1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Angelina_Jolie [31]
3 years ago
3

You discover a hard drive is not being optimized on an automatic schedule. Before you run the optimize drive tool, why should yo

u first run disk cleanup? How does defragmentation improve performance? When you ran the CHKDSK command in this lab, it had to run during the startup process. Why was this necessary? What form of the Chkdsk command can you us in a command prompt window? Based on what you learned in this lab along with your other experiences with disk cleanup, which type of files removed by disk cleanup took up the most space? What is one type of app that should absolutely begin at startup in order to protect your computer from attack?
Computers and Technology
1 answer:
sammy [17]3 years ago
3 0

Answer

Before running the drive optimize tool, it is necessary to run Disk Cleanup to remove unnecessary files to clean up the disk space.

de-fragmentation improve the performance in terms of speed of the application, software and file running, and also improve the utilization of space in hard disk.

CHKDSK is the command that is used to check the status of hard disk and file system. By running this command we can check the file system and disk status. This command have different parameters to check the status, we can use it as  "chkdsk 'parameters' "   in command prompt.

In disk cleanup hard disk has been scanned for temporary files and deleted files from different drives. In disk cleanup process the these files has been detected and deleted from the system.

Anti-Virus software is start at the absolute beginning of at the startup of the computer to protect the computer from different attacks.

Explanation:

In disk clean up of the disk unnecessary files has been detected and deleted from the system to clear the memory and save more space for needful and purposeful data.

In de-fragmentation, the fragmented files in the hard disks that are stored at different addresses of the hard drive has been arranged, so that the space and addresses between different files has been combined together and the data and files stored in order. This will help to improve the performance of the system in terms of speed.

CHKDSK is the command that is used to check the status of file system and hard drive. This command will run in command prompt along with different parameters that are needed to be checked.

Anti virus software is used to protect the system from the attack of different malware and virus software. It will start at the beginning of the startup of the system for the purpose of protection.

You might be interested in
Write down the pseudo code for a brute-force algorithm to compare elements in array A with elements in array B.
Thepotemich [5.8K]

Answer:

def brute_force(array1, array2):

   for item in array1:

       for element in array 2:

           if element == item:

               print(f"{element} and {item} are a match")

Explanation:

A brute-force algorithm is a direct-to-solution algorithm that searches and compares variables. It is like trying to unlock a safe but not knowing its four-digit combination, brute-force starts from 0000 through 9999 to get a match.

The python program implements the algorithm using two nested for loops. The first loop iterates over array1 while the second, over array2. For every item in the first array, the program loops through the length of the second array. For every match, the items are printed on the screen.

5 0
3 years ago
Database queries is an example of
storchak [24]

Answer:

A query in a database is a request for information stored within a database management system (DBMS), which is the software program that maintains data.

SQL(Structured Query Language ( is a standard language for storing, manipulating, and retrieving data in database.

Five types of SQL queries are:

1) Data Definition Language (DDL).

used to define and modify the structure of a database.

2) Data Manipulation Language (DML).

used to manipulate (change) the data in the database.

3) Data Control Language(DCL).

used for access control and permission management for users in the database.

4) Transaction Control Language(TCL).

used for maintaining consistency of the database and for the management of transactions made by the DML commands.

5) Data Query Language (DQL).

used for performing queries on the data within schema objects.

8 0
3 years ago
Which options are available in the Conditional Formatting dialog box? Check all that apply.
IrinaVladis [17]

Answer:

There are several options within this dialog box for applying Conditional Formatting ☼ Click the desired option under the Select a Rule Type list. ☼ The bottom portion of the dialog box will change depending on the Rule Type that was selected. ✞ Click Format Only Cells That Contain under Select a Rule Type

6 0
3 years ago
Read 2 more answers
A professional development plan allows an employee to
drek231 [11]
Answer: (B) evaluate current skill level and determine what skills are necessary to advance

Explanation: A professional development plan is used to assess your current skills and see what’s needed to further advance within the field.
7 0
3 years ago
Some of the users in your company create and delete so many files that they have problems with fragmented disks. Which of the fo
zavuch27 [327]

Answer:

D) extents

Explanation:

Disks fragmentations in computer science refers to the cases of a file system laying out its contents  in a non-continuous manner thus preventing an in-place alteration of the contents (that is the contents of the file are scattered in fragments across different location on the disk). Disk fragmentation is mostly associated with aging. To mitigate against this, modern implementation of file systems try to preallocate longer chunks of disk space, this is called extents, in this way fragmentation is avoided since a contiguous size of disk space is preallocated to the files and its contents stay together.

4 0
3 years ago
Other questions:
  • Can a computer evaluate an expression to something between true and false? Can you write an expression to deal with a "maybe" an
    13·2 answers
  • What does ascii stand for?
    14·2 answers
  • Who invented autonomous cars? When I look it up it comes up as William Bertelsen but he invented the idea of hovering cars. Help
    8·1 answer
  • Your essay is due tomorrow and you don't have time to write it. You decide to buy an essay online. You've paid for it, so it can
    8·1 answer
  • Round 74,361 to the nearest 10​
    6·1 answer
  • When is it appropriate to delete an entire row or column as opposed to deleting the data in the row or column
    14·1 answer
  • The Linux operating system is widely used in industry, especially for servers. Why do you believe this is the case?
    10·1 answer
  • OoooA,SDHVAcgacxgjcaNASAW dysdyxsgcdsgjsdgc
    8·2 answers
  • A processor's speed is measured in megahertz (MHz), or millions of instructions per second; and gigahertz (GHz), or billions of
    9·2 answers
  • Which directory stores the cron configuration file?.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!