?
Solved

A: drive seek at boot

Posted on 2002-04-09
2
Medium Priority
?
115 Views
Last Modified: 2011-09-20
I'm using Windows 2000 Professional. Everytime my system starts up and reaches the login screen Windows looks for a disk in the A: drive but otherwise boots normally. It's not a major problem but it's just that the drive access is kind of annoying and I'm worried that it might cause unecessary wear to the drive. Is there anyway to disable this?
0
Comment
Question by:wsteph
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 44

Accepted Solution

by:
CrazyOne earned 100 total points
ID: 6930468
It's looking to make sure the drive is there and operational. If the activity seems excessive then I supect you have an anti-virus scanner running and it may be set to scan the drive. Of course without a disk in it there is nothing for it to scan but sometimes the scanner takes a few moments to figure that out. If you are using an anti-virus scanner then check out the customization options and see if you can find out whether it is set to scan the A drive at startup.


The Crazy One
0
 

Author Comment

by:wsteph
ID: 6932735
No virus scanner on my end. The access is very short which seems to fit with the Win2K checking drive operation reason. Pity there's no way to stop it. Thanks.
0

Featured Post

Get real performance insights from real users

Key features:
- Total Pages Views and Load times
- Top Pages Viewed and Load Times
- Real Time Site Page Build Performance
- Users’ Browser and Platform Performance
- Geographic User Breakdown
- And more

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
The well known Cerber ransomware continues to spread this summer through spear phishing email campaigns targeting enterprises. Learn how it easily bypasses traditional defenses - and what you can do to protect your data.
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Add bar graphs to Access queries using Unicode block characters. Graphs appear on every record in the color you want. Give life to numbers. Hopes this gives you ideas on visualizing your data in new ways ~ Create a calculated field in a query: …
Suggested Courses
Course of the Month10 days, 22 hours left to enroll

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question