当前位置:网站首页>Why computers often crash
Why computers often crash
2022-06-24 06:26:00 【Zeitgeist】
In the process of using the computer , We often encounter a crash , The crash was accompanied by the computer operating system , From the beginning Windows The graphical operating system starts , There has always been such a situation . Why can't it be solved all the time ? That's from Windows The way we work . Why emphasize Windows What about the operating system , Because except for Windows operating system , There are several other operating systems , The most famous are UNIX. UNIX The operation interface focuses on the command line interface , This will reduce many resources . and Windows The original intention of operating system production , For the sake of popularization , So a lot of work has been done on the graphical interface , So there are some loopholes . And then there is Windows The operating system uses memory calls to work , At call time , There will also be problems , So I can't solve some problems .
Some of our common crash failures , It is also because of some hidden problems , Or it's not set up properly , Caused by improper operation , It may also be caused by the problems of the system itself or the hardware itself . In order to solve the fault “ Soft then hard ” Principles , From software failure to hardware failure , Let's analyze it slowly .
The first system problem
The operating system is crucial to the use of the whole computer , And the blue screen caused by system problems , Generally, the system file is damaged , Or the startup file is corrupted . If the system file is damaged , You can find this file to copy to the system , You can also use the system's own commands to repair , Or use the command console to recover . The detailed recovery steps can be found in the system file loss fault analysis in this book .
The second software problem
The most frequently used is the application software , There is also a manufacturing problem with the application software , It is also made with tool software . In the process of artificial production , It's hard to avoid many loopholes or mistakes . Such as game , In the entry and game , When you quit , It's easy to crash , Because the game itself is also running in the way of memory call . At call time , May be due to operational errors or programming errors , Cause a crash . And in this case , You have to re install the software or install the corresponding patch .
The third software virus residue file
When the software is unloaded , And when the virus is deleted or killed , There will be some documents left , Like historical documents 、dll Wait for the documents , And these files may still remain in the system's registration file , When used, it is equivalent to normal use , But these programs and viruses are gone , therefore , When the system calls , Unable to find program , There could be a dead cycle , Cause a crash . Software and virus residue files may also cause a crash , So when uninstalling and antivirus , You need to pay attention to whether to leave temporary files 、 Historical files and files that have not been deleted , All need to be deleted .
The fourth software is not compatible
Some software , Maybe it's a conflict with other software . Like antivirus software , Because of the difference of antivirus mechanism , There may be conflicts when using system permissions , Or other software, too . So the solution to this kind of file error is to uninstall and re install it or delete it directly .
The fifth cache setting is unreasonable
Buffering is to call the contents of the hard disk into the buffer , Speed up access to . Set the capacity to store data , If not set properly , It's likely to crash . So if something goes wrong , As long as it is set as default or set correctly .
The sixth system is lack of resources
System resources , On the whole, it's the hardware resources of the whole computer , But the most important thing is memory , Memory is a very important part of the system hardware , It is mainly responsible for data storage when the system is running , So if it's not set properly , Will cause data loss and other errors , Or crash . If this happens , First, check whether there are abnormal process files that occupy a lot of memory , Close some infrequently used software .
The seventh virus 、 Trojan horse
Viruses and Trojans , It's actually a computer program , It's just that the principle of work is different from the goal of work . therefore , When viruses and Trojans are running , Malicious use of system resources or destruction of system files , Damage to computer resources and system files . If you find this , Please upgrade your anti-virus software or use the special virus killing tool . in addition , At ordinary times, you should pay attention to opening the real-time monitoring of viruses to protect the operating system in real time .
The eighth kind of hardware overheats
Computer hardware is also printing Circuit board And other electronic equipment , So when using electricity , Will migrate , Heat generation . So computer cooling is also very important . If you don't pay attention to heat dissipation , It may cause the hardware products to burn out or burn out . If the hardware overheats , You need to start with the chassis , And then from cpu Wait for the equipment to start inspection , One by one exclusion analysis , If you find it , The heat sink can be replaced Fan Or add lubricating oil , Make it work .
Ninth hard disk
Hard disk is an important hardware for computer to store data . While the computer is running , Hard disk access is very frequent . And the hard disk , It is divided into electronic part and mechanical part , Generally, only the motor in the mechanical part has errors , And the electronic part , The most important storage area , In the process of reading and writing , Hard disks are running at high speed , In case of accidental power failure , An error may occur , Even damage the hard disk surface . therefore , If the hard disk has a bad track or there are too many hard disk fragments , You should first use the disk detection tool to detect , If it is judged that the hard disk has a bad track , You can use the bad trace detection tool to detect after detection , To discover in advance , Deal with as soon as possible .
The tenth hardware quality
The quality of hardware is the same as that of electronics , If the workmanship is not good , Poor refitting technology, etc , You can't make the hardware work . Like the power supply , If the power supply is unstable , It can also cause a crash . So when buying a computer , Pay attention to the quality of the hardware .
The eleventh kind of hardware overclocking
Hardware works at a fixed frequency , And some users are looking for higher speed , On the default basis of existing devices , Increase power or increase frequency , To achieve the purpose of overclocking . Of course , If an accessory is overclocking , The frequency of other devices also increases with the frequency , It may cause instability of system hardware .
The twelfth hardware environment
The range of hardware environments is very wide , Including the internal temperature of the computer 、 Hardware operating temperature 、 Outside temperature and computer placement room Temperature and humidity . Although it is not necessary to meet the standard , But it should also comply with the basic regulations , Do not let the computer hardware temperature suddenly drop or rise , Will affect the electronic life and the use of . So for the hardware environment , You can pay more attention to , Not too hot , Taichao , Or too cold , Make the computer safer to use .
边栏推荐
- TRTC applet custom message
- How to register a domain name? What are the benefits of building a website?
- Differences between JSON objects and JSON strings
- Quick reference table of PHP security configuration maintained by OWASP
- At the trusted cloud conference, Tencent securely unlocked a number of new certifications!
- "Adobe international certification" confused me: what is Pantone?
- 10 year old drivers who have been engaged in software testing tell you what type of software is suitable for automation
- Innovating the security service mode, deeply convinced that the organization has been equipped with a "continuous online expert group"
- text classification with RNN
- Smart Logistics: with the advent of aiot era, how to get through the "last mile" of logistics?
猜你喜欢
![[fault announcement] one stored procedure brings down the entire database](/img/7c/e5adda73a077fe4b8f04b59d1e0e1e.jpg)
[fault announcement] one stored procedure brings down the entire database

