Using network drive mappings, Computer Engineering

Assignment Help:

If various load generators need to access the similar physical files, rather than having to remember to copy the files every time they change, each load generator can reference a common folder using a mapped drive. But since drive mappings are associated with a particular user:

 

1. Logon the load generator as the user the load generator will use

2. Open Windows Explorer and under Tools select Map a Network Drive and make a drive. It saves time and hassle to have consistent drive letters across load generators, so some companies reserver certain drive letters for specific locations.

3. Open the LoadRunner service within Services (accessed from Control Panel, Administrative Tasks),

4. Click the "Login" tab.

5. State the username and password the load generator service will use. (A dot appears in front of the username if the userid is for the local domain).

6. Stop and start the service again.           

 

 


Related Discussions:- Using network drive mappings

Distinguish between an agent system and an expert system, Problem : (a)...

Problem : (a) The concept of an agent is generally defined by listing the properties that agents exhibit. Identify and describe the properties that you would associate with th

How many lines of address bus used for memory of 2048 bytes, How many lines...

How many lines of address bus must be used to access 2048 bytes of memory when available RAM chips 128 × 8.  How many lines of these will be common to each chip? Ans. AS chips

Java program , Q.--> The program simulates a student management system havi...

Q.--> The program simulates a student management system having thE following:The interface uses command buttons to (i) add,edit,delete,update and cancel the records, (ii) to naviga

Briefly explain about ask, Question 1 What is modulation? Explain why i...

Question 1 What is modulation? Explain why is modulation required? 2 Briefly explain about ASK, FSK and PSK 3 Explain about the Nyquist Bandwidth and Nyquist Theorem 4

Program for interchanging the values of two memory locations, Q. Program fo...

Q. Program for interchanging the values of two Memory locations? Program for interchanging the values of two Memory locations  ; input: Two memory variables of same size:

Forward chaining - artificial intelligence, Forward Chaining - Artificial i...

Forward Chaining - Artificial intelligence: Imagine we have a set of axioms which we know are true statements regarding the world. If we set these to each be a starting state o

Random search - artificial intelligence, Random Search - artificial intelli...

Random Search - artificial intelligence: Some problems to be solved by a search agent are more creative in nature, for example, like in writing poetry. In this case, it is oft

Library markup language, 1. Design a DTD for a new XML application called L...

1. Design a DTD for a new XML application called Library Markup Language (LibML) appropriate to capture the list of your items of collection . Put the DTD into a file named librar

In 8085 which is called as high order / low order register, Flag is known a...

Flag is known as Low order register & Accumulator is known as High order Register.

Define various types of shift registers, What are various types of Shi...

What are various types of Shift Registers ? Ans: Kinds of Shift Registers: (i) SISO that is Serial-In Serial-Out Shift Register (ii) SIPO that is Serial-In P

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd