Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Give an overview of WINDOWS 2000 file management.
Windows makes use of the NTFS and File Allocation Table file systems. The Older versions of the FAT file system had file name length limits plus had restrictions on the maximum size of FAT-formatted partitions or disks.
NTFS initiated with the Windows NT operating system that allowed ACL-based permission control. Multiple file streams, Hard links, attribute indexing, quota tracking, compression and mount-points for other file systems (called "junctions") are as well supported, though not all well-documented.
Unlike several other operating systems, Windows utilizes a drive letter abstraction at the user level to distinguish one disk or partition from another. For instance the path C:\WINDOWS\ stand for a directory WINDOWS on the partition represented by the letter C. The C drive is the major commonly used for the primary hard disk partition on which Windows is installed as well as from which it boots. This "tradition" has turn into so firmly ingrained that bugs came about in older versions of Windows which made assumptions that the drive that the operating system was installed on was C. The tradition of using "C" for the drive letter is able to be traced to MS-DOS where the letters A and B were reserved for up to two floppy disk drives in a common configuration A would be the 3½-inch floppy drive, and B the 5¼-inch one. Network drives may as well be mapped to drive letters.
Ever since Windows interacts with the user via a graphical user interface its documentation refers to directories as a folder which contains files and is represented graphically with a folder icon.
What are the various page replacement algorithms used for page replacement? FIFO page replacement Optimal page replacement LRU page replacement LRU approximat
When you run a program on your UNIX system, the system prepares a special environment for that program. This environment owns everything needed for the system to execute the progra
Question: a) There are main goals of data security. List them and elaborate on how they provide protection. b) Describe threats associated with data security. c) Describe
Explain the Sleep (ms) Function This call places the current thread in a suspended state for the number of milliseconds passed as the parameter (ms). After that Windows NT wil
Deadlock Avoidance It's a method to evade deadlock by careful resource scheduling. This approach to the deadlock problem foresees deadlock before it actually occurs. This a
What is operating system?
what is deckers algorithm
importance of Operating system in modern computers. Also explain various functions & types of operating systems
What is the use of multiprogramming on individual processors ? In the usual multiprocessor, which is dealing with independent or coarse-grained synchronization granularity, it i
what is micro kernel
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd