Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Exploring the Machine

In this assignment, you will explore a computer (i.e., a Windows PC or a Mac computer). Specifically, you will view the system's general information, create a folder on the desktop of the computer, and explore processes that are actively running. Because operating systems behave differently, you are encouraged to use the textbook and Internet to research the appropriate completion of each task.

Note: If you are using a PC computer which runs an instance of Microsoft Windows, complete Assignment 2A. If you are using a Mac, complete Assignment 2B. Do NOT complete both.

Submission Instructions

Submit all files and written responses at the same time as one (1) complete submission.

Screenshot File Submission: You must submit the screenshot file(s) using the provided Assignment Submission Attach File function located in the Blackboard online course shell. To access Assignment Submission Attach File function, you must select the Assignment submission link located in Week 2 of the online course shell. Note: If you need a tutorial on taking a screen shot, visit one of the following locations: PC Users MAC Users

Written Submission: You must submit written responses in the provided assignment submission text box located in the Blackboard online course shell. To access the assignment submission text box, you must select the Assignment submission link located in Week 2 of the online course shell.

Assignment: (For students using a PC)

You may find these article(s) / video(s) helpful.

"How do I take a screenshot?"
"Introduction to Windows 7 Task Manager"
"First Look At The Task Manager In Windows 8"

Complete the following:

Viewing system information (Screenshot and written response required)

View the system information (i.e., operating system, processor, memory) of the computer. (Help: From the Control Panel, select System and Security, and then select System; This navigation may vary depending on the version of Windows that you are currently using.)

List the computer's operating system, version of operating system, processor, and total memory (RAM) installed.

Take a screenshot displaying the system information as evidence of completion. Save the screenshot using an image file format (e.g., .png, .jpg, .jpeg, .gif, or .bmp). Name the screenshot file using your full name followed by the word 'System' (e.g. JohnDoeSystem.png).

Submit the file and written response according to the submission instructions.

Exploring the Task Manager (Screenshot required)

Locate and view the Windows Task Manager on the computer. (Help: Commonly, you may open the Task Manager by right-clicking the taskbar, and then clicking ‘Start Task Manager'; Or, by using the keyboard shortcut Ctrl+Shift+Delete; This navigation may vary depending on the version of Windows that you are currently using.)

Record the total number of processes that are actively running.

Record the single process that is using the most memory.

Take a screenshot displaying the total number of processes running, and the process that is using the most memory as evidence of completion. Save the screenshot using an image file format (e.g., .png, .jpg, .jpeg, .gif, or .bmp). Name the screenshot file using your full name followed by the word 'Activity' (e.g. JohnDoeActivity.png). Note: You may submit two (2) screenshots if necessary.

Submit the file(s) and written response according to the submission instructions.

Creating a new folder (Screenshot required)

Create a folder on the desktop of the computer and name the folder using your full name. (e.g. John Doe).

Take a screenshot of the desktop with your newly created folder in the screenshot.

Save the screenshot using an image file format (e.g., .png, .jpg, .jpeg, .gif, or .bmp). Name the screenshot file using your full name followed by the word ‘Folder' (e.g. JohnDoeFolder.png).

Submit the file according to the submission instructions.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91768444
  • Price:- $30

Priced at Now at $30, Verified Solution

Have any Question?


Related Questions in Computer Engineering

To speed up memory access caching is typically used a

To speed up memory access, caching is typically used. A memory cache is a small but fast memory where data recently accessed is kept in anticipation of future references. When an access is made, if the data is in the cac ...

Explain why a successful information security program is

Explain why a successful information security program is the shared responsibility of an organizations three communities of interest.

Explain why some organizations may not place enough

Explain why some organizations may not place enough importance on disaster recovery. What might happen to these organizations in the event of an actual disaster?

Question suppose that a word of data is transferred from

Question : Suppose that a word of data is transferred from the main memory to the memory buffer register (MBR). However, after decoding the MBR comes to know that it is not the real data rather it is an indirection (poin ...

In class i described the methods used to create gas and

In class, I described the methods used to create gas and gasoline from the carbon in coal. The other ingredients were water and heat energy. First we made 'coal gas' from the carbon in coal  C + H2O → H2 + CO  Then we us ...

What is the binary representation of the decimal number

What is the binary representation of the decimal number 4.875 assuming the IEE 754 single precision format?

Question the subnet mask for a class c network is

Question : The subnet mask for a class C network is 255.255.255.248. How many subnetworks are available? How many assignable hosts ids per subnet? The response must be typed, single spaced, must be in times new roman fon ...

In c languageread a double number as 2 digits after the

In C language: Read a double number as 2 digits after the decimal point. The number should have at least 6 digits BEFORE the decimal point. Extract all digits at even positions. Print them in reverse order. Extract all d ...

Decision support systems vary greatly in application and

Decision support systems vary greatly in application and complexity, but they all share specific features. A typical Decision support systems has four components: data management, model management, knowledge management a ...

Situation you are designing a system with a requirement to

Situation: You are designing a system with a requirement to provide direct access to 10,000 records. The data file grows at a rate of 5% per year. Evaluate the effect of a static hashed file with a load factor of .45. 1. ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As