locally. It is hoped that this book will be useful in implementing the syllabus but it should be understood that it is not the syllabus. The syllabus is the framework for the teacher to follow while this text book is a resource for the student. Therefore departure to other resource materials for more information will be acceptable. The text book is not the perfect piece of work as it has been prepared in a very short time, therefore suggestions for amendments will be welcomed. It is anticipated that this book will minimize the amount of time for teachers in lesson preparation and more time will be devoted to actual classroom teaching and learning. There may be a variety of opinion about the content of the topics, but for the beginner it is the best which gives the time and opportunity to become familiar with the basics before pursuing further into the field of study in greater detail at the upper secondary level Ministry of Education, Suva. Fiji Islands 28th November 2013. Year 11 Computer Education 2 Acknowledgement This textbook for year 11 Computer Education has been produced by the Computer Education Section of the Technology...

Words: 20027 - Pages: 81

Free Essay

System Design Specification

...Contents 1.00 SYSTEM DESIGN DOCUMENTATION (SDD 2 1.10 Introduction 3 1.20 Purpose of the SDD 3 1.30 Scope 3 1.40 Control Objective 4 CHAPTER2 6 2.00SYSTEM REQUIREMENTS 6 2.10 Functional Requirements: 6 2.20 Performance Requirements: 6 2.30 Non Functional Requirements: 6 2.40 External Interface Requirements: 7 2.50 Operating environment 7 3.00 CHAPTER 3 9 3.10 SYSTEM AND SUB SYSTEMS ARCHITECTURE 9 3.20 Communication architecture 9 3.30 Customer Architectural design 10 3.40 Admin Architectural design 11 CHAPTER 4 12 4.00 DATABASE DESIGN: 12 4.10 TABLES 12 CHAPTER 5 15 5.00 INPUT FORMATS AND OUTPUT LAYOUTS 15 5.10 Input Design 15 5.20 Menus 15 5.30 Dialog Box 15 6.00 HUMAN MACHINE INTERFACES 16 6.10 New user registration interface 16 6.20 Admin login monitoring interface 16 6.30Admin interfaces 17 6.40 Available stock 17 6.50 Admin Backup interface 18 6.60 Sales report 18 6.70 Transaction receipt 19 CHAPTER 7 20 7.00 DETAILED DESIGN 20 CHAPTER 8 21 8.00 PROCESSING LOGIC 21 CHAPTER 9 22 9.00 SYSTEM INTEGRITY CONTROLS 22 9.10 System Integrity Controls 22 CHAPTER1 1.00 SYSTEM DESIGN DOCUMENTATION (SDD) 1.10 Introduction Online store system will allow buying of goods and services from merchants who sell on the Internet. Since the emergence of the World Wide Web, merchants have sought to sell their products to people who surf the Internet. Shoppers can visit web stores from the comfort of their homes...

Words: 3587 - Pages: 15

Premium Essay

Medical

...MEDICAL SHOP MANAGEMENT SYSTEM A mini project submitted to the Bharathidasan University in partial fulfillment of the requirements for the award of the degree of MASTER OF COMPUTER APPLICATIONS Submitted by N.RAJA RAHINAM Register Number: 4CA104236 Under the guidance of Miss.A.Sathya, M.C.A., M.PHIL., Assistant Professor DEPARTMENT OF COMPUTER APPLICATIONS BISHOP HEBER COLLEGE (AUTONOMOUS) (Nationally Reaccredited at the A+ Level by NAAC) (Recognized by UGC as “College with Potential for Excellence”) TIRUCHIRAPPALLI-620 017 NOVEMBER – 2012 DECLARATION I hereby declare that the mini project work presented is originally done by me under the guidance of Miss.A.Sathya MCA., M.phil., Assistant Professor, Department of Computer Applications, Bishop Heber College (Autonomous), Tiruchirappalli-17 and has not been included in any other thesis/project submitted for any other degree. Name of the Candidate : N.RAJARATHINAM Register Number : 4CA104236 Batch : 2010-2013 Signature of the Candidate Miss.A.SATHYA MCA., M.PHIL.,, Assistant Professor Department of Computer Applications Bishop Heber College (Autonomous) Tiruchirappalli – 620017. Date: CERTIFICATE This is to certify that the mini project work entitled “MEDICAL SHOP MANAGEMENT SYSTEM” is a bonafide record work done by N.RAJARATHINAM, Register Number: 4CA104236 in partial fulfillment of the requirements for the award of the degree of MASTER OF COMPUTER APPLICATIONS...

