Technical Note – Optimize Windows 10

Total Page:16

File Type:pdf, Size:1020Kb

Technical Note – Optimize Windows 10 Technical Note – Optimize Windows 10 Citrix.com 1 Table of Contents Removing Unnecessary Windows 10 Applications 3 Scheduled Task Considerations 4 Microsoft Customer Experience Program 4 Safety 5 Maintenance \ Optimization \ Protection 6 HDX Optimizations 13 OS and User Optimization 13 User Experience Optimizations 14 Optimized for WAN 15 Printing from non-Windows end points (Mac and Linux) 17 www.citrix.com | Technical Note | Windows 10 Optimizations 2 This technical note a collection of Windows 10 optimizations best practices used by Citrix architects in the field. It is not official recommendation from either Citrix or Microsoft, and is only intended as a starting point for administrators to evaluate in their own staging environment. If deployed correctly, these optimizations can significantly improve the scalability and user-response of Windows 10 virtual desktops delivered using Citrix XenDesktop. Disclaimer This White paper is intended for administrators deploying Windows 10 in a XenDesktop 7.x environment. Many of the examples reference non-persistent environments, but the modifications also apply to persistent desktops. The materials in this document are provided “as is” and Citrix hereby disclaims all express or implied representations. Removing Unnecessary Windows 10 Applications Windows 10 contains many applications after a fresh installation. After installation, Windows 10 Enterprise contains over 50 applications already in my start menu, many of these are the system apps that we want to keep like PowerShell and Command Prompt, but there are many others that are unneeded, and will consume unneeded resources. Look at the Windows 10 list of default apps by running the following PowerShell command: Get-ProvisionedAppXPackage -Online|Select DisplayName www.citrix.com | Technical Note | Windows 10 Optimizations 3 Before creating a master image, the following PowerShell command can be run to cleanup all unnecessary applications. Get-AppxPackage -AllUsers | Remove-AppxPackage Scheduled Task Considerations Many of the scheduled tasks listed below were designed to enhance a persistent Operating System. Many Windows 10 instances in XenDesktop are provisioned on-the-fly and discarded upon log-off, using MCS or PVS. The scheduled tasks below may be removed. Below is a sample PowerShell script that removes all task not named Outlook or GoToMeeting. #Remove all scheduled tasks except task to pin outlook to taskbar #if -notmatch -or does not work here $schedule = New-Object -com Schedule.Service $schedule.connect() $tasks = $schedule.getfolder("\").gettasks(0) foreach ($task in ($tasks | select Name)) { if ($task -notmatch "G2MUpdateTask"){ $task2 = $task if ($task2 -notmatch "outlook"){ SchTasks /Delete /TN $($task2.name) /f } } } Microsoft Customer Experience Program Tasks Description Aggregates and uploads Application Application Telemetry information if opted-in to the Experience \ Appraiser Microsoft Customer Experience www.citrix.com | Technical Note | Windows 10 Optimizations 4 Improvement Program. Application Collects program telemetry information if Experience \ opted-in to the Microsoft Customer ProgramDataUpdater Experience Improvement Program This task collects and uploads autochk SQM data if opted-in to the Microsoft Customer AutoCHK \ Proxy Experience Improvement Program. If the user has consented to participate in Customer Experience the Windows Customer Experience Improvement Program Improvement Program, this job collects and \Consolidator sends usage data to Microsoft. The Kernel CEIP (Customer Experience Improvement Program) task collects additional information about the system and Customer Experience sends this data to Microsoft. If the user has Improvement Program not consented to participate in Windows \KernelCeipTask CEIP, this task does nothing. Customer Experience This job sends data about windows based on Improvement Program user participation in the Windows Customer \Uploader Experience Improvement Program The USB CEIP (Customer Experience Improvement Program) task collects Universal Serial Bus related statistics and information about your machine and sends to the Windows Device Connectivity engineering group at Microsoft. The information received is used to