Solved

REALLY SLUGGISH COMPUTER - WIN 2000 PRO

Posted on 2002-03-06
12
140 Views
Last Modified: 2010-04-14
I have a computer that is running soooo slow it is painful.  We are talking 4 - 5 minutes for an application to open (any app). When I have had to use task manager to quit a program - task manager actually uses 99% of the CPU - is this normal?
SPECS:  Pentium III, 128 ram, 550 mhz, running W2kPro, 8GB hardrive, partioned into 2, 3GB left on one partition, 900mb left on the system partition.
What I have tried....shutting down and restarting, Norton system works-fix window problems & optimize disk speed, cleaned everything of dust, downloaded a ram tester to ensure it was working fine, removed apps from my system tray and that is about the extent of my knowledge.  Is there anyone out there that can save me from having to reinstall windows??????????:(
0
Comment
Question by:Kimmy100700
  • 5
  • 2
  • 2
  • +3
12 Comments
 
LVL 25

Expert Comment

by:dew_associates
ID: 6846555
Kimmy, try booting the system into safemode and see if it boots faster. If it does, it may be that there are too many apps in the startup folder.

Have you defragged the hard rive? <system tools>

Dennis
0
 
LVL 1

Expert Comment

by:Hewin
ID: 6846879
Kimmy, try to do the following >
go to the task manager, processes tab,
From View menu, select columns, Base Priority.
in the processes tab click on CPU field header to sort the processes by the CPU usage, check what's using the CPU more, ofcourse after the "System Idle Process" ;)
you will surely find a process that's using more than 90% or near, if this process base priority is more than Normal, reduce this priority by right clicking on that process> Set Priority> try "BelowNormal" or "Low"
if this is not feasable you can "End Process Tree" rather than Ending the process only to close all the companion threads and processes.

Hewin
0
 
LVL 25

Expert Comment

by:dew_associates
ID: 6847355
Hewin, how about posting a comment like everyone else, rather than locking the question!
0
 

Author Comment

by:Kimmy100700
ID: 6847414
No process is taking up CPU time other than task manager
0
 

Author Comment

by:Kimmy100700
ID: 6847415
Both partitions have been defragmented.
0
 
LVL 25

Expert Comment

by:dew_associates
ID: 6847486
Kimmy, while viewing the process viewer and CPU usage, open an app and check to see if the usage changes. Open something that is CPU and disk intensive.
0
Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

 
LVL 25

Expert Comment

by:dew_associates
ID: 6847487
BTW, is this machine on a network of any kind?
0
 
LVL 17

Expert Comment

by:mikecr
ID: 6847852
Also, open My Computer and check your disk space by right clicking on the C: drive and choosing properties and see how much is left. Do you have a virus scanner running? Do you remember what the last program was that you installed on your computer before it started acting this way?
0
 
LVL 1

Expert Comment

by:Computer101
ID: 7586308
Kimmy posted in CS to delete this question.  Stated a reinstall was done.  If no objections, I will paq

Computer101
E-E Admin
0
 
LVL 25

Expert Comment

by:dew_associates
ID: 7587307
Okay with me "C"
0
 
LVL 17

Expert Comment

by:mikecr
ID: 7588916
No objection.
0
 

Accepted Solution

by:
DigitalXtreme earned 0 total points
ID: 7592634
question PAQ'ed and points refunded

DigitalXtreme
CS Moderator
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
This article will show you how to create an ISO CD-ROM/DVD-ROM image (*.iso), and MD5 checksum signature, for use with VMware vSphere Hypervisor 6.5 (ESXi 6.5). It's a good idea to compare checksums, because many installations fail because of a corr…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now