Disk defragmentation is a very useful feature, especially for long-used systems, as well as some computers that frequently delete files, and it is necessary for the system to defragment the disk at regular intervals. This allows you to sort out some of the file fragments and delete them.
1
The only way to open disk defragmentation is to:
Start → All programs → accessories → system tools or right-click C-Drive, select Properties, you can see the Dis
to do the task of planning inside. And it's free! Supports NTFS and FAT32, supports Windows xp/vista/win7 systems, and new versions support 64-bit systems. Defraggler's command-line version is too simple to use for system resources, without adding system services.I used to think I had to defragment it. The disk's free space should be much more, but I once found that there was a lot less space available after defragmenting the pieces. Later found that the software before the disk defragmentation
A disk tool designed for NT/2000/XP/Vista,
Supports almost all file systems, including fat16, FAT32,
NTFS, ntfs5, FS (encrypted file system) and so on, is a rare good tool. Yes
The hard disk is automatically reorganized at the specified time, and long Chinese file names are supported.
O O defrag Professional Edition supports the following operating systems:
+ Windows NT 4.0 Workstation (SP6 or above)
+ Windows 2000 Professional
+ Windows XP Ho
It is well known that the system will cause disk fragmentation after running for a while, which can seriously affect the speed of the system, so Windows system itself provides the defrag command to help users clean up disk fragmentation, Windows 7 is no exception, and Vista is different from windows The defrag in 7 adds more options, with command line versions containing more directives.
Smart defrag A total of two software skins for users to switch to support the use of Simplified Chinese. The software configuration option is automatically ejected after the software is installed, and the user can choose to switch freely.
Smart Defrag Configuration Interface optional skin and prophecy
Smart Defrag main interface design simple and ea
Defrag: Defragmentation of disk
[applicable] disk reads and writes many times, or the disk uses the time to be very long, may need to use this commandDefragment the disk. Disk fragmentation does not mean that the disk is broken, but only because of multiple copies and deletionsIn addition to files, disk usage can be very incoherent, causing slower speed. This article is published in http://bianceng.cn (computer science)
Usage
1. C:\>
Program and resource management: PS, top, free, SAR, kill, uname①ps Syntax:[Root @test/root]# ps-auxParameter description:A: Select all the programs listedU: All users ' programs are listedx: All TTY programs are listedDescription: This is used to query the current host environment, in the background to execute the relevant program! I usually use the "Ps-aux" par
Sometimes you install programs on your computer, but you don't want these programs to appear in the Add or Remove Programs list in Control Panel, so how do you do that? Today, small knitting to introduce the solution.
Do not allow programs to display methods in Add or Remove Progr
This article supporting the source code download
First, the preface
At present, many units in the system transformation and upgrading, faced with the development of various independent departments of the application of the database unified to adapt to the needs of large concentration of data, to facilitate future data mining and other high-level applications. In the process of database unification, how to transform the existing program based on heterogeneous database quickly and efficiently, e
Installed a UBUNTU16 64-bit system to compile 64-bit and 32-bit programs with GCC in this environmentThe default 64-bit environment is already installed in GCC1. First confirm that the installed environment is not 64-bit[Email protected]:~/desktop$ dpkg--print-architecture The following output is represented as 64-bit AMD642. Verify that the system supports multi-architecture environments[Email protected]:~/desktop$ dpkg--print-foreign-architectures T
interface.The interface that pops up after the argument is the first one in the first column of the toolbar that needs to be entered (this is my guess, I'm not sure, but it does pop).Here is a screenshot:The buttons in the GUI: After clicking the switch configuration comparison: Well, then you can start the external program. ^-^ added: When the main program exits, the external program that is started will not exit with the main program exiting, we certainly do not want this situation.Continue
Developer Rahul Singh recently listed outstanding programs and bad programs in his personal blog:ReferenceGood programs make complex things look simple; bad programs make simple things complicated.Excellent programs do not need to be explained; bad
The working principle of Web programs. Working principles of Web programs: 1. web program working principle (1) Web definition Network: computer Network, Web: computer the working principle of the World Wide Web program
1. how Web programs work
(1) meaning of the word Web
Network: computer Network, Network
Web: [computer] World Wide Web, Internet)
Web
Important: This article contains information about how to modify the registry. Before modifying the registry, you must back up the registry and know how to restore the Registry in case of a problem. For more information about how to back up, restore, and modify the registry, click the following article number to view the article in the Microsoft Knowledge Base:
256986 (http://support.microsoft.com/kb/256986/) Microsoft Windows registry description
Symptoms when you install and uninstall a progra
In the previous chapter, we mainly learned how an independent program works on the system, but when we actually write the program, we find that the program sometimes interacts with the IO device or other programs. This chapter focuses on the knowledge of how the program interacts with IO devices.The interaction between the program and the IO device is often seen, such as with disks, keyboards, and networks. The UNIX system is designed with all the fil
Java beginners: a few simple small programs and new beginners, java small programs
Sort out several small programs written in the past few days, all of which are loop exercises.// Set N to a four-digit number, which is 9 times the reverse order number.// (For example, the inverse Number of 1234 is 4321), evaluate the N valuePackage Azhi;Public class Job_5 {Public
This headline really made me feel the egg hurts. I don't know what to call Microsoft's name-changing maniac.This is the process by which your desktop program interacts with the Windows Store app.For some reason, Microsoft's Store app's security sandbox has led to a lot of things that can't be done, so an extra one has been made. NET Desktop Engine to assist, you now need to interact with the two programs in different environments.First step: In the De
I have a lot of automation programs adapted from some desktop programs that have been running on Windows servers. Program is too big, and is Win32 C + + written, to convert into a service program takes a lot of effort. I finally found a program called Srvany, which is part of the Windows Resource Kit that simply transforms the program into a service run. The steps are as follows:Must be performed by adminis
A calculation consists of several operations, which are called sequential executions of a program if they must be executed in some order to ensure that the result of the operation is correct.Concurrent execution of the so-called program refers to a number of programs running in the system at the same time, the execution of these programs is overlapping, the execution of one program has not been completed, a
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.