help improve the reliability, stability, and overall Customer Experience functionality of USB in Windows. If the user Improvement Program has not consented to participate in Windows \UsbCeip CEIP, this task does not do anything. Safety Tasks Description www.citrix.com | Technical Note | Windows 10 Optimizations 5 Initializes Family Safety monitoring and Shell \ FamilySafetyMonitor enforcement. Synchronizes the latest settings with Shell \ FamilySafetyRefresh the Family Safety website. Can be disabled in case an alternative Windows Defender \ Windows virus and malware protection has been Defender CacheMaintenance implemented. Can be disabled in case an alternative Windows Defender \ Windows virus and malware protection has been Defender CacheMaintenance implemented. Can be disabled in case an alternative Windows Defender \ Windows virus and malware protection has been Defender Cleanup implemented. Can be disabled in case an alternative Windows Defender \ Windows virus and malware protection has been DefenderScheduled Scan implemented. Can be disabled in case an alternative Windows Defender \ Windows virus and malware protection has been DefenderVerification implemented. This task adjusts the start type for firewall-triggered services when the Windows Filtering Platform start type of the Base Filtering Engine \BfeOnServiceStartTypeChange (BFE) is disabled. Maintenance \ Optimization \ Protection Tasks Description Scans startup entries and raises Application Experience \ notification to the user if there are too StartupAppTask many startup entries. CHKDSK \ Proactive Scan NTFS Volume Health Scan The Windows Scheduled Maintenance Diagnosis \ Scheduled Task performs periodic maintenance of www.citrix.com | Technical Note | Windows 10 Optimizations 6 the computer system by fixing problems automatically or reporting them through the Action Center. The Windows Disk Diagnostic reports DiskDiagnostic \ Microsoft- general disk and system information to Windows- Microsoft for users participating in the DiskDiagnosticDataCollector Customer Experience Program. DiskDiagnostic \ Microsoft- This task warns users about faults that Windows- occur on disks that support Self- DiskDiagnosticResolver Monitoring and Reporting Technology Defrag \ ScheduledDefrag This task optimizes local storage drives Protects user files from accidental loss by copying them to a backup location FileHistory \ File History when the system is unattended Measures a system’s performance and Maintenance \ WinSAT capabilities MemoryDiagnostic \ Schedules a memory diagnostic in ProcessMemoryDiagnosticEvents response to system events. MemoryDiagnostic \ Detects and mitigates problems in RunFullMemoryDiagnostic physical memory (RAM). This task analyzes the system looking Power Efficiency Diagnostics \ for conditions that may cause high AnalyzeSystem energy use. RecoveryEnvironment \ Validates the Windows Recovery VerifyWinRE Environment. Registry \ RegIdleBackup Registry Idle Backup Task This task creates regular system SystemRestore \ SR protection points. The Windows Diagnostic Infrastructure Resolution host enables interactive resolutions for system problems detected by the Diagnostic Policy WDI \ ResolutionHost Service. It is triggered when necessary www.citrix.com | Technical Note | Windows 10 Optimizations 7 by the Diagnostic Policy Service in the appropriate user session. If the Diagnostic Policy Service is not running, the task will not run In Windows 10, these services are running, by default, and can be stopped and disabled (Caution: Disabling these services can result in applications not working appropriately and will increase troubleshooting time). Service Name Default State Default Status Notes Set default state to “Manual” as 3rd party Background software might Intelligent Automatic require the Transfer Service (Delayed Start) Running service. Device Association Manual (Trigger Service Start) Running Diagnostic Policy Services Automatic Running Diagnostic Service Host Manual Running Diagnostic System Host Manual Running Diagnostics Tracking Service Automatic Running Function Discovery Provider Host Manual Running Function Discovery Manual Running Resource www.citrix.com | Technical Note | Windows 10 Optimizations 8 Publication Home Group Manual (Trigger Not used in VDI Provider Start) Running environment Automatic Security Center (Delayed