StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Temporary files - Research Paper Example

Cite this document
Summary
TEMPORARY FILES Temporary Files Author Author Affiliation Date Temporary files are as well recognized as ‘temp’ files typically comprise filenames which end with extension .TMP. However, sometimes they have the similar file extension for various applications since temporary files could be produced by a lot of diverse computer programs…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.7% of users find it useful
Temporary files
Read Text Preview

Extract of sample "Temporary files"

TEMPORARY FILES Temporary Files Affiliation Temporary files are as well recognized as ‘temp’ files typically comprise file s which end with extension .TMP. However, sometimes they have the similar file extension for various applications since temporary files could be produced by a lot of diverse computer programs. Thus, aspect makes it difficult for the computer users to recognize that which computer application has generated a particular temp file, or where the file is placed (FileInfo, 2011).

Plenty of temporary files are generally produced as particular computer programs are mounted or executed in a computer system. Thus, erasing these files from the system is able to create tons of problems to our PC. In this scenario, the diversity is fact about the temporary files which are utilized to keep data which is presently utilized by plenty of programs, otherwise information to be exchanged by programs or by the OS platform. Additionally, the moment a computer program is working with data; it can create various temporary files.

In this scenario application has the potential to make use of these temporary files while execution, as well as once the execution of a particular application is stopped; it must remove its temporary files subsequently. In addition, the increasing volume of temporary files inside our computer system gets room from our computer hard disk and consequently decelerates our system performance and capabilities. Since our computer hard drive has plenty of temporary files, every file is divided over a single portion.

This division will surely enable our hard disk inconsistent/fragmented; as a result of that computer hard drive will take extra time to find out the location of the files before reading a particular portion of hard disk. Therefore, this will certainly reduce the speed of our computer (FixMyComputerErrors, 2011; Beal, 2010). Moreover, one major category of temporary files is recognized as temporary internet files. These files are stored inside a directory within our computer that is some sort of stored information of websites we have previously viewed.

In this scenario, this feature facilitates the computer system to load the web-pages of those websites earlier even when we would have visited this website for the initial time (FixMyComputerErrors, 2011; Beal, 2010). Purpose of Disk Cleanup Implementing a disk cleanup utility is able to maintain our operating system platform in a useful manner and helps it work proficiently by removing the files which are not required by any other program or the PC. Even if it is probable to maintain separate tabs on the files which are focused by the disk cleanup program, this is straightforward to make use of this valuable computer utility frequently to recognize and remove the files simultaneously.

In addition, the utilization of disk cleanup will not automatically accelerate our computer; however when temporary files are stored further than practical scale, this utility will facilitate to tackle possible issues created due to their existence (Hampton, 2011). Moreover, the majority instant advantage of making use of disk cleanup utility is to acquire extra hard disk space requirements. Additionally, by means of disk cleanup utility, Microsoft formed a program which is quite easy and quick to exercise.

In addition, the interface offered by this utility allows us to choose the kind of files to remove, comprising, recycle bin files, typical temporary files, temporary internet files and lots of other files. Furthermore, disk cleanup utility as well removes temporary internet files utilized recently by internet explorer or any other web browser in windows based platform (Hampton, 2011). Step-By-Step Procedure to Access Disk Cleanup Utility Method 1 It can be initiated by clicking on the Start button, and afterward click on Run.

After clicking on the Run dialog box, type cleanmgr, and after that select the desired drive and click on OK button (Microsoft, 2007). Method 2 Or you can click on the Start button, then highlight to all programs, keep pointer over Accessories, then move the pointer to System Tools, and afterward click on Disk Cleanup (Microsoft, 2007). Method 3 Once we open my computer, right-click the drive wherein we like to get space, then click on Properties, then click on the General tab, and afterward click Disk Cleanup button in the dialog box.

To delete files placed on our hard drive we need to pursue these important steps: (Microsoft, 2007) Click on the Start button, and after that click on My Computer icon from list. Right-click the drive wherein we desire to get space, and afterward then click on Properties. Click on the General tab in the dialog box, plus next click on Disk Cleanup button. Click on the Disk Cleanup tab in case of non-selection, click to choose the check-boxes afterward to the stored files those we would like to delete, and afterward click on OK button.

