Operating system upgrade to Windows 10 will be in C disk to generate a Windows.old folder, generally occupy a larger C disk space, resulting in a C disk space is insufficient.
Reason analysis:
This folder is the data for the operating system
First install the Lenovo settings program in the App Store and update the website's "Lenovo Battery gauge for Windows 64-bit-notebooks" drive, and then restart your computer to open the Lenovo Settings, the option to find the battery charging
The computer keyboard is broken, the typing party. Repairs are usually slaughtered. Buy a keyboard on your own online to pack the wholesale price. is so willful.
1, Ready tools, disconnect the power, remove the battery.
2. Use a
1, the replacement of solid state hard drive (SSD)
First turn off the computer, then remove the mobile battery (note: There are two batteries, the inside and together), unscrew the screws, open the back cover can be opened after the image:
Only
ThinkPad logo is displayed, press F2 to enter the BIOS Utility.
ThinkPad 365X/XD Series
ThinkPad 380 Series
THINKPAD 560 Series
ThinkPad 600 Series
ThinkPad 755 Series
ThinkPad 7
an easy setup screen appears. The ThinkPad 240 series ThinkPad 390 series ThinkPad 570 series ThinkPad I series 1400ThinkPad I series 1200ThinkPad a20m,a20p,a21m,a21p,a22m,a22p, A30,a31thinkpad T20,t21,t22,t23,t30thinkpad X20,x21,x22,x23,x24,x30,x31thinkpad R30,R31,R32 (whe
series: s85x,s80x,s78x,s77x,s74x,s72x,s71x (H61-ivybridge platform), s59x,s56x,s51x,s52x,s31x,s32x.
Yang Tian a series (Q87,q77,q75,b75,h81,h61-ivybridge,a75 platform)
Yang Tian M series (H81,h61-ivybridge,a75,a68 platform)
Yang Tian T Series (H81,h61-ivybridge,a75 platform)
Yang Tian R series (H61-ivybridge,a75 platform)
Yang Tian W series (H81,h61-ivybridge platform)
ThinkCentre series desktop, integrated machine
ThinkCentre m8400t (Q77 platform), ThinkCentre m8400s (Q77 platform)
Thi
transformation, which let me pay attention to, want to re-review (learning) this knowledge point. Also searched a lot of blog posts, but did not specify the downward transformation, just gave an example of how to use, instead of upward transformation spoke a bunch (maybe I did not find).This blog is about the downward transformation, then we will learn the downward transformation, to understand the significance of this feature and the use of the sceneCreate an electronic product interface as fo
traditional BIOS password protection.
IBM Notebook Password Detailed
Applicable models:
All ThinkPad 380; all ThinkPad 380D; all ThinkPad 380ED; all ThinkPad 380XD; all ThinkPad 380Z; all ThinkPad 560; all
Mul: Unsigned Multiplication
; Influence of, CF flag bit; Command Format:; Mul R/m; parameter is the multiplier; if the parameter is R8/M8, the Al will be used as the multiplier and the result will be placed in ax; if the parameter is R16/M16, ax will be used as the multiplier and the result will be placed in eax; if the parameter is R32/M32, eax will be used as the multiplier and the result will be placed in edX: eax
; Test27_1.asm.38
on the list. Slatebook 14 runs the Android system, and such Android notebooks are not common in the market. Although the Android operating system built for mobile platforms has some productivity gaps compared to desktop operating systems such as Windows and OS X, the test Slatebook 14 of the time to 6 hours and 52 minutes, easily surpassing many windows laptops.
And it is worth mentioning that the proposed retail price of Slatebook 14 is only 430 U.S. dollars (about 2628 yuan), and the current
.
Open or restart the computer;
When you see the Dell icon, press the "F2" button to enter the system setup (BIOS) immediately;
Each brand notebook computer enters the BIOS method
IBM (Cold Boot Press F1, part of the new number can be restarted when the press F1)
1.ThinkPad 315ED
After the boot, when you see the screen on the ThinkPad logo, quickly press the F2 key to enter the BIOS.
2.
Motivation : In an object-oriented system, some objects are subject to some reasons (for example, the overhead of object creation is large, some operations require security control, or external access is required ), direct access may cause a lot of trouble to the user or system structure. How can we manage/control the unique complexity of these objects without losing transparent operation objects? Adding an indirect layer is a common solution in software development.
Application: Remote Obje
teach you step-by-step to build a Docker-based MongoDB replication cluster environment
1. Installing Docker
2. Create a MongoDB image
3. Building a MongoDB cluster
This article ——-chain--Connecthttp://blog.csdn.net/pddddd/article/details/46893593
Docker is an open-source application container engine that allows developers to package their applications and dependencies into a portable container.
1.ubuntu14.04 Installing Docker
Reference Document http://docs.docker.com/installation/ubuntulin
BT, BTS, BTR, BTC: BIT Test command
; Bt (BIT Test): Bit test; BTS (BIT Test and set): Bit test and reset; BTR (BIT Test and reset): Bit test and reset; BTC (BIT Test and complement): Bit test and inverse test; their results affect CF; their command formats are the same: Bt R16/R32/M16/M32, r16/R32/M16/m32bt R16/R32/M16/M32, i8
; Test23_1.asm.386.
: ThinkPad, Password: Lenovo
Useradd thinkpad-p lenovo-s/bin/bash
Su ThinkPad
Enter Password: Lenovo
The first Su ThinkPad succeeds because the current account is root and Su ThinkPad does not require password verification
The second Su
Motivation : ThinkPad has multiple models, such as T43 and t60. Each model supports multiple working modes. Each model has different implementations in different modes. With the continuous development, there are more and more models and working models. How to separate ThinkPad from the changes in model and working mode so that they change independently, without introducing additional complexity (the complex
Typical linux commands: 1. sagane @ sagane-ThinkPad-Edge :~ $ Mii-tool: when the network is disconnected, use this command to check whether the physical link is normal. 2. ssagane @ sagane-ThinkPad-Edge :~ $ Sshroot@192.168.1.43, with the root user login IP address as 19 .. linux commonly used commands Classic use 1, sagane @ sagane-ThinkPad-Edge :~ $ Mii-tool: w
About IBM random start options (which retain those deleted)
About IBM random start options (which retain those deleted)The following figure shows the startup options after the random software is installed (it is clear to see the solution by the optimization master)
1 digital line Detect-is part of BVR telephone software kits. It provides fax, phone book, email, and other functions (which can be deleted)2 Bluetooth control disk-you can delete it if you do not need Bluetooth3 tpkmaphelper-IBM
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.