PartitionMagicr by PowerQuestr Essay

This essay has a total of 4494 words and 34 pages.

PartitionMagicr by PowerQuestr



PartitionMagic(r) by PowerQuest(r)
Version 4.0 (versions for DOS, Windows 95/98 and Windows NT)

Copyright (c) 1994-1998 PowerQuest Corporation. All rights reserved.
U.S. Patents 5,675,769 and 5,706,472. Other patents pending in
the U.S.A. and elsewhere.



TABLE OF CONTENTS
-----------------
1. Back up Your System!
2. File System Support
3. Known Issues
4. Minimum System Requirements
5. General Usage Notes
6. Security Problems Using Shared Drive Letters Under Windows 95
7. Partition Magician Newsletter


1. BACK UP YOUR SYSTEM!
-----------------------
Don't forget to back up your hard drive(s) before using PartitionMagic. While
this version of PartitionMagic has been thoroughly tested and is quite safe,
power failures, operating system bugs, and hardware design bugs can put your
data at risk. No software program, including PartitionMagic, is perfect.
BEFORE USING ANY UTILITY THAT MAKES SUCH EXTENSIVE CHANGES TO YOUR HARD DRIVE,
YOU SHOULD BACK UP YOUR DATA!

To back up your system, we recommend using PowerQuest's Drive Image(tm) or
Drive Image Professional(tm). Drive Image is a state-of-the-art disk imaging
tool that allows you to create an image of your entire system (an exact
sector-for-sector copy) which can easily be restored. This allows you to run
PartitionMagic with the security of knowing that you can get your system back
up and running quickly if you run into problems.



2. FILE SYSTEM SUPPORT
----------------------
In addition to the documented partition type support, PartitionMagic 4.0
also supports FAT16X, FAT32X, and ExtendedX partitions.



3. KNOWN ISSUES
---------------

A. FAT32 memory requirements
----------------------------
PartitionMagic requires at least 32 MB RAM for moving or resizing
large FAT32 partitions.


B. Shut down all other apps before running PartitionMagic
---------------------------------------------------------
In Windows 95 and Windows NT, PartitionMagic should not be invoked
while any other applications are running. Make sure you close any
running applications before starting PartitionMagic.


C. Bad Sector Checking is ON by default
---------------------------------------
Be aware that PartitionMagic ships with Bad Sector Checking turned ON
by default in Preferences. This ensures that data is not moved or
copied to bad disk sectors. However, this causes the Create, Move,
and Resize operations to slow down considerably.

The quality of modern disks is such that bad sectors are rare.
Furthermore, most modern computers can determine when a sector is bad;
if this happens, the computer automatically marks the sector as bad
(so it will never be used) and then uses an alternate sector.

If you feel confident that there are no bad sectors on your system,
and you want to improve the performance of PartitionMagic, then turn
off Bad Sector Checking (by checking the appropriate boxes in the
"Skip bad sector checks" listbox in Preferences). Another way to
verify that there are no bad sectors on your disk is by running the
Windows 95 ScanDisk utility and doing a surface scan before launching
PartitionMagic.


D. Native vs. Boot-Mode execution in Windows 95 and Windows NT
--------------------------------------------------------------
PartitionMagic for Windows 95 and Windows NT are both full Win32 GUI
applications that will allow you to manipulate your partitions
natively, but with one exception: If you choose to move or resize a
partition that cannot be locked (e.g., one that has files open on it),
PartitionMagic stores the commands to be executed, reboots your
computer, and applies the changes in a "boot mode" text-mode
environment.


E. Backing up your BOOT.INI file in Windows NT
----------------------------------------------
PartitionMagic for Windows NT needs to temporarily replace your
BOOT.INI file after performing the disk manipulation operations (it
switches them back once it has finished performing the operations and
rebooting). If a failure occurs during the NT reboot phase, your
BOOT.INI file may not be restored properly. It is a good idea to back
up your BOOT.INI file before running PartitionMagic for Windows NT.


F. Volume sets and stripe sets on Windows NT
--------------------------------------------
Currently PartitionMagic does not support moving and/or copying of
Windows NT volume or stripe sets.