Click on Yes in the dialog box, and afterward click on OK button. References Beal, V. (2010, August 31). What Is a Temporary Internet File? Retrieved May 30, 2011, from Webopedia.com: http://www.webopedia.com/DidYouKnow/Internet/2008/Temporary_Internet_Files.asp FileInfo. (2011). What are temporary (.TMP) files and how do I delete them? Retrieved May 31, 2011, from http://www.fileinfo.com/help/temporary-files.html FixMyComputerErrors. (2011). How to Delete Temporary Files. Retrieved May 31, 2011, from http://fixmycomputererrors.

com/how-to-delete-temporary-files/ Hampton, D. (2011). Purposes of a Disk Cleanup. Retrieved May 30, 2011, from eHow.com: http://www.ehow.com/about_5087357_purposes-disk-cleanup.html Microsoft. (2007, December 01). Description of the Disk Cleanup Tool in Windows XP. Retrieved May 30, 2011, from Microsoft.com: http://support.microsoft.com/kb/310312

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Temporary files Research Paper Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from https://studentshare.org/other/1424108-temporary-files
(Temporary Files Research Paper Example | Topics and Well Written Essays - 500 Words)
https://studentshare.org/other/1424108-temporary-files.
“Temporary Files Research Paper Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/other/1424108-temporary-files.
  • Cited: 0 times

CHECK THESE SAMPLES OF Temporary files

Computer forensics laboratory

at file, cookies, INFO2 for deleted files, temporary files, print spool files and similar files (Craiger 2006, pp.... The exact physical copy of the evidence is called bit-stream image, forensic duplicate or forensic image and is done by removing the hard disk from the source computer and attaching it to the investigator's forensic machine with the following security measures: using a write-blocker to ensure that no data is written to it in the process, and; setting the jumper setting of the source drive to slave to prevent any change of files....
3 Pages (750 words) Essay

Comparisong between the Bell-LaPadula model and the Biba model

For example, if an employee in an organization is utilizing an insecure application or program to view highly sensitive or top secret information, the application may corrupt that information or make temporary files that can be viewed by someone else later.... Bell LaPuda model does not address enforcement of privacy requirements associated with purpose binding....
3 Pages (750 words) Essay

Monitoring Software: Slow Internet Surfing

Every time we visit a website, some temporary files are downloaded automatically.... Through these files, spyware is also downloaded to the local hard drive automatically.... So, it is the best strategy to frequently delete all the temporary internet files.... It is always recommended to enable the firewall which blocks the malicious files from being downloaded automatically....
2 Pages (500 words) Essay

The Increased Need for Digital Forensics

Computer-created files, such as cookies, back-up files, temporary files and hidden files... If the owner of this hypothetical printer was alleged to have been involved in a child pornography ring, as one example, residual ink images left on the roller or various computer files buried in the printer's hard disk might indicate whether a given alibi is valid or whether the individual has actually been distributing sexually explicit, youth materials.... In this situation, forensic experts examine personal email, image/graphics files, calendars, address books and document files (Ashcroft, 10) as a means to find out whether the individual (or group) can be linked to the criminal behavior....
10 Pages (2500 words) Essay

Comparative study of security in Windows and Linux

An operating system is built for a user so that he can run different programs in a convenient and efficient manner.... Broadly, an operating system is the software… The hardware must possess appropriate mechanism to guarantee the correct working of the system.... It is to be noted that before building an operating system, proper field work should be done, so as to provide system production....
16 Pages (4000 words) Research Paper

Pre-Attack Techniques

The paper “Pre-Attack Techniques” will discuss hacking attacks, which usually take advantage of the vulnerabilities that exist with an organization's computer system or network to gain access to an unauthorized information and data.... hellip; The author insists that organizations should harden and strengthen their system security through the installation and configuration of necessary software like antivirus programs that ensure enhanced security....
5 Pages (1250 words) Coursework

Compromised and Lost Data

This is because in numerous operating systems booting may generate temporary files which occupy the region of information loss and this can make the retrieval of lost data completely impossible.... Equally, also avoid operations like copying, altering and deletion of files whenever there are occurrences of data loss.... Lastly an operational backup strategy has proportionalities between the amount of effort required and the degree of information loss, for instance it is easier to recover single files that have been lost compared to recovering an entire system (Strunk, Goodson, Scheinholtz, Soules, & Ganger, 2003)....
3 Pages (750 words) Assignment

Management Information Systems Pertaining to Law Enforcement - Past and Present

MDT's transmit data, pictures, and files to the units established at road points (Clark).... he field staff can retrieve data, pictures, and files from the road units into their laptop computers.... The aim of this article "Management Information Systems Pertaining to Law Enforcement - Past and Present" is to summarize the benefits of applying the recent information technology advancements in law enforcement for the purpose of facilitating major data-related tasks....
11 Pages (2750 words) Article
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us