Words: 2693 - Pages: 11

Premium Essay

Room Reservation

...Management System Project Proposal Information Technology Project 2014 Project ID: ITP-14-MTR-03 Submitted by: 1. IT13117474– Prasad Lakmal D.H. 2. IT13128050– Madushanka A.S.S. 3. IT13118082– Charitha D.G. 4. IT13118150– Wijesinghe A.M. 5. IT13087234– Piumal Dinuka W. 6. IT13060954– Ranathunga B.S. 7. IT13110062– Shyamal W.A.I. Submitted to: ………………………….. Ms. K.B.A.B.Chathurika Date of submission Abstract This is the document of the Project proposal for developing a hotel management system for Gayana hotel. It consists of the current background of the hotel and problems having due to present system and how we are going to overcome those matters through our proposed system. After gathering requirements we have found that Gayana hotel is using a manual file based system for their processes. They are keeping a huge amount of files to handle guest details, bills, inventory items...etc. Search for a record in the file system is really harsh. Although they are not well secured there is a probability of getting damaged due to a fire or a tsunami or any other kind of a disaster. The project aimed to build a fully functional system in order to achieve the efficiency in the hotel management. The overall mission of system development is to make the hotel staff can quickly and easily complete the hotel management task. . Table of Contents Abstract I Table of Contents II 1. Introduction 1 1.1 Problem Specification 2 1...

Words: 4582 - Pages: 19

Premium Essay

Forensic Evidence in It

...U.S. Department of Justice Office of Justice Programs National Institute of Justice APR. 04 Special REPORT Forensic Examination of Digital Evidence: A Guide for Law Enforcement U.S. Department of Justice Office of Justice Programs 810 Seventh Street N.W. Washington, DC 20531 John Ashcroft Attorney General Deborah J. Daniels Assistant Attorney General Sarah V. Hart Director, National Institute of Justice This and other publications and products of the U.S. Department of Justice, Office of Justice Programs, National Institute of Justice can be found on the World Wide Web at the following site: Office of Justice Programs National Institute of Justice http://www.ojp.usdoj.gov/nij APR. 04 Forensic Examination of Digital Evidence: A Guide for Law Enforcement NCJ 199408 Sarah V. Hart Director This document is not intended to create, does not create, and may not be relied upon to create any rights, substantive or procedural, enforceable at law by any party in any matter civil or criminal. Opinions or points of view expressed in this document represent a consensus of the authors and do not represent the official position or policies of the U.S. Department of Justice. The products, manufacturers, and organizations discussed in this document are presented for informational purposes only and do not constitute product approval or endorsement by the U.S. Department of Justice. This document was prepared under Interagency Agreement #1999–IJ–R–094 between...

Words: 22743 - Pages: 91

Premium Essay

Quality Management Plan

.../ Quality Control Plan for Continuous Emission Monitor Systems and Continuous Opacity Monitor Systems (CEMS/COMS) The following is a Quality Assurance / Quality Control (QA/QC) Plan for Continuous Emissions Monitoring Systems or CEMS. This QA/QC Plan meets the minimum requirements of the Indiana State Rule 326 IAC 3-5-4 Standard Operating Procedures and Chapter 20 of the Indiana Quality Assurance Manual. This example QA/QC Plan may be used as a guide for the construction of your CEMS QA/QC Plan. Please keep in mind that this example plan has the basic elements that comprise a good QA/QC Plan but, it may not cover all the areas that are specific to your plant's CEMS. Be sure to incorporate your specific operational knowledge, experience and applicable State and Federal requirements into the QA/QC Plan for your company. If you have any questions please call Jarrod Fisher at (317) 233-2723, fax at (317) 233-6865 or e-mail at jfisher@idem.in.gov. NOTE: BOLD , UNDERLINED, UPPER CASE ITALICS in this Plan's text is intended for areas in which company names, boiler numbers or other text can be inserted. Text which is bold, underlined lower case italics is intended for areas where additional text may be inserted into the Plan. Continuous Emission Monitoring Systems (CEMS) Quality Assurance/Quality Control Plan for COMPANY - PLANT UNIT - MONITOR(S) DATE ...