Start) Running Supports Shell Hardware AutoPlay, which Detection is not typically Service Automatic Running used in VDI. Not typically used in corporate SSDP Discovery Manual Running environments. Can enable for dedicated SuperFetch Automatic Running desktops This will impact the user Themes Automatic Running experience Windows Connect Now – Config Registrar Not required in Service Manual Running VDI Consider disabling. Will have a high Automatic impact on server Windows Search (Delayed Start) Running density. These services are not running, but they are set to Manual or Manual (Trigger Start). Although they are not running, disabling them will prevent their accidental execution in a VDI environment. (Caution: Disabling these services can result in applications not working appropriately and will increase www.citrix.com | Technical Note | Windows 10 Optimizations 9 troubleshooting time). Service Name Default State Default Status Notes Manual (Trigger
Recommended publications
  • Attachment D to Adm. Memo No. 004 INSTRUCTIONS FOR
    Attachment D to Adm. Memo No. 004 INSTRUCTIONS FOR FORMATTING A DISKETTE Formatting is the preparation of diskettes for storage of information. There are several different versions of the format command that can be used. The version that you use depends upon the type of diskette and the type of disk drive in which the diskette is being formatted. In order for us to be able to read the Tuition Grant diskettes you send, the diskettes should be properly formatted. Below is a table that identifies the more commonly used diskette types and disk drive specifications. The correct version of the format command will appear in the row for your diskette type and drive type. The format command uses the parameter “d:” to indicate the disk drive designation. For example, your 5 ¼ drive may be the “A:” drive. Instead of typing “FORMAT D:”, replace the drive designation with “A:” and type “FORMAT A:”. To verify that the disks were formatted correctly, perform the CHKDSK command on the newly formatted diskette. The format for the CHKDSK command is “CHKDSK d:”. When the command returns the disk information, compare it to the information in the fourth column of the table that corresponds to your diskette type and disk drive.. If the “total disk space” numbers are the same, the diskette is formatted correctly. DISK TYPE DRIVE TYPE FORMAT COMMAND SPACE INFO. 5 ¼” DSDD DSDD FORMAT d: 362,496 bytes total disk space 5 ¼” DSDD HD FORMAT d: /T:40 /N:9 362,496 bytes total disk space 5 ¼” HD DSDD Cannot be formatted 5 ¼” HD HD FORMAT d: 1,213,952 bytes total disk space 3 ½” DSDD DSDD FORMAT d: 730,112 bytes total disk space 3 ½” DSDD HD FORMAT d: /T:80 /N:9 730,112 bytes total disk space 3 ½” HD DSDD Cannot be formatted 3 ½” HD HD FORMAT d: 1,457,664 bytes total disk space 3 ½” DSHD FORMAT d: 1,457,664 bytes total disk space.
    [Show full text]
  • F.A.Q. Series ROM-DOS TM
    21520 30th Drive SE #110 Bothell, WA 98021 USA Tel: (425) 951-8086 Fax: (425) 951-8095 [email protected] [email protected] www.datalight.com TM ROM-DOS F.A.Q. Series Question: Assuming they don't want FAT32, Long Filename support, or Sockets, why should my customer upgrade to the newest ROM-DOS? Answer: Since our first FAT32 and LFN release 4.00.1091, there have been several improvements to the core ROM- DOS kernel. This core code is used primarily for our DOS 6.22 compatible compilations, and then extended in the case of a FAT32 or Long Filename build. The 4.00.1091 release is also a new code base and there will be no further upgrades to the previous DOS 6.22 code. In order to obtain new features, fixes, and support a customer must upgrade to release 4.00.1091 or greater. Along with the performance enhancements for both size and speed, several corrections have been made to the ROM-DOS kernel. These include stack and memory issues, disk access issues, and compatibility with the former market leader in DOS. Most of the ROM-DOS utilities have also been improved for size and speed, along with bug fixes. The major changes happened with the XCOPY, HIMEM, MSCDEX, CHKDSK, FDISK and FORMAT utilities. In the realm of international support, the Euro was added to the keyboard and display driver code. ROM- DOS and PC-DOS 2000 are the only non-GUI operating systems to support the Euro. Finally, new ROM-DOS utilities have been added.