Enter the software test pit!!! Software testing tools commonly used by software testers software recommendations

One line of keyboard

ServiceStack. Source code analysis of redis (connection and connection pool)

Solution to the 39th weekly game of acwing

What is the difference between a white box test and a black box test

Manual for automatic testing and learning of anti stepping pits, one for each tester

Technology is a double-edged sword, which needs to be well kept

The product layout is strengthened, the transformation of digital intelligence is accelerated, and FAW Toyota has hit 2022million annual sales

A cigarette of time to talk with you about how novices transform from functional testing to advanced automated testing
随机推荐
What is the role of website domain name
The product layout is strengthened, the transformation of digital intelligence is accelerated, and FAW Toyota has hit 2022million annual sales
How to buy a domain name? How to do a good job in website construction?
What is the domain name query network and how it should be used
Another authoritative recommendation! Tencent zero trust was recognized by omdia Report
Feign request return value inverse sequence localdatetime exception record
Is IPFs a new national infrastructure project? What impact will the new infrastructure have on IPFs?
Correct way to update Fedora image Yum source to Tencent cloud Yum source
Tencent security release data security compliance capability map
Text classification and fine tuning using transformer Bert pre training model
Easycvr is cascaded to easygbs through gb28181 protocol. Notes on video channel failure
[fault announcement] one stored procedure brings down the entire database
Coding platform project construction guide
How to record the domain name reliably? What are the consequences of not filing a domain name?
An indoor high-end router with an external cable bundle limiting mechanism
How to select cloud game platforms? Just pay attention to two points
Text classification and fine tuning using transformer Bert pre training model
Tencent cloud won the "best customer value award for security hosting services in China" from Sullivan toubao Research Institute
Web address domain name IP query method, what is the use of domain name
Vscode1.58 version update record Previous + related article summary