G. Creating a second primary partition under Windows NT
-------------------------------------------------------
The Windows NT and Windows 95 versions of PartitionMagic differ in
their behavior in regard to creating primary partitions. Specifically,
if the user creates a second primary partition on a physical disk
using the Windows 95 (or DOS) versions, PartitionMagic automatically
creates the new primary partition as Hidden (since some operating
systems have a problem with seeing multiple visible primary partitions
on the same disk). Because Windows NT does not have a problem with
multiple visible primary partitions, the Windows NT version of
PartitionMagic creates the new second primary partition as Unhidden.
However, like the Windows 95 version it will automatically hide other
primary partitions when performing a Set Active operation.


H. Windows NT default swap file location
----------------------------------------
Windows NT might put the swap file on a partition other than the Boot
Partition, thus creating a condition where an open file will be on a
partition other than the Boot Partition. This will cause you to have
open files and force PartitionMagic to execute in boot mode.


I. PartitionInfo issues
-----------------------
PartitionInfo is the new GUI version of PARTINFO.EXE (which shipped
with PartitionMagic 3.x, and ships with PartitionMagic 4.0). There
are versions of PartitionInfo for Windows 95/98 and Windows NT, but
not for DOS. DOS users will need to run PARTINFO.EXE. Also, note
that PartitionMagic and PartitionInfo cannot be run simultaneously.


J. MOUSE.COM issue running PartitionMagic under Windows 3.x
-----------------------------------------------------------
By default, Windows 3.x disables MOUSE.COM in the AUTOEXEC.BAT file
and MOUSE.SYS in the CONFIG.SYS file. This makes Windows 3.x use its
own proprietary mouse driver. When PartitionMagic is run from
Windows 3.x with this situation, MOUSE.COM is never called, and
PartitionMagic runs without a mouse. You can have a mouse with
PartitionMagic under Windows 3.x if the MOUSE.COM mouse driver is
loaded before Windows 3.x is loaded (this will require you to edit
your AUTOEXEC.BAT or CONFIG.SYS file).


K. Uninstalling PartitionMagic under Win3.x
-------------------------------------------
The "PowerQuest PartitionMagic 4.0 Pro" program group is not removed
when you uninstall PartitionMagic under Win3.x. This can be done
manually if desired.


L. Mixed IDE/SCSI drive configurations under Windows NT
-------------------------------------------------------
In a configuration with mixed IDE and SCSI hard drives, Windows NT
does not always see the boot drive as the first physical hard drive.
PartitionMagic displays drives in the order Windows NT reports them.
As a result, you may see your boot device as Drive 1, 2, etc. This
does not cause problems for PartitionMagic except when setting a new
active partition. Also, PartitionMagic may incorrectly report that
there is no active partition on your system. To change your active
partition, be sure that you identify which drive is the boot drive.

With this configuration there is the possibility that your BOOT.INI
file can be corrupted, so it is a very good idea to back up your
BOOT.INI file before running PartitionMagic.


M. Checking NTFS Partitions under DOS version of PartitionMagic
---------------------------------------------------------------
On rare occasions, checking an NTFS partition while running the DOS
version of PartitionMagic can take an unusually long time. Since the
Move, Copy, and Resize operations all perform a check both before and
after performing the function, it can impact each of these operations.
(Note: the DOS version is executed when the user runs the boot-mode
version of PartitionMagic under Windows 95/98, or when running the
Zinc or TTY versions.)


N. Checking partitions in general
---------------------------------
PartitionMagic 4.0 can only check partitions that it can lock (i.e,
that have no open files on them). This may sometimes cause the Check
option to be disabled.


O. OS/2 and Linux installation programs for PartitionMagic
----------------------------------------------------------
The distribution media contains PartitionMagic installation programs
for OS/2 and Linux operating systems. These programs create a bootable
floppy disk set that runs the DOS GUI version of PartitionMagic 4.0.
You can find the OS/2 installation under the OS2INST directory, and
the Linux installation under the LINUX directory.


P. Drive letter changes under Windows 95 and NT
-----------------------------------------------
In some situations, operations done under PartitionMagic for Windows
95 will cause drive letter changes made under the Windows NT operating
system to be lost. In these cases you will need to set up your drive
letter changes again (using either PartitionMagic for Windows NT or
Disk Administrator under NT) to restore your original configuration.


Q. MagicMover issues
--------------------
MagicMover has a known issue involving an '=' alone on a line in
system files (i.e., WIN.INI, SYSTEM.INI) under Windows 95 and Windows
3.x. If an error occurs, make sure there are no single '=' characters
on a line in these system files. Also, under no circumstances should
you use MagicMover to move the BootMagic directory (BTMAGIC.PQ) as
this will cause serious damage to your BootMagic setup.