    [Show full text]
  • The Ask Leo! ® Guide to Routine Maintenance 2 Contents the Ask Leo! Manifesto
    The Ask Leo! Guide to Routine Maintenance Simple steps to make your computer last longer and run faster. By Leo A. Notenboom An Ask Leo! ebook ISBN: 978-1-937018-10-8 (pdf) Copyright © 2013 The Ask Leo! ® Guide to Routine Maintenance 2 http://askleo.com Contents The Ask Leo! Manifesto ......................................................................................................................................... 7 Be sure to register your book! ................................................................................................................................. 8 Introduction – 12 months or 12,000 miles .............................................................................................................. 9 Back Up ................................................................................................................................................................ 10 Creating a System Repair Disk ............................................................................................................................. 11 Creating a Windows 7 System Repair disc ....................................................................................................... 11 A System Repair disc might not be all you think ............................................................................................. 12 A System Repair disc is not a System Installation disc .................................................................................... 13 A System Installation disc IS a System Repair disc
    [Show full text]
  • How to Cheat at Windows System Administration Using Command Line Scripts
    www.dbebooks.com - Free Books & magazines 405_Script_FM.qxd 9/5/06 11:37 AM Page i How to Cheat at Windows System Administration Using Command Line Scripts Pawan K. Bhardwaj 405_Script_FM.qxd 9/5/06 11:37 AM Page ii Syngress Publishing, Inc., the author(s), and any person or firm involved in the writing, editing, or produc- tion (collectively “Makers”) of this book (“the Work”) do not guarantee or warrant the results to be obtained from the Work. There is no guarantee of any kind, expressed or implied, regarding the Work or its contents.The Work is sold AS IS and WITHOUT WARRANTY.You may have other legal rights, which vary from state to state. In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other incidental or consequential damages arising out from the Work or its contents. Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you. You should always use reasonable care, including backup and other appropriate precautions, when working with computers, networks, data, and files. Syngress Media®, Syngress®,“Career Advancement Through Skill Enhancement®,”“Ask the Author UPDATE®,” and “Hack Proofing®,” are registered trademarks of Syngress Publishing, Inc.“Syngress:The Definition of a Serious Security Library”™,“Mission Critical™,” and “The Only Way to Stop a Hacker is to Think Like One™” are trademarks of Syngress Publishing, Inc. Brands and product names mentioned in this book are trademarks or service marks of their respective companies.
    [Show full text]
  • TB-1052 Digital Video Systems
    IRIS TECHNICAL BULLETIN TB-1052 Digital Video Systems Subject: Installing and Running Check Disk on XP Embedded Systems Hardware: TotalVision-TS Software: IRIS DVS XPe Ver. 11.04 and Earlier (Including FX and non-FX Units) Release Date: 12/22/08 SUMMARY IRIS DVS units initially produced prior to January 1, 2009 may not have complete support for running chkdsk.exe even though the chkdsk.exe file exist in the Windows/System32 directory. This Technical Bulletin describes how to install and run the Check Disk (ChkDsk) utility to minimize file corruption problems and potential RAW Disk failures. INSTALLING SOFTWARE Several additional files are needed to be installed on the DVS hard drive. You can get a copy of these files at the IRIS Web Service Site www.SecurityTexas.com/service. Download the “Check Disk Upgrade” package and follow the instructions in the ReadMe file of that zip file on how to upgrade the files on the DVS. Once the files are copied to the hard drive, highlight the file “EVENTVWR.MSC” and then select “File- >Pin to Start Menu” to provide an easy way to access the Event Viewer. After the required software has been installed run Windows File Explorer and select the C:\BankIRIS_NT directory. Double-click on the AUTOCHECK.REG file. Answer YES in response to the two prompts to update the registry. Expert Mode: To verify that the registry changes were done you can select “Start->Run” and type in “RegEdit.exe” to run the Registry Editor. Select the key “HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Sesion Manager”. Select the key "BootExecute".
