Skip to main content

USE YOUR PENDRIVE AS RAM

 Follow The Following Steps ...

1) Connect your pen drive to your pc.
[pen drive should be atleast 1 gb or if you having 4 gb then its better]

2) Allow pc what he is supposed to do,let system to detect pen drive.

3) After your pc finished with his detection work,you have to do some little work 

4) Right click on the My Computer and select the properties

5) Go to advanced and then performance setting then advanced then change.

6) Select pen drive and click on custom size
[Check the value of space available]

7) Enter the same in the Initial and the Max columns and click set.

8) Now restart your pc and enjoy your fast and super system
[You just used the memory of the PenDrive as a Virtual Memory]


Milind Audichya
+919913188848

Comments

Popular posts from this blog

Quiz 1 : Mobile Application Development - Android

Download PDF Version From Here   MCQ 1. Select a component which is NOT part of Android architecture. a. Android framework   b. Libraries          c. Linux kernel   d. Android document 2. What is AAPT? a. Android Asset Processing Tool.             b. Android Asset Providing Tool.   c. Android Asset Packaging Tool.             d. Android Asset Packaging Technique 3. Required folder when Android project is created. a. build                 b. build/               c. bin     d. bin/ 4. Adb stands for   A. Android Drive Bridge.                  ...

IP Delivery Concept

It is the practice of using the IP, the network address of the connecting computer, whether robot or human, and sending different content based on that. The database used to assist with the process. In the case of geo-targeting: Databases stores various ranges of IP addresses, and indicates where this ranges of IPs are in the world. A geo-targeting script scans the list to see in which country the current IP is located. Programmer can use this value to effect changes in presentation or logic. In the case of cloaking : Databases stores the IP addresses of the various spiders that may hit your site. The cloaking script scans the list to see if the current IP is a spider. The programmer can use this information to effect changes in presentation or logic. Implementations of IP-delivery-based cloaking also look at the User-Agent header of the request. The user agent header is a header sent by both browsers and spiders. But it is not regarded authoritative, bec...

Never try to go back and repair the past which is impossible. But be prepared to construct the future which is possible.

Never try to go back and repair the past which is impossible. But be prepared to construct the future which is possible.