R. Windows NT may improperly detect the size of large hard drives
-----------------------------------------------------------------
Windows NT 4.0 may incorrectly report the size of hard drives larger
than 10GB. Most often it reports them as 8GB drives. This problem
may be solved by 1) installing Service Pack 3, and 2) installing the
postsp3 patch ata-fixi.exe. This patch can be download from:
ftp://ftp.microsoft.com/bussys/winnt/winnt-public/fixes/usa/nt40/hotfixes-postSP3/atapi-fix/


S. Color palette issues installing Windows NT version
------------------------------------------------------
If you run the Windows NT version of PartitionMagic immediately
after installation, occasionally you may see color palette problems.
We recommend rebooting Windows NT before running PartitionMagic
for the first time.



4. MINIMUM SYSTEM REQUIREMENTS
------------------------------

PartitionMagic for Windows 95
-----------------------------
- 12 MB free hard drive space
- 16 MB of RAM (32 MB for FAT32 support). Also, please note that more
memory may be required to manipulate FAT32 partitions on large hard
disks (greater than 4 GB).
- Windows 95a or later (Windows 95b required for FAT32 support)
- VGA compatible display
- Intel/486 DX or later (33 mhz)
- 4x CD-ROM drive
- 3.5" Floppy (High density)


PartitionMagic for Windows NT
-----------------------------
- 12 MB free hard drive space
- 16 MB of RAM (32 MB recommended for PartitionMagic to operate on FAT32
partitions). Also, please note that more memory may be required
to manipulate FAT32 partitions on large hard disks (greater than 4 GB).
- Windows NT 4.0 Workstation (NOTE: Windows NT 3.51 is not supported by
native versions of PartitionMagic, but is supported by the DOS GUI and
Character Mode versions.)
- VGA compatible display
- Intel/486 DX or later (33 mhz)
- 4x CD-ROM drive
- 3.5" Floppy (High density)


DOS GUI/Character Mode
----------------------
- 6 MB free hard drive space
- 8 MB of RAM (16 MB for PartitionMagic to operate on NTFS partitions,
32 MB recommended for PartitionMagic to operate on FAT32 partitions).
Also, please note that more memory may be required to manipulate FAT32
partitions on large hard disks (greater than 4 GB).
- MS-DOS 5.0 (6.2 or later recommended) or compatible
- VGA compatible display
- 486 DX or later (33 mhz)
- 4x CD-ROM drive
- 3.5" Floppy (High density)



5. GENERAL USAGE NOTES
----------------------

- If you run PartitionMagic from DOS: Turn off 3rd party disk caches.
Deactivate or unload any TSR programs that access or modify the partitions
being changed. Do not run PartitionMagic from a compressed drive.

- Running PartitionMagic from Windows 3.1: After using PartitionMagic, it is
normal to get an error message when starting Windows 3.1 stating that the
swap file is corrupt. Windows 3.1 is designed knowing that disk utilities
may move the clusters of the swap file. When a move is detected, the error
message is given. To fix the swap file, click on the 386 Enhanced icon
in Control Panel, then on the Virtual Memory button. Delete the swap
file and create it again.

- This release of PartitionMagic handles ASCII filenames. PartitionMagic
does not yet handle double byte character sets such as Japanese, resulting in
two known limitations: (1) Converting a partition from FAT to HPFS can
produce incorrectly translated filenames. (2) An attempt to specify or set
the Volume label may fail.

- Progress bars are an estimation only and can pause for several minutes,
even though PartitionMagic is still working correctly. If you think your
computer has locked up, please be patient and PartitionMagic will finish the
operation.



6. SECURITY PROBLEMS USING SHARED DRIVE LETTERS UNDER WINDOWS 95
----------------------------------------------------------------

Be aware that under Windows 95, if you are using shared privileges to share
drives and you add or remove a partition (causing the drive letters to
change), you may experience some security problems.

The following is a possible example of a security problem sharing drive
letters under Windows 95 after partitioning your hard drive. Before you
partitioned your hard drive, your CD-ROM drive had shared privileges for
drive D:. After you added a partition, your CD-ROM became drive E:. However,
because your CD-ROM (drive D:) had shared privileges and you added a
partition, your shared privileges would still be assigned to drive D:.
Therefore, you could potentially be sharing information from your D:
partition that you do not wish to share.

To resolve this problem, you may want to check, and if necessary reset your
shared privileges in Windows 95 after you have added or removed a partition.
You will not be affected by this situation if you share a directory and its
parent directory and its parent drive letter changes, because the shared
privilege would be lost.