    [Show full text]
  • External Commands
    5/22/2018 External commands External commands Previous | Content | Next External commands are known as Disk residence commands. Because they can be store with DOS directory or any disk which is used for getting these commands. Theses commands help to perform some specific task. These are stored in a secondary storage device. Some important external commands are given below- MORE MOVE FIND DOSKEY MEM FC DISKCOPY FORMAT SYS CHKDSK ATTRIB XCOPY SORT LABEL 1. MORE:-Using TYPE command we can see the content of any file. But if length of file is greater than 25 lines then remaining lines will scroll up. To overcome through this problem we uses MORE command. Using this command we can pause the display after each 25 lines. Syntax:- C:\> TYPE <File name> | MORE C:\> TYPE ROSE.TXT | MORE or C: \> DIR | MORE 2. MEM:-This command displays free and used amount of memory in the computer. Syntax:- C:\> MEM the computer will display the amount of memory. 3. SYS:- This command is used for copy system files to any disk. The disk having system files are known as Bootable Disk, which are used for booting the computer. Syntax:- C:\> SYS [Drive name] C:\> SYS A: System files transferred This command will transfer the three main system files COMMAND.COM, IO.SYS, MSDOS.SYS to the floppy disk. 4. XCOPY:- When we need to copy a directory instant of a file from one location to another the we uses xcopy command. This command is much faster than copy command. Syntax:- C:\> XCOPY < Source dirname > <Target dirname> C:\> XCOPY TC TURBOC 5.
    [Show full text]
  • Repair Your Computer in Windows Vista Or 7
    Repair your computer in Windows Vista or 7 How to use System Recovery Options for repairing Windows Vista or 7 installations Visiting www.winhelp.us adds cookies (the non-edible ones) to your device. More non-scary details are in Privacy Policy. Stay safe! When Windows is not able to start even in Safe Mode, then most probably there are some errors or missing files on your hard disk that prevent Windows Vista or 7 from starting correctly. Repair Your Computer is a set of tools for recovering from Windows such errors and it is available on Windows installation DVD. Windows 7 users can also create a System Repair Disc, or borrow one from friends - as long as the hardware architecture (32-bit/x86 or 64-bit/x64) matches. Here are some troubleshooting steps to try before using Repair Your Computer: Last Known Good Configuration often solves booting and stability problems after installing software, drivers, or messing with Registry entries. Always boot to Safe Mode at least once - this often repairs corrupted file system and essential system files. If Windows is able to boot, use System File Checker and icacls.exe to repair corrupted system files. While Windows is running, use free WhoCrashed for determining BSOD (Blue Screen Of Death) causes. Also, Reliability Monitor might reveal faulty drivers or software. System Restore can help reverting back to a state when your computer was running normally. Windows 7 user might be able to launch Repair Your Computer or Startup Repair from a hidden system partition. The two options are described later in this article.
    [Show full text]
  • Windows Powershell Best Practices Windows Powershell Best Practices
    Windows PowerShell Best Practices Windows PowerShell Best Practices Expert recommendations, pragmatically applied Automate system administration using Windows PowerShell best practices—and optimize your operational efficiency. With this About the Author practical guide, Windows PowerShell expert and instructor Ed Ed Wilson, MCSE, CISSP, is a well-known Wilson delivers field-tested tips, real-world examples, and candid scripting expert and author of “Hey Windows Scripting Guy!”—one of the most popular advice culled from administrators across a range of business and blogs on Microsoft TechNet. He’s written technical scenarios. If you’re an IT professional with Windows several books on Windows scripting PowerShell experience, this book is ideal. for Microsoft Press, including Windows PowerShell 2.0 Best Practices and Windows PowerShell Scripting Guide. Discover how to: PowerShell • Use Windows PowerShell to automate Active Directory tasks • Explore available WMI classes and methods with CIM cmdlets • Identify and track scripting opportunities to avoid duplication • Use functions to encapsulate business logic and reuse code • Design your script’s best input method and output destination • Test scripts by checking their syntax and performance • Choose the most suitable method for running remote commands • Manage software services with Desired State Configuration Wilson BEST PRACTICES microsoft.com/mspress ISBN 978-0-7356-6649-8 U.S.A. $59.99 55999 Canada $68.99 [Recommended] 9 780735 666498 Operating Systems/Windows Server Celebrating 30 years! Ed Wilson 666498_Win_PowerShell_Best_Practices.indd 1 4/11/14 10:30 AM Windows PowerShell Best Practices Ed Wilson 666498_book.indb 1 12/20/13 10:50 AM Published with the authorization of Microsoft Corporation by: O’Reilly Media, Inc.
