Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

INFORMATION TECHNOLOGY4

Unit 3 Lab Assignment 3: Memory Management (30 point

In this assignment, you will learn to collect information about your OS’s virtual memory. For each
of the two questions, do the following:
1. Create a document (use Microsoft word or any equivalent tool such as
LibreOffice) and name it appropriately to reflect the assignment type, number,
and your name.
2. Answer the following questions (if any) in the document you created and
justify your answers. To do this, you may need to perform some tasks on your
computer, use a snipping or “print screen” tool to take screenshots, and paste
the illustrations/pictures into the document. Showing screenshots only does
not constitute answering a question. You need to provide both the answer
to the question and the screenshots.
3. Save and upload the document to the learning management system
(Blackboard). Upload the two documents at once.
Do not forget to show visual evidence (screenshots) of the main actions you took to answer
the questions.
Question 1: Windows Virtual Memory (15 points)
Windows sets the initial minimum size of the paging file equal to the amount of random access
memory (RAM) installed on your computer plus 300 megabytes (MB), and the maximum size
equal to three times the amount of RAM installed on your computer.
If you receive warnings that your virtual memory is low, you’ll need to increase the
minimum size of your paging file. If you see warnings at these recommended levels, then
increase the minimum and maximum sizes.
1. Checking the size of virtual memory
a. Under “Control panel,” find “System and security,” and then “System.”
b. In the left pane, click “Advanced system settings.” Administrator permission
required If you are prompted for an administrator password or confirmation, type
the password or provide confirmation.
c. On the “Advanced” tab, under “Performance,“ click “Settings.”
d. What is the size of your paging file?
2. Changing the size of the virtual memory
a. Did the system automatically allocate your paging file size?
b. What is the minimum allocated size?
c. Set the “maximum size” to 1.5 times the current value. Beware the units.
i. Click the “Advanced” tab, and then, under “Virtual memory,” click Change.
ii. Clear the “Automatically manage paging file size for all drives” check box.
iii. Under Drive [Volume Label], click the drive that contains the paging file you
want to change.
iv. Click Custom size, type a new size in megabytes in the Initial size (MB) or
Maximum size (MB) box, click Set, and then click OK.

Note: Increases in size usually don’t require a restart for the changes to take effect, but if you
decrease the size, you’ll need to restart your computer. We recommend that you don’t disable or
delete the paging file.
Do not forget to show visual evidence of the main actions you took to answer the questions.
Question 2: Linux Virtual Memory (15 points)
You may perform the tasks in this question on any Linux system. You may find help in [1]. After
completing this lab, you will be able to show the total amount of memory, display memory details,
understand the details listed in /proc/meminfo, and use tools like dmesg, dmidecode, free, and
vmstat to manage virtual memory.
1. Use the dmesg utility to tell me how much total memory you have installed on your Linux
machine, and how much is currently available. (2 points)
2. In a Linux OS, what types of files are located in the /proc directory? (1 point)
3. Use the cat utility to display the content of /proc/meminfo. What is the total configured
swap disk size, and how much is free currently? What does the “Dirty” field represent? (4
points)
4. What two attribute values from the output from q. 3 should a system administrator be
monitoring constantly in order to avoid being surprised by a system crash? (2 points)
5. Use the privilege command “dmidecole –type 17” to display information about your RAM
module. Who is the manufacturer of your RAM module? (2 points)
6. Use the “free” command to display your physical memory and your virtual memory
capacities. (1 point)
7. Use the privilege command “vmstat –slabs” to display your virtual memory and paging
statistics. (1 point)
8. When the swap memory is used by the system, what is the implication on the system
performance, as compared to when there is no need to use it? (2 points)
Do not forget to show visual evidence of the main actions you took to answer the questions.
Reference: [1] Michael Boelen, “Understanding memory information on Linux systems,”
[Available Online] [Date

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Computer Science 2 Assignments

Operational Excellence Week 2 Assignment Information Systems for Business and Beyond Questions: · Chapter 3 – study questions 1-8, Exercise 2, 4 & 5 Information Technology and Organizational Learning Assignment: Chapter 3 – Complete the two essay assignments noted below:  · Review the strategic integration section.  Note what strategic integration is and how

Discussion 3: generative adversarial nets

  Generative adversarial nets are mentioned in 2014 by Ian Goodfellow et al.  Why is generative adversarial network a key turning point in the history of generative modeling? Why is the field of image generation important? 