7. PARTITION MAGICIAN NEWSLETTER
--------------------------------

PowerQuest has a free monthly electronic newsletter that is dedicated to
official announcements regarding PartitionMagic. Signing up on the list
will give you all the information you need regarding product tips, bugs,
and patches. Just go to our home page (www.powerquest.com), enter your
email address into the space provided and hit the "Sign me up" button.
You will be e-mailed a response verifying your subscription.



============================================================================

PowerQuest can be reached at:

Voice: 801-437-8900
Fax: 801-226-8941
Web site: http://www.powerquest.com
E-mail: magic@powerquest.com




Bibliography:

PartitionMagic(r) by PowerQuest(r)
Version 4.0 (versions for DOS, Windows 95/98 and Windows NT)

Copyright (c) 1994-1998 PowerQuest Corporation. All rights reserved.
U.S. Patents 5,675,769 and 5,706,472. Other patents pending in
the U.S.A. and elsewhere.

Continues for 17 more pages >>




  • Building a computer
    Building a computer BUILDING A COMPUTER With increasing popularity of computer games, and multimedia home PC users often need an unexpensive computer system upgrade. By building a custom computer one is able to combine componenets, and operating system to provide maximal gaming performance. Computers are often called number manipulators, because of their ability to run millions of mathematical operations per second (White 43). Computers use binary system of numbers, which allows them to operate
  • Buying A Computer
    Buying A Computer Buying a Computer today is much more complicated then it was ten years ago. The choices we have are abundant, and the information we must gather to make those choices is much greater. The average consumer is a more educated buyer; they at least have some ideas of what they want in a computer. Yet, we must still ask ourselves these significant questions; such as: What will the primary function of my computer be? What computer components should I consider at the time of purchase?
  • Computer fundermentals
    computer fundermentals The society in which we live is complex and sophisticated. As consumers we demand a variety of goods and services to enable us to maintain the quality of life we enjoy. In order to satisfy these demands, suppliers must produce the goods and services, which the consumer wants by combining factors of production such as land, labour and capital in the most efficient manner. To do this the hiring of workers, rent or purchase of the appropriate premises, and maybe, even investi
  • Computer purchase
    computer purchase PROF. MARTINEZ COMPUTER PURCHASE Recently, I decided to purchase a new computer. Buying a computer can be a complicated procedure. A number of decisions must be made before making this purchase. I must decide what type of software and hardware I need for my everyday use. Another decision that must be made is how much money do I want to spend. There is no real budget for this purchase. I am not really concerned with the price of the computer. I am not looking to cut corners. My
  • Computer virus
    computer virus Computer Virus Melissa, Bubbleboy, WM Concept, Stoned, Michelangelo, …, the list goes on and on. You might ask what do all these names have in common. The similarity between them is that they can cause damage to your computer. In short they are simply known as “computer viruses”. For most users, the term “computer virus” is a synonym of the worst nightmares that can happen on heir system. A computer virus is an illegal and potentially damaging computer program designed to infect o
  • Computer Viruses
    Computer Viruses Computer Viruses Introduction In the past decade, computer and networking technology has seen enormous growth. This growth however, has not come without a price. With the advent of the "Information Highway", as it’s coined, a new methodology in crime has been created. Electronic crime has been responsible for some of the most financially devastating victimizations in society. In the recent past, society has seen malicious editing of the Justice Department web page (1), unauthori
  • Computer Viruses1
    Computer Viruses1 Computer Viruses Essay written by Jeramiah Billings Introduction In the past decade, computer and networking technology has seen enormous growth. This growth however, has not come without a price. With the advent of the "Information Highway", as it\'s coined, a new methodology in crime has been created. Electronic crime has been responsible for some of the most financially devastating victimizations in society. In the recent past, society has seen malicious editing of the Justi
  • Contrast DOS to Unix
    Contrast DOS to Unix Compare and Contrast Microsoft DOS with UNIX Arthur Bennis Microcomputer Operating Systems CGS 1560 INTRODUCTION As is suggestive of its name, an operating system (OS) is a collection of programs that operate the personal computer (PC). Its primary purpose is to support programs that actually do the work one is interested in, and to allow competing programs to share the resources of the computer. However, the OS also controls the inner workings of the computer, acting as a t
  • DESIGNING A NETWORK
