Preview

NT1110 Unit 8 Assignment 1

Satisfactory Essays
Open Document
Open Document
356 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NT1110 Unit 8 Assignment 1
Narissa Morales NT1110 Mon. 6pm Tamecka McKay
Unit 8 Analysis 1: System Performance
When addressing system performance, a key element that is often overlooked is Disk Fragmentation. Even on a brand new system with plenty of RAM and processing speed, the performance of the hard disk may be a bottleneck causing issues. It takes time to load large data files into memory - issues become particularly noticeable when dealing with movies, video clips, database files or image files which may easily be several gigabytes in size. On a freshly formatted disk, these files load fairly quickly. Over time, however you may start to notice performance issues - caused by disk fragmentation.
The different processes running in the back ground, (i.e. Windows Explorer, Power Manager) all take an allotted amount of RAM to perform at optimum levels. Freer RAM means that the essential processes that are running have more priority of the space and the CPU. When you begin to run your RAM to its limits, the essential processes and even the non-essential processes begin to lag due to the overtaxing of the CPU and RAM.
Your OS will use the hard drive as a “back-up” or virtual memory if your PC runs out of RAM while you are working away. Using your hard drive as memory causes a serious performance hit, as hard drives are way, way slower than RAM. So, the trick is having enough memory, adding more does not help if you are doing nothing that needs more memory. Today, with a modern PC and a modern OS, you need about 4GB to achieve this for most standard users. If you do graphic work or work with a lot of applications at once, then more memory than even 4GB may be better. The trick is you want enough main memory (RAM) so the OS doesn't start using the hard drive as memory. Also, to address more than 4GB of RAM, you must have a 64 bit OS installed. If you are only using a 32 bit OS, it will only be able to use about 3.5GB of memory. So installing more is pointless, it

You May Also Find These Documents Helpful

  • Powerful Essays

    It is important to test the cables before you install them and after they are installed. Although there are many tools that are used for testing the cables in a network this paper is only going to talk about three. The first one is the multifunction cable scanner, they are available for testing both copper and fiber optic cable. One such model is the Hobbes 258898 it can test every pin of almost 20 often used cables from coax to 40 pin ribbon cables. It identifies opens, shorts and mis-wires at the pin level. With a multifunction cable tester you can perform a range of tests that you would normally need a few different testers to do. You can do wire-mapping, test for the length of the cable, test the attenuation, and you can test NEXT (near end crosstalk) for copper cables. They will also test for optical power and signal loss in fiber optic cables. A lot of the multifunction cable testers perform other more comprehensive test such as PS-NEXT, ACRF, PS-ACRF, delay…

    • 659 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    The problematic scenario is when the physical sequence has a loop. In this scenario, a switch which is attached to the middlebox literally cannot identify the middlebox segment based on the combination of the input interface and packet header fields. To address this scenario, SIMPLE introduce a ProcState tag that encodes the packet’s processing state inside the packet header fields using either VLAN tags, unused fields in the IP headers i.e., IP ToS fields or MPLS labels depending on the fields supported in the SDN-enabled switches. Therefore, SDN controller installs tag addition forwarding rules at the first switch of each middlebox segment, which is based on packet header fields and input ports of the switch. In addition, downstream switches consider these tags for the matching purpose and perform respective forwarding action. This process continues until the middlebox segment is finished.…

    • 241 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    A good example of refraction of light and reflection of light is a rainbow. Sunlight enters the rain droplet at a specific angle and the rain droplet separates the white light into many different colors. This angle is a fixed measurement between your eye and the sun. What color is refracted depends upon the critical angle, which is the angle the sunlight strikes the back of the rain droplet. Red light bends the least while violet light bends the most all the other colors bend at an angle that is between the two. Each rain droplet reflects all colors at a given point and time, but only one color comes back to your eye, requiring millions of rain droplets to create a rainbow. As the rain droplets fall…

    • 395 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. Home use for a family of four people who have broadband Internet access (e.g., DSL or cable)…

    • 256 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 1244 Words
    • 5 Pages

