1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Firdavs [7]
4 years ago
5

Your computer is taking longer than usual to open files and you notice that your hard drive light stays on longer than usual. wh

ich of the following is a possible solution to counteract this?
Computers and Technology
2 answers:
slega [8]4 years ago
6 0

Answer and explanation:

When files in a computer are taking longer than usual to open up, it is a clear signal that you need to defragment the disk. When files are stored on the computer, they are saved in a specific part of the hard disk. As we delete files, those parts are left in blank creating empty spaces. The more we continue saving and erasing documents from our computer, the more blank spaces the hard disk will have implying that for opening archives allocated in different parts of the hard disk, it will have to spin more time until the file is found, making it perform slower. By <em>defragmenting the disk</em> we set together all the files saved in the computer, meaning the hard disk will have to spin fewer times to open the archives, which will speed up its performance.

Alla [95]4 years ago
4 0
Maybe going into task manager and disabling startup apps as well as deleting unneeded applications that have background possesses. This can help with overall performance, but for opening files? If it takes longer just to open files, and nothing else, then maybe the file is the problem.
You might be interested in
Suppose a host has a 1-MB file that is to be sent to another host. The file takes 1 second of CPU time to compress 50%, or 2 sec
kozerog [31]

Answer: bandwidth = 0.10 MB/s

Explanation:

Given

Total Time = Compression Time + Transmission Time

Transmission Time = RTT + (1 / Bandwidth) xTransferSize

Transmission Time = RTT + (0.50 MB / Bandwidth)

Transfer Size = 0.50 MB

Total Time = Compression Time + RTT + (0.50 MB /Bandwidth)

Total Time = 1 s + RTT + (0.50 MB / Bandwidth)

Compression Time = 1 sec

Situation B:

Total Time = Compression Time + Transmission Time

Transmission Time = RTT + (1 / Bandwidth) xTransferSize

Transmission Time = RTT + (0.40 MB / Bandwidth)

Transfer Size = 0.40 MB

Total Time = Compression Time + RTT + (0.40 MB /Bandwidth)

Total Time = 2 s + RTT + (0.40 MB / Bandwidth)

Compression Time = 2 sec

Setting the total times equal:

1 s + RTT + (0.50 MB / Bandwidth) = 2 s + RTT + (0.40 MB /Bandwidth)

As the equation is simplified, the RTT term drops out(which will be discussed later):

1 s + (0.50 MB / Bandwidth) = 2 s + (0.40 MB /Bandwidth)

Like terms are collected:

(0.50 MB / Bandwidth) - (0.40 MB / Bandwidth) = 2 s - 1s

0.10 MB / Bandwidth = 1 s

Algebra is applied:

0.10 MB / 1 s = Bandwidth

Simplify:

0.10 MB/s = Bandwidth

The bandwidth, at which the two total times are equivalent, is 0.10 MB/s, or 800 kbps.

(2) . Assume the RTT for the network connection is 200 ms.

For situtation 1:  

Total Time = Compression Time + RTT + (1/Bandwidth) xTransferSize

Total Time = 1 sec + 0.200 sec + (1 / 0.10 MB/s) x 0.50 MB

Total Time = 1.2 sec + 5 sec

Total Time = 6.2 sec

For situation 2:

Total Time = Compression Time + RTT + (1/Bandwidth) xTransferSize

Total Time = 2 sec + 0.200 sec + (1 / 0.10 MB/s) x 0.40 MB

Total Time = 2.2 sec + 4 sec

Total Time = 6.2 sec

Thus, latency is not a factor.

5 0
3 years ago
I Need an experienced or inspired game developer to answer these questions
Ivahew [28]

Answer:

WHAT ARE u trying to work for dm me on discord RealFazeRug#4361 and ill help ya m8 because im good with tech lol

Explanation:

5 0
4 years ago
Propane also known as LP gas, is often mixed with about _______ percent of other gases, such as butane, propylene, and mercaptan
vitfil [10]

Answer:

30

Explanation:

Java - Using a method, how do I "write a program whose input is a character and a string, and whose output indicates the number of times the character appears in the string. Your program must define and call the following method that returns the number of times the input character appears in the input string.

public static int countCharacters(char userChar, String userString)"

4 0
4 years ago
Write a Java code statement for each of following:
Naddik [55]

Answer:

double decimal1, decimal2;

int whole;

Explanation:

Required

Declare 2 decimals and 1 int.

The syntax to declare a variable is:

<em>data-type variable-name;</em>

To declare decimal, we simply make use of double or float data types.

So, we have:

double decimal1, decimal2; ----> for the decimal variables

And

int whole; ---- for the whole number

6 0
3 years ago
Jennifer has to set up a network in a factory with an environment that has a lot of electrical interference. Which cable would s
jeka57 [31]

The answer is STP (Shielded Twisted Pair) cables .

Compared to Unshielded Twisted Pair, STP offers additional safeguards against Electromagnetic interference (EMI) and crosstalk. While UTP reduces some EMI, STP cables effectively block interference and ensure high-speed performance. STP cables have a metallic foil that cancels out electromagnetic interference. They are the preferred cables that protect against high-level EMI from, power lines, radar systems, or electromagnetic fields .



6 0
3 years ago
Other questions:
  • ASAP PLZ!!!!!! Type the correct answer in the box. Spell all words correctly What are the steps of moving data into a data wareh
    9·1 answer
  • A computer ____ is the amount of data (measured in bits or bytes) that a cpu can manipulate at one time
    8·1 answer
  • This type of software can be described as end user software and is used to accomplish a variety of tasks. communications system
    15·1 answer
  • Which of the following would help a photographer keep from dropping a camera? - - Rain hood
    6·2 answers
  • Read the Security Guide about From Anthem to Anathema on pages 238-239 of the textbook. Then answer the following questions in t
    14·1 answer
  • A small network used for communication between personal computing devices is known as?
    8·1 answer
  • To keep files organized, related documents are often stored in ____ (also called directories) located on the storage medium.
    11·1 answer
  • when connecting to a wireless local area network (wlan), what is the most important fact about the service set identifier (ssid)
    11·1 answer
  • What is the current situation of drone technology in emergency rescue and recovery
    14·1 answer
  • A ____ attack is much more substantial than a dos attack because of the use of multiple systems to simultaneously attack a singl
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!