    DESIGNING A NETWORK I. STATEMENT & BACKGROUND The college of Business (COB) server is now being used to support deliver to the Computer Information System (CIS) department. The CIS professors would be using the server for various operations. Assignments, e-mail, and other types of information would be easier for the students to access. Network users are able to share files, printers and other resources; send electronic messages and run programs on other computers. However, certain important issu
  • Disk Defragmentation
    Disk Defragmentation Fast, reliable disk performance is mandatory in today’s complex information technology world, because system response and virtual memory performance depend on fast disk I/O. unfortunately, common disk fragmentation leads to significant performance degradation. According to one vendor, 58 percent of any I/O operation is disk seek time. So reducing seek time by defragmenting files can play an important part in increasing application performance. How such an intelligent file pl
  • DOS (Disk Operating System) was developed by the M
    DOS DOS (Disk Operating System) was developed by the Microsoft Corporation, as the standard operating system for use with IBM personal computers. It controls the basic functions of the computer, and is especially handy for working with data stored on disks. The DOS system resides on diskette (3.5" or 5.25") and the system files may be transferred to a hard disk unit. An operating system is a program that allows competing programs to share the resources of the computer (memory, disk, and devices
  • DOS (Disk Operating System) was developed by the M
    DOS DOS (Disk Operating System) was developed by the Microsoft Corporation, as the standard operating system for use with IBM personal computers. It controls the basic functions of the computer, and is especially handy for working with data stored on disks. The DOS system resides on diskette (3.5" or 5.25") and the system files may be transferred to a hard disk unit. An operating system is a program that allows competing programs to share the resources of the computer (memory, disk, and devices
  • History of Computer Industry
    History of Computer Industry History of the Computer Industry in America America and the Computer Industry Only once in a lifetime will a new invention come about to touch every aspect of our lives. Such a device that changes the way we work, live, and play is a special one, indeed. A machine that has done all this and more now exists in nearly every business in the U.S. and one out of every two households (Hall, 156). This incredible invention is the computer. The electronic computer has been a
  • How to design a network
    how to design a network I. STATEMENT & BACKGROUND The college of Business (COB) server is now being used to support deliver to the Computer Information System (CIS) department. The CIS professors would be using the server for various operations. Assignments, e-mail, and other types of information would be easier for the students to access. Network users are able to share files, printers and other resources; send electronic messages and run programs on other computers. However, certain important
  • Influences of Personal Computers Today
    Influences of Personal Computers Today Introduction Since the beginning of the Industrial Revolution, people wanted and needed an easier way of calculating and measuring. Through the dreams of Charles Babbage, the computer was born. These new machines could do any regular math more than twice as fast as any human. Sadly, these ideas were not appreciated until almost one hundred years later. In the 1950\'s, the idea of computers was broght up again. This is when people finally started crediting B
  • Networking Principles
    Networking Principles INTRODUCTION OF NETWORKING One problem that I see with people today is that they are unaware what a computer network is. They might have heard of a computer network, but they are clueless as to how it works or why it works. People have basic questions that need to be answered. My goal is to give basic network information that will hopefully answer those questions. To give people an understanding about computer networks there are several areas that I must focus on. I will gi
  • NT Server
    NT Server NT Server 4.0 study notes How do you move a PDC or a BDC to a new domain? Change the Domain Name System Policy Editor will allow you to restrict logon times - true or false? False What is the correct syntax to start a program such as Network Monitor with a low priority start /low netmon A local group is located in each computers account database Why would you run Win16 apps in a separate NTVDMS? To allow a Win16 app to interoperate with other apps in a separate memory space Will it min
  • Software Licensing
    Software Licensing In 1993 worldwide illegal copying of domestic and international software cost .5 billion to the software industry, with a loss of .2 billion in the United States alone. Estimates show that over 40 percent of U.S. software company revenues are generated overseas, yet nearly 85 percent of the software industry\'s piracy losses occurred outside of the United States borders. The Software Publishers Association indicated that approximately 35 percent of the business software i
  • Types of Computer Viruses
    Types of Computer Viruses A computer virus is a program that is designed to damage your computer, programs, and files. Like a virus in a living thing, a computer virus can spread if it is not removed. Some viruses are more dangerous than others. One of the most common places for a computer virus to appear is on a file found on the Internet or attached to an E-mail. For example, you may have a virus that just pops a message box on your screen, and then the virus is disabled, or you can have a vir