    [Show full text]
  • Speed up Your PC: Automate Your Computer Maintenance Schedule (Provide by Microsoft)
    Speed up your PC: Automate your computer maintenance schedule (Provide by Microsoft) Most people do one of the following when their computer begins to slow down (besides get angry): Speed up their computer by buying more memory. 1. Try to tweak their computer's settings. 2. Give up. They figure that their computer is old, there's nothing else they can do, and it's probably time to buy a new computer. All these solutions can help increase PC speed. However, what's to keep your newly blazing PC from slowing down again after a couple months or years? A badly fragmented hard drive will bring even a top- of-the-line new computer to a grinding halt. One option is to create a preventive PC maintenance plan—a computer maintenance schedule that's easy to set up and put in motion so you never have to think about it again. The plan outlined in this paper uses tools that are built in to your Windows operating system, including Disk Defragmenter, so they can be run free of charge as often as you like. The following sections provide information on how to automate a maintenance schedule to help keep your PC running smoothly. These procedures differ from version to version, but overall you'll find these tasks work for Windows 7, Windows Vista, and Windows XP. Create a preventive maintenance plan for your computer When people notice their computer's performance slowing, the most common reason is the hard disk. Your computer's hard disk is a non-removable area that holds all the information available from your computer.
    [Show full text]
  • Ch 7 Using ATTRIB, SUBST, XCOPY, DOSKEY, and the Text Editor
    Using ATTRIB, SUBST, XCOPY, DOSKEY, and the Text Editor Ch 7 1 Overview The purpose and function of file attributes will be explained. Ch 7 2 Overview Utility commands and programs will be used to manipulate files and subdirectories to make tasks at the command line easier to do. Ch 7 3 Overview This chapter will focus on the following commands and programs: ATTRIB XCOPY DOSKEY EDIT Ch 7 4 File Attributes and the ATTRIB Command Root directory keeps track of information about every file on a disk. Ch 7 5 File Attributes and the ATTRIB Command Each file in the directory has attributes. Ch 7 6 File Attributes and the ATTRIB Command Attributes represented by single letter: S - System attribute H - Hidden attribute R - Read-only attribute A - Archive attribute Ch 7 7 File Attributes and the ATTRIB Command NTFS file system: Has other attributes At command line only attributes can change with ATTRIB command are S, H, R, and A Ch 7 8 File Attributes and the ATTRIB Command ATTRIB command: Used to manipulate file attributes Ch 7 9 File Attributes and the ATTRIB Command ATTRIB command syntax: ATTRIB [+R | -R] [+A | -A] [+S | -S] [+H | -H] [[drive:] [path] filename] [/S [/D]] Ch 7 10 File Attributes and the ATTRIB Command Attributes most useful to set and unset: R - Read-only H - Hidden Ch 7 11 File Attributes and the ATTRIB Command The A attribute (archive bit) signals file has not been backed up. Ch 7 12 File Attributes and the ATTRIB Command XCOPY command can read the archive bit.