Words: 7803 - Pages: 32

Free Essay

Reverse Engineering

...About the Tutorial Assembly language is a low-level programming language for a computer or other programmable device specific to a particular computer architecture in contrast to most high-level programming languages, which are generally portable across multiple systems. Assembly language is converted into executable machine code by a utility program referred to as an assembler like NASM, MASM, etc. Audience This tutorial has been designed for those who want to learn the basics of assembly programming from scratch. This tutorial will give you enough understanding on assembly programming from where you can take yourself to higher levels of expertise. Prerequisites Before proceeding with this tutorial, you should have a basic understanding of Computer Programming terminologies. A basic understanding of any of the programming languages will help you in understanding the Assembly programming concepts and move fast on the learning track. Copyright & Disclaimer  Copyright 2014 by Tutorials Point (I) Pvt. Ltd. All the content and graphics published in this e-book are the property of Tutorials Point (I) Pvt. Ltd. The user of this e-book is prohibited to reuse, retain, copy, distribute or republish any contents or a part of contents of this e-book in any manner without written consent of the publisher. We strive to update the contents of our website and tutorials as timely and as precisely as possible, however, the contents may contain inaccuracies or errors. Tutorials Point (I) Pvt...

Words: 16458 - Pages: 66

Premium Essay

Hello

...document in this file is an annotated outline for specifying software requirements, adapted from the IEEE Guide to Software Requirements Specifications (Std 830-1993). Tailor this to your needs, removing explanatory comments as you go along. Where you decide to omit a section, you might keep the header, but insert a comment saying why you omit the data. CS3911 (Team Number) (Team Name) Software Requirements Specification Document Version: (n) Date: (mm/dd/yyyy) Table of Contents 1. Introduction 5 1.1 Purpose 5 1.2 Scope 5 1.3 Definitions, Acronyms, and Abbreviations 5 1.4 References 5 1.5 Overview 5 2. The Overall Description 6 2.1 Product Perspective 6 2.1.1 System Interfaces 6 2.1.2 Interfaces 6 2.1.3 Hardware Interfaces 6 2.1.4 Software Interfaces 7 2.1.5 Communications Interfaces 7 2.1.6 Memory Constraints 7 2.1.7 Operations 7 2.1.8 Site Adaptation Requirements 7 2.2 Product Functions 8 2.3 User Characteristics 8 2.4 Constraints 8 2.5 Assumptions and Dependencies 9 2.6 Apportioning of Requirements 9 3. Specific Requirements 9 3.1 External interfaces 10 3.2 Functions 10 3.3 Performance Requirements 11 3.4 Logical Database Requirements 11 3.5 Design Constraints 12 3.5.1 Standards Compliance 12 3.6 Software System Attributes 12 ...

Words: 6285 - Pages: 26

Premium Essay

Essay

...partial fulfillment of the requirements for the degree of Master of Science in Computer Science. The thesis is equivalent to 20 weeks of full time studies. Contact Information: Author(s): Imran Ashraf Address: c/o Gulfam Abbas, Älgbacken 4 LGH 081, 37234 Ronneby, Sweden E-mail: im_qamar@yahoo.com Phone: +46 700746734 Amir Shahzed Khokhar Address: c/o Gulfam Abbas, Älgbacken 4 LGH 081, 37234 Ronneby, Sweden E-mail: amir_ask@yahoo.com Phone: +46 760811926 University advisor(s): Professor Lars Lundbarg School of Computing Blekinge Institute of Technology, Sweden External advisor(s): Magnus Vigerlöf Ericsson AB Address: Ölandsgatan 1, 371 23 Karlskrona Phone: +46 10 7140404 School of Computing Blekinge Institute of Technology Box 520 SE – 372 25 Ronneby Sweden Internet Phone Fax : www.bth.se/com : +46 457 38 50 00 : + 46 457 102 45 2 Abstract Centralized databases are becoming bottleneck for organizations that are physically distributed and access data remotely. Data management is easy in centralized databases. However, it carries high communication cost and most importantly high response time. The concept of distributing the data over various locations is very attractive for such organizations. In such cases the database is fragmented into fragments and distributed to the locations where it is needed. This kind of distribution provides local control of data and the data access is also very fast in such databases....

