Can I install the Operating System in USB Poratable Drive
in 250 or 120GB?
Answers were Sorted based on User's Feedback
Answer / muhammad rameez
yes can install the operating system in USB Drive in 250 or
120GB.we have to boot from Bious then you operate system.
Is This Answer Correct ? | 8 Yes | 0 No |
Yes, we can Install the Operating System in USB Portable
Drive.
Is This Answer Correct ? | 10 Yes | 3 No |
Answer / abhinav chaudhary
yes we install a operting system through pen drive make a
per drive bootable.copy command.com file from windows 98 cd
and paste it in pen drive...its definately worked
Is This Answer Correct ? | 9 Yes | 2 No |
Answer / bhuvan singh
yes , you install the operating system in USB Drive in 250 or
120GB.
Is This Answer Correct ? | 1 Yes | 0 No |
Answer / saket kale
Yes, it is possible to install any operating system on a
pendrive or an external portable hard disk drive, we jest
need to make it bootable.
Is This Answer Correct ? | 1 Yes | 0 No |
Q1. What is an interrupt? How are multiple interrupts dealt with? Q2. Explain the difference between a MONOLITHIC KERNAL and a MICROKERNAL? Q3. List reasons why a Mode switch between threads may be cheaper than a Mode switch between processes. Q4. What is the difference among deadlock avoidance, detection and prevention? Q5. What items of information about a task might be useful in real time scheduling? Q6. Discuss some of the reasons for implementing process migration ? How is the process address space handled during process migration?
How do you say gnu?
Virtual memory size depends on [a] address lines [b] data bus [c] disc space [d] a & c [e] none
15 Answers Infosys, SafeNet, Satyam, TCS, VIT Infotech, Wipro,
Can we kill init process?
What is an example of a network operating system?
Hi, This question may sound stupid. But I want to know that if the secondary storage device is used to store data on computer, then what is the use of the primary storage in the first place? Why cant we use only one?
How can I clean up my computer?
DEFINE YOURSELF AT THE TIME OF INTERVIEW IN TELECOM SECTOR?
Assuming one link of the Trojan horse copy-and-observe-later chain is broken. There are two other possible angles of attack by Alice: Alice logging on and attempting to read the string directly, and alice assigning a security level of sensitive to the back-pocket file. Does the reference monitor prevent these attacks?
Can a laptop have both ssd and hdd?
How many bytes we can send to apple push notification server in iOS operating system?
What is difference between post and patch?