Week 3 – Linear Regression & Business Decision Making

attached file.  An asset management company must replace the manager of its two signature mutual funds, who is about to retire. Two candidates have been short-listed. The management team is divided and cannot decide which of the two candidates would make the better mutual fund manager. The retiring manager presents

data science

Final Exam Due Saturday 11:59 pm (Week 15) You cannot use any of the datasets in our assignments, class notes, and your own midterm project. If you are using the same one, you will receive 0 for your final project. 1. Question Formulation (5 points): You need to devise a

Letter of Recommendations

Hi  Attached is the sample of Letter of recommendation  Please write about it accordingly  1. Write about author :AUTHOR WILL BE professor David Kimble I will give links about his Biography write accordingly or you can use your own search engines about him to write it. 2 . How the

Letter of Recommendations

Hi  Attached is the sample of Letter of recommendation  Please write about it accordingly  1. Write about author :AUTHOR WILL BE professor David Kimble I will give links about his Biography write accordingly or you can use your own search engines about him to write it. 2 . How the

data science

Final Exam Due Saturday 11:59 pm (Week 15) You cannot use any of the datasets in our assignments, class notes, and your own midterm project. If you are using the same one, you will receive 0 for your final project. 1. Question Formulation (5 points): You need to devise a

IT 202

5/15/24, 10:59 AM Assignment Information 1/3 IT 202 Project One Milestone Guidelines and Rubric Overview For the purposes of this assignment, imagine that you are a systems architect at a medium-sized publishing company with 130 employees. The company primarily publishes books, both in print and online. It also produces other

Assessments

Perimeter defense techniques Evaluate the types of assessments, select one that you might use, and explain why it is important. Of the top eight areas to research when conducting an assessment, select no less than three and explain how one should approach the research and why it should be approached

project ppt presentation

Project 3 – Ensemble Methods and Unsupervised Learning In this project you will explore some techniques in unsupervised learning as well as ensemble methods. It is important to realize that understanding an algorithm or technique requires understanding how it behaves under a variety of circumstances. You will go through the

Week 2 understanding on Python.

PDF for reference purpose other file is requirement Python Installation & Examples Atif Farid Mohammad PhD 1. Open any Browser 2. Go to 3. Click at Download button 4. Go to your Download Folder (In both Windows and Mac) a. In Windows you will have the file: Anaconda3-2022.05-Windows-x86_64.exe b. Double

Computer Science Assignments

Operational Excellence Week 2 Assignment information Systems for Business and Beyond Questions · Chapter 2 – study questions 1-10, Exercise 2      Information Technology and Organizational Learning Questions · Chapter 2 – Note why the IT organizational structure is an important concept to understand.  Also, note the role of

Computer Science IT project assignment

Pg. 01 Project I Project Deadline: Sunday 12/5/2024 @ 23:59 [Total Mark is 14] Introduction to Database IT244 College of Computing and Informatics Project Instructions · You can work on this project as a group (minimum 2 and maximum 3 students). Each group member must submit the project individually with

project ppt presentation

Project 3 – Ensemble Methods and Unsupervised Learning In this project you will explore some techniques in unsupervised learning as well as ensemble methods. It is important to realize that understanding an algorithm or technique requires understanding how it behaves under a variety of circumstances. You will go through the

coding

Assignment 6 Due Saturday 11:59 pm (Week 14) Part 1 (50 points) We will explore the Marvel Network Universe. The dataset which you will find in Blackboard consists of the hero’s networks. For this dataset, you will need to ask yourself 3 questions (i.e which superhero knows more superheroes?) ,

project ppt presentation

Project 3 – Ensemble Methods and Unsupervised Learning In this project you will explore some techniques in unsupervised learning as well as ensemble methods. It is important to realize that understanding an algorithm or technique requires understanding how it behaves under a variety of circumstances. You will go through the

How hackers get info

Identify at least two ways in which hackers gather information about companies. What can companies do to limit this access, specifically to the ways you have identified? Which type of information can be gathered with enumeration? How and why should companies protect themselves against enumeration attempts?