  • Apple Vs the World A Comparison of PCs and Apple C
    Apple Vs the World A Comparison of PCs and Apple Computers INTRODUCTION This article will evaluate the practicality of several PCs vs. Apple Macs for an incoming college freshman. The ever-changing computer world is a maze of options and capabilities. Within this ever-changing world lie to very different elements; the PC and the Mac are two very different computers. Both computers have their own unique qualities, but also have their own flaws too. Hardware, operating systems, and affordability w
  • Asd1
    asd1 artitionMagic(r) by PowerQuest(r) Version 4.0 (versions for DOS, Windows 95/98 and Windows NT) Copyright (c) 1994-1998 PowerQuest Corporation. All rights reserved. U.S. Patents 5,675,769 and 5,706,472. Other patents pending in the U.S.A. and elsewhere. TABLE OF CONTENTS ----------------- 1. Back up Your System! 2. File System Support 3. Known Issues 4. Minimum System Requirements 5. General Usage Notes 6. Security Problems Using Shared Drive Letters Under Windows 95 7. Partition Magician Ne
  • Computer crime
    computer crime Computer Crime Is Increasing A report discussing the proposition that computer crime has increased dramatically over the last 10 years. Introduction Computer crime is generally defined as any crime accomplished through special knowledge of computer technology. Increasing instances of white-collar crime involve computers as more businesses automate and the information held by the computers becomes an important asset. Computers can also become objects of crime when they or their con
  • Earthquakes
    earthquakes EARTH QUAKE REFERENCE FILES EARTHQUAKE REFERENCE FILES Earthquake, shaking of the earth’s surface caused by rapid movement of the earth’s rocky outer layer. Earthquakes occur when energy stored within the earth, usually in the form of strain in rocks, suddenly releases. This energy is transmitted to the surface of the earth by earthquake waves. The study of earthquakes and the waves they create is called seismology. Scientists who study earthquakes are called seismologists. (Webster’
  • Earthquakes
    earthquakes EARTH QUAKE REFERENCE FILES EARTHQUAKE REFERENCE FILES Earthquake, shaking of the earth’s surface caused by rapid movement of the earth’s rocky outer layer. Earthquakes occur when energy stored within the earth, usually in the form of strain in rocks, suddenly releases. This energy is transmitted to the surface of the earth by earthquake waves. The study of earthquakes and the waves they create is called seismology. Scientists who study earthquakes are called seismologists. (Webster’
  • Help
    help CLIENT FOR NETWARE Windows 95 and NetWare 3.12 and 4.01 Servers Opening Files on NetWare 3.11 Servers Lowercase Extended-Character Passwords on NetWare 4.1 Servers Client for NetWare and Programs That Use External Files Novell NetWare Login Scripts Installing Novell Client32 Overwrites NetWare Directory Services Files Upgrading Over an Earlier Beta Version of Windows Printing to NetWare Directory Services Printers PLUG AND PLAY NETWORK CARDS AND 16-BIT REAL-MODE DRIVERS INTEL ETHEREXPRESS 1
  • Internet and Networking
    Internet and Networking In the 1960s, time-sharing brought about the first interactive access to computers. This was a mix of data transmission technology and a teletypewriter. The result was an interactive terminal. These terminals were connected to a server with low-speed lines, allowing the users to interact with the computer and take advantage of its resources. Time-sharing gave multiple users the ability to use the computer at the same time, for completely separate tasks, and provided them
  • Internet security overview
    internet security overview 1 Introduction The recent acceleration in the uptake of electronic commerce (e-commerce) over the Internet has focused the need for methods to be developed by which to securely transfer data over what amounts to a worldwide public network. The most commonly cited example of this requirement is the ability of customers to make electronic purchases from company Web sites using debit cards such as VISA cards. Public confidence in e-commerce has to be high for it to succee
  • Jjjj
    jjjj Computers and crime By: Dan Shark Computers and Crime As our technology has greatly advanced over the past 50 years, our businesses, people, and its governments have been greatly affected by this new technology. With the vast capabilities of computers, the Internet, storage capability, and the manipulation of data, today\'s world has been changed forever. Although the benefits greatly outweigh the disadvantages, unless we take a more serious look at this new technology, more people will be
  • PartitionMagicr by PowerQuestr
    PartitionMagicr by PowerQuestr PartitionMagic(r) by PowerQuest(r) Version 4.0 (versions for DOS, Windows 95/98 and Windows NT) Copyright (c) 1994-1998 PowerQuest Corporation. All rights reserved. U.S. Patents 5,675,769 and 5,706,472. Other patents pending in the U.S.A. and elsewhere. TABLE OF CONTENTS ----------------- 1. Back up Your System! 2. File System Support 3. Known Issues 4. Minimum System Requirements 5. General Usage Notes 6. Security Problems Using Shared Drive Letters Under Windows
  • Using application software