    Analysis and explanation of the threat and vulnerability pairs and their likelihood of occurrence. The chart explains the aspects of the vulnerabilities and threats. b\Because we have no data on these threats on the amount of occurrences we cannot assign an impact rating or a probability rating in which is high medium an low (reference page 121 of book)…

    • 1244 Words
    • 5 Pages
    Good Essays
  • Good Essays

    5. This chapter describes the concepts behind how a CPU reads the contents from RAM. Which of…

    • 856 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 2469 Words
    • 10 Pages

    “Tell me and I forget. Show me and I remember. Involve me and I understand.” Chinese proverb One’s understanding of network protocols can often be greatly deepened by “seeing protocols in action” and by “playing around with protocols” – observing the sequence of messages exchanged between two protocol entities, delving down into the details of protocol operation, and causing protocols to perform certain actions and then observing these actions and their consequences. This can be done in simulated scenarios or in a “real” network environment such as the Internet. The Java applets that…

    • 2469 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    Powerful central processing units (CPUs) demand large amounts of data, and they need that data fast. Otherwise, CPU performance is hindered by the lack of data storage support; therefore, computers have been designed to supply data through tiering memory and caches, which use the hard drive in combination with random access memory (RAM) to deliver massive amounts of data to the CPU. The speed of the RAM is crucial to the performance of data delivery; you want the most RAM at the fastest speed possible so the CPU is not waiting for information.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 3 Assignment 1

    • 2136 Words
    • 9 Pages

    Sorting, Filtering, and Paging with the Entity Framework in an ASP.NET MVC Application ................... 55…

    • 2136 Words
    • 9 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Application: Generally, a function on any kind of computer or electronic device that is useful to the user, which can give the user a reason to want to own and use the device. More specifically, software that performs some useful function for a user.…

    • 539 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. Your OS will use the hard drive as a "swap file" or virtual memory, if your PC runs out of RAM while you are working away. Using your hard drive as memory causes a serious performance hit, as hard drives are slower than RAM. You must have enough memory, adding more does not help if you are not doing anything that needs more memory. Today, a modern PC and a modern OS need about 4 gigs to achieve this for most standard users. You want enough RAM so the OS doesn't start using the hard drive as memory.…

    • 268 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 8 System Performance

    • 251 Words
    • 2 Pages

    3. Your OS will use the hard drive as a "swap file" or virtual memory if your PC runs out of RAM while you are working away. Using your hard drive as memory causes a serious performance hit, as hard drives are way, way slower than RAM. So, the trick is adding enough memory because adding more memory when you are not going to used it is pointless, also we have to remember that in order to add more than 4 GB we need a system running at 64 bit because a 32 bit will only use up to 4 GB of memory.…

    • 251 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Memory management is an important characteristic of an operating system. Main memory is divided into two parts one for resident programs, and the other for the program currently in use. The user part must be subdivided to accommodate multiple processes (Stallings, 2012). When a few processes are in the memory then much of the time all of the processes will have to wait for input /output and the processor will be idle. According to Stallings (2012),. The requirements that memory management is supposed to satisfy are Relocation, Protection, Sharing, Logical organization, and Physical…

    • 573 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Cache Memory-Cache Memory this is the memory in which your computer has. The bigger the memory the faster the computer will run. The cache memory is used to reduce the average time to access memory. The more memory you have the less your computer has…

    • 1306 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 1072 Words
    • 5 Pages

    “Social networking is the grouping of individuals into specific groups, like small rural communities or a neighborhood subdivision.” Although social networking is possible in person, especially in the schools, communities, and work places, it is most popularly done online. This expands the number of one 's business or social contacts by making connections through individuals. This is because on the internet people are more likely to openly connect with others to gather experience with different topics of interest. Some web-based groups are solely establish for promotion on the internet because of its use being so common. Even though social networking has become very popular over the years most users don’t know what they’re getting into when they sign in and answer basic profile questions. But it’s easier to understand if you see that starting up in social networking is almost like moving to a new school, you start out with no friends but as you start joining groups and meeting new people you begin associating with people that share similar interests and soon enough your friends list…

    • 1072 Words
    • 5 Pages
    Good Essays