    [Show full text]
  • MS-DOS Microsoft Disk Operating System
    emeronbEnßm MS-DOS Microsoft Disk Operating System 1-esckþIepþIm kñúgEpñkenH eyIgelIkykmkEtEpñkRKwHmYycMnUYn énRbB½n§tMeNIrkar edIm,IgayRsYl kñúgkar EsVgyl; MS-DOS nig eRbIR)as;bBa¢a rbs; . EtmunnwgsikSaeTAelIRbB½n§tMeNIrkar Gñk (Commad) DOS MS-DOS RtUvEsVgyl;eGay)anc,as;GMBIGVI ehAfa nig kñúg sin . File, Directory Directory Structure Windows - KWCasMnMuénÉksarEdlpÞúkenAelIépÞ rbs; ehIyvamaneQµaHtMNag nig File Media Disk TItaMgc,as;las;mYy . GacCakmµviFI Éksar b¤ File (Program), (Document) Collection of Data . .doc icon Extension Filename - KWCaTU b¤ CaftsMrab;pÞúkral; eTAtamRbePT gayRsYlcMnaM nig Directory or Folder Files EbgEck ehIyenAkñúg mYyGacmanftsMrab;pÞúkral; CaeRcInteTot ehAfa Directory Files Subdirectory or . Subfolder eTAkan; Path File POD.EXE 2-RbB½n§tMeNIrkarsMrab; IBM-PC kñúgEpñkenHeyIgnwgsikSa Cak;EsþgGMBI EdlCaRbePTkmµviFImYycMa)ac; CaTIbMput sMrab;RbePT DOS IBM-PC bc©úb,nñenH . mann½yfaenAmanRbB½n§tMeNIrkarepSg²CaeRcIneTot dUcCa sMrab;RbePT System Macintosh nigmanRbB½n§tMeNIrkar . UNIX,Windows ... RbB½n§tMeNIrkar KWCaRbB½n§kmµviFImYy eRbIsMrab;RtYtBinitüéntMeNIrkar RKb;RKgkarEbkEck (Operating System) nig eRbIR)as;épñkepSg² énma:sIundUcCa ryHeBlcaM)ac;sMrab; kareRbIR)as;én nwgk¾dUcCa CPU Memory bNþal]bkrN¾xageRkAepSg²eTot . 3- KWCaGVI DOS ? mkBIBaküfa mann½yfaCa RbB½n§tMeNIrkarrukrk nig eFVIkarelI DOS DISK OPERATING SYSTEM Disk (Harddisk or . vaCaRbB½n§RKb;RKg RKb;RKgÉksarenAelI dUcCakarcMlg lubnig karbegáIt Diskette) Disk Space Disk erobcMbegáIt b¤ .l. cUlGñkRsm½yemIlfaebIKµan RbB½n§tMeNIrkar Diectorys, Partition Track
    [Show full text]
  • SEARCH PATH – How It’S Used
    SEARCH PATH – How it’s used: Before discussing the concept of a SEARCH PATH, there are a few things you must be familiar with. (Information on the PATH command is provided at the end of this document.) Command Processor The cmd.exe file is the command processor or command interpreter. It gets loaded into RAM when you start the computer. Its job is to process or interpret the information that you provide to it. For example, if you type a command at the command line; it reads the command and decides what to do with it. If you click on an icon on the desktop; it’s the command processor that handles your request. Some commands are built-in to the cmd.exe file. (Note: In Windows98 – the command interpreter file is command.com.) Internal Commands Commands that are loaded into memory when the computer is started are internal commands. They are always stored in memory and therefore easily accessible by the operating system. Internal commands are part of the cmd.exe (xp)/command.com (98) file. When executing an internal command, the operating system finds and executes the command in memory. External Commands Commands that are not part of the command interpreter file and that are not loaded into memory when the computer is booted are referred to as External Commands. They are physical files that can be found on the hard drive. When executing an external command, the operating system must go to the hard drive, find the command, load it into memory and then execute it. SEARCH PATH When executing any command from the command line the operating system must find the command before it can be executed.
    [Show full text]