    using application software Using Application Software Report into possible application package solutions A request by A.T. Press, to investigate the changes in their current ordering system has induced me to present to you this report. This report will feature a comparison on how the requirements of the problem can be met with the facilities of a variety of types of application software packages. It will also feature a suitable type of application software package to provide a solution to the pr
  • The sound of music
    the sound of music Earjam Internet Music Player 2.0 Beta (build 912) Copyright (C) 2000 earjam.com All Rights Reserved e-mail: betatest@earjam.com CONTENTS 1. OVERVIEW 2. INSTALLATION 3. DELUXE VERSION 4. LIMITATIONS AND KNOWN ISSUES 5. FREQUENTLY ASKED QUESTIONS 6. SYSTEM REQUIREMENTS 7. CD DRIVE SUPPORT 8. CONTACT INFORMATION 9. COPYRIGHT 1. OVERVIEW Thank you for downloading Earjam Internet Music Player 2.0 Beta (build 912). Please, visit our web site www.earjam.com for up-to-date information
  • Earthquakes1
    earthquakes1 EARTH QUAKE REFERENCE FILES EARTHQUAKE REFERENCE FILES Earthquake, shaking of the earth’s surface caused by rapid movement of the earth’s rocky outer layer. Earthquakes occur when energy stored within the earth, usually in the form of strain in rocks, suddenly releases. This energy is transmitted to the surface of the earth by earthquake waves. The study of earthquakes and the waves they create is called seismology. Scientists who study earthquakes are called seismologists. (Webster
  • Earthquakes1
    earthquakes1 EARTH QUAKE REFERENCE FILES EARTHQUAKE REFERENCE FILES Earthquake, shaking of the earth’s surface caused by rapid movement of the earth’s rocky outer layer. Earthquakes occur when energy stored within the earth, usually in the form of strain in rocks, suddenly releases. This energy is transmitted to the surface of the earth by earthquake waves. The study of earthquakes and the waves they create is called seismology. Scientists who study earthquakes are called seismologists. (Webster
  • Technology
    Technology History of the Computer Industry in America America and the Computer Industry Only once in a lifetime will a new invention come about to touch every aspect of our lives. Such a device that changes the way we work, live, and play is a special one, indeed. A machine that has done all this and more now exists in nearly every business in the U.S. and one out of every two households (Hall, 156). This incredible invention is the computer. The electronic computer has been around for over a h
  • Computer Crime
    Computer Crime Computer Crime It\'s the weekend, you have nothing to do so you decide to play around on your computer. You turn it on and then start up, you start calling people with your modem, connecting to another world, with people just like you at a button press away. This is all fine but what happens when you start getting into other peoples computer files. Then it becomes a crime, but what is a computer crime really, obviously it involves the use of a computer but what are these crimes. W
  • Computer Crime
    Computer Crime Computer Crime It\'s the weekend, you have nothing to do so you decide to play around on your computer. You turn it on and then start up, you start calling people with your modem, connecting to another world, with people just like you at a button press away. This is all fine but what happens when you start getting into other peoples computer files. Then it becomes a crime, but what is a computer crime really, obviously it involves the use of a computer but what are these crimes. W
  • Hard Drives
    Hard Drives Small Systems Research Paper Hard Drives In this day and age of faster computers and high-speed processors, it should only stand to reason that hard drives meet the same requirements as the rest of the computer technology world. A technological look and some tips on maintaining or troubleshooting hard drives is included below. By keeping up with the standard of needs of the industry we can be assured that our personal computers will have all the necessary space and the ability to acc
  • History of computers
    history of computers HISTORY HISTORY OF COMPUTERS IN THE U.S. Only once in a lifetime will a new invention come about to touch every aspect of our lives. Such devices changed the way we manage, work, and live. A machine that has done all this and more now exists in nearly every business in the United States. This incredible invention that I use all day, 5 days of a week is the computer. I have been using a computer for well over seven years and it has changed how I communicate and the business p
  • History of the Computer Industry in America
    History of the Computer Industry in America History of the Computer Industry in America America and the Computer Industry Only once in a lifetime will a new invention come about to touch every aspect of our lives. Such a device that changes the way we work, live, and play is a special one, indeed. A machine that has done all this and more now exists in nearly every business in the U.S. and one out of every two households (Hall, 156). This incredible invention is the computer. The electronic comp
  • Histroy of computers
    Histroy of computers The History of Computers Only once in a lifetime will a new invention come about to touch every aspect of our lives. Such devices changed the way we manage, work, and live. A machine that has done all this and more now exists in nearly every business in the United States. This incredible invention is the computer. The electronic computer has been around for over a half-century, but its ancestors have been around for 2000 years. However, only in the last 40 years has the comp