Words: 17534 - Pages: 71

Free Essay

Distributed Database

...information is steadily rising. Distributed database systems provide an improvement on communication and data processing due to its data distribution throughout different network sites. Not only is data access faster, but a single-point of failure is less likely to occur, and it provides local control of data for users. However, there is some complexity when attempting to manage and control distributed database systems. The DDBMS synchronizes all the data periodically, and in cases where multiple users must access the same data, ensures that updates and deletes performed on the data at one location will be automatically reflected in the data stored elsewhere. A distributed database can also be defined as a collection of multiple, logically interrelated databases distributed over a computer network. A distributed database management system is then defined as the software system that permits the management of the distributed databases and makes this distribution transparent to the users. Distributed database system is to referred as a combination of the distributed databases and the distributed DBMS Current trends in multi-tier client/server networks make DDBS an appropriated solution to provide access to and control over localized databases. Oracle, as a leading Database Management System (DBMS) vendor employs the two-phase commit technique to maintain consistent state for the database. INTRODUCTION DISTRIBUTED DATABASE SYSTEM was first used in mainframe environments in the 1950s...

Words: 3658 - Pages: 15

Premium Essay

Docs

...instances and that takes into account the variability of cloud prices and tenant workloads during a medium-term period. KEYWORDS: Cloud database, confidentiality, encryption, adaptivity, cost model. LIST OF CONTENTS Page No List of Figures viii List of Tables ix 1. Introduction 1.1 Purpose 1.2 Scope 1.3 Motivation 1.3.1 Definitions 1.3.2 Abbreviations 1.3.3 Model Diagrams 1.4 Overview 2. Literature Survey 2.1 Introduction 2.2 History 2.3 Purpose 2.4 Requirements 2.5 Technology Used 2.6 Research Methodologies 3. Fundamental Concepts on (Domain) 3.1 Domain Fundamentals & Description 3.1 Existing concepts of fundamentals 3.2 Existing System Algorithms 3.3 Proposed System Fundamentals concepts 3.4 Proposed Algorithms 3.5 Performance analysis in between of existing system...

Words: 17343 - Pages: 70

Free Essay

Microsoft Exchange 2010

...intellectual property laws. This product is covered by one or more patents listed at http://www.vmware.com/download/patents.html. VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. VMware, Inc 3401 Hillview Ave Palo Alto, CA 94304 www.vmware.com © 2011 VMware, Inc. All rights reserved. Page 2 of 70 Microsoft Exchange 2010 on VMware Best Practices Guide Contents 1. Introduction ...................................................................................... 7 1.1 Purpose .......................................................................................................................... 7 1.2 Target Audience ............................................................................................................. 7 1.3 Scope ............................................................................................................................. 8 2. VMware ESX Host Best Practices for Exchange .............................. 9 2.1 CPU Configuration Guidelines ....................................................................................... 9 2.2 Memory Configuration Guidelines................................................................................ 10 2.3 Storage Virtualization ..................................................................................................

Words: 19879 - Pages: 80

Free Essay

Capstone Final Documentation

...Capstone A COMPREHENSIVE NETWORK DEVELOPMENT PROJECT SUBMITTED TO THE IT / COMPUTER NETWORKS SYSTEMS PROGRAM IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE ASSOCIATE DEGREE By Instructor – Roman Danyew Table of Contents Introduction to Cornerstone Communications………………………….................. 3 STAR MEDICAL’s Proposal Overview ……………………………….................. 4 Executive Summary………………………………………………………………... 6 Assumptions and Constraints………………………………………………………. 7 Deliverables………………………………………………………………………... 8 Project Details Implementation and Timeline……………………………………………… 9 Network Topology........................................................................................ 11 IP Schema…………………………………………………………………. 16 Security…………………………………………………………………….. 17 Active Directory Structure…………………………………………………………. 18 Active Directory and Exchange……………………………………………………..19 Website hosting and developing…………………………………………………… 20 Maintenance and Training Plan …………………………………………………….22 Risk Analysis………………………………………………………………………. 23 Backup Plan…………………………………………………………………………24 Cost Analysis………………………………………………………………………. 25 Appendix…………………………………………………………………………… 26 Appendix A: Cost Analysis…………………………………………………27 Appendix B: Hardware…………………………………………………….. 29 Introduction to Cornerstone Cornerstone Communications has been providing networking and data communications solutions...

Words: 7795 - Pages: 32