  • Love
    love ----------------------------------------------------------- Microsoft Windows 95 README for Hardware August 1996 ----------------------------------------------------------- (c) Copyright Microsoft Corporation, 1996 This document provides complementary or late-breaking information to supplement the Microsoft Windows 95 documentation. ------------------------ How to Use This Document ------------------------ To view Hardware.txt on screen in Notepad, maximize the Notepad window. To print Hard
  • COMPUTER SECURITY ISSUES
    COMPUTER SECURITY ISSUES Computer Security Issues Facing Alsager Ltd. In upgrading the Alsager Ltd IT facilities, despite numerous advantages that the new systems brings one has to be made aware of the possible threats posing. Virus can effect the system. They are pieces of codes created by hacker to create a nuisances and to another extreme corrupt valuable data. Examples of these can be animated icons flying pass the computer screen and to another extreme can be programmes designed to delete
  • History of auditing
    history of auditing Abstract The evolution of auditing is a complicated history that has always been changing through historical events. Auditing always changed to meet the needs of the business environment of that day. Auditing has been around since the beginning of human civilization, focusing mainly, at first, on finding fraud. As the United States grew, the business world grew, and auditing began to play more important roles. In the late 1800s and early 1900s, people began to invest money
  • COMPUTER SECURITY ISSUES
    COMPUTER SECURITY ISSUES Intro: Computers have become a vital component of the business world. It is very difficult to imagine modern business environment without computers. Data storage, processing information, fast communication, and research resources are only the most obvious examples making computers a beneficial device for sustainable development of companies. However despite numerous advantages that the new systems bring we have to be made aware of the possible threats posing. Today I am
  • Computer Viruses
    Computer Viruses On March 26, 1999, people everywhere began sending Microsoft and anti-virus companies information about something going wrong with their computers. Those companies figured out that it was a macro virus called “Melissa” hidden into a plain email letter. It would make the infected computer’s email program send an email saying it was an important message from the sender. Thousands of people were infected worldwide. One commonly asked question about computers is “what are computer
  • Computer Viruses
    Computer Viruses On March 26, 1999, people everywhere began sending Microsoft and anti-virus companies information about something going wrong with their computers. Those companies figured out that it was a macro virus called “Melissa” hidden into a plain email letter. It would make the infected computer’s email program send an email saying it was an important message from the sender. Thousands of people were infected worldwide. One commonly asked question about computers is “what are computer
  • Computers and crime
    Computers and crime Computers and Crime As our technology has greatly advanced over the past 50 years, our businesses, people, and its governments have been greatly affected by this new technology. With the vast capabilities of computers, the Internet, storage capability, and the manipulation of data, today\'s world has been changed forever. Although the benefits greatly outweigh the disadvantages, unless we take a more serious look at this new technology, more people will be hurt, from busines
  • Designing A Network
    Designing A Network I. STATEMENT & BACKGROUND The college of Business (COB) server is now being used to support deliver to the Computer Information System (CIS) department. The CIS professors would be using the server for various operations. Assignments, e-mail, and other types of information would be easier for the students to access. Network users are able to share files, printers and other resources; send electronic messages and run programs on other computers. However, certain important iss
  • Hist of comp
    hist of comp History of the Computer Industry in America America and the Computer Industry Only once in a lifetime will a new invention come about to touch every aspect of our lives. Such a device that changes the way we work, live, and play is a special one, indeed. A machine that has done all this and more now exists in nearly every business in the U.S. and one out of every two households (Hall, 156). This incredible invention is the computer. The electronic computer has been around for over
  • History of computers
    history of computers History of Computer Industry History of the Computer Industry in America America and the Computer Industry Only once in a lifetime will a new invention come about to touch every aspect of our lives. Such a device that changes the way we work, live, and play is a special one, indeed. A machine that has done all this and more now exists in nearly every business in the U.S. and one out of every two households (Hall, 156). This incredible invention is the computer. The electron