How to view computer operation records?
How to check computer operation records: 1. Check what folders and files you have opened recently, use "win R" to pop up the "Run" window, enter "recent"; 2. Check what has been run Program, find the "C:\windows\Prefetch" directory, which contains the history of your running programs.
Have you ever encountered this situation when you usually use your computer? That is, when you want to find a certain historical file or touch a historical operation, you cannot I started, but I don’t know how to check my past operations. Today, Xiansen, pretending to be confused, will share with you some questions about historical computer operations. This article will involve searching, deleting, and restoring historical operation records, access records, etc. Content, I hope it will be helpful to you
View operation records
1. Check the first running time of the computer
If your system is installed on the c drive, find the c:\windows\SchedLgU.txt file which contains the time you have worked since the system was created, including the day it was turned on, the time it was turned on, and the time it was turned off! (This method is applicable to wein7)
win R pops up the Windows 10 run window, enter the command cmd in the window, and then click the OK button. Enter "systeminfo" in the command input box that opens, and then we can see the system installation time and startup time. Of course, this method can also check some basic information about the computer, including product ID, memory usage, patches, etc. (This method is suitable for wein10)
2 .Check what programs you have run
Find the C:\windows\Prefetch directory. What is recorded in it is the history of your running programs. The first part of the file is the name of the program you ran. The premise is that you Not optimized using Security Guard. If optimized, there will be no program running history.
3. Check what folders and files you have opened recently
win R pops up the run window, enter recent
4. Check your Internet access records
First turn on the Show all files option, and then open C:\Documents and Settings\xukunping\ Local Settings directory, in which you can see all your network operation records, including downloaded videos, pictures, files, etc. If you have performed disk cleanup or related optimization, there will be no records.
How to delete records
##Clear running records:
Enter regedit in the start search bar, press Enter to enter the registry editor, and then navigate to HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU You can delete the right All values other than "(default)" can also be deleted selectivelyClear recently used project records:
Enter "%APPDATA" in the address bar of the disk %\Microsoft\Windows\Recent\AutomaticDestinations" and press Enter to open the directory, and then delete all the files in the directory.The above is the detailed content of How to view computer operation records?. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

Local fine-tuning of DeepSeek class models faces the challenge of insufficient computing resources and expertise. To address these challenges, the following strategies can be adopted: Model quantization: convert model parameters into low-precision integers, reducing memory footprint. Use smaller models: Select a pretrained model with smaller parameters for easier local fine-tuning. Data selection and preprocessing: Select high-quality data and perform appropriate preprocessing to avoid poor data quality affecting model effectiveness. Batch training: For large data sets, load data in batches for training to avoid memory overflow. Acceleration with GPU: Use independent graphics cards to accelerate the training process and shorten the training time.

DeepSeek: A powerful AI image generation tool! DeepSeek itself is not an image generation tool, but its powerful core technology provides underlying support for many AI painting tools. Want to know how to use DeepSeek to generate images indirectly? Please continue reading! Generate images with DeepSeek-based AI tools: The following steps will guide you to use these tools: Launch the AI Painting Tool: Search and open a DeepSeek-based AI Painting Tool (for example, search "Simple AI"). Select the drawing mode: select "AI Drawing" or similar function, and select the image type according to your needs, such as "Anime Avatar", "Landscape"

In the Windows 10 system, the password policy is a set of security rules to ensure that the passwords set by users meet certain strength and complexity requirements. If the system prompts that your password does not meet the password policy requirements, it usually means that your password does not meet the requirements set by Microsoft. standards for complexity, length, or character types, so how can this be avoided? Users can directly find the password policy under the local computer policy to perform operations. Let’s take a look below. Solutions that do not comply with password policy specifications: Change the password length: According to the password policy requirements, we can try to increase the length of the password, such as changing the original 6-digit password to 8-digit or longer. Add special characters: Password policies often require special characters such as @, #, $, etc. I

Detailed explanation and installation guide for PiNetwork nodes This article will introduce the PiNetwork ecosystem in detail - Pi nodes, a key role in the PiNetwork ecosystem, and provide complete steps for installation and configuration. After the launch of the PiNetwork blockchain test network, Pi nodes have become an important part of many pioneers actively participating in the testing, preparing for the upcoming main network release. If you don’t know PiNetwork yet, please refer to what is Picoin? What is the price for listing? Pi usage, mining and security analysis. What is PiNetwork? The PiNetwork project started in 2019 and owns its exclusive cryptocurrency Pi Coin. The project aims to create a one that everyone can participate

This article focuses on the latest genuine entrances to Binance’s official website, including Binance Global’s official website, the US official website and the Academy’s official website. In addition, the article also provides detailed access steps, including using a trusted device, entering the correct URL, double-checking the website interface, verifying the website certificate, contacting customer support, etc., to ensure safe and reliable access to the Binance platform.

The search accuracy of DeepSeek depends on the way of asking questions. To achieve ideal results, the question should contain the following key elements: Clear topic: Specific specified information objectives. Specific angles: Cut into the topic from a specific perspective. Expected output form: define the desired result type (summary, analysis, list, etc.).

Make sure to access official website downloads and carefully check the domain name and website design. After downloading, scan the file. Read the protocol during installation and avoid the system disk when installing. Test the function and contact customer service to solve the problem. Update the version regularly to ensure the security and stability of the software.

DeepSeek is an efficient data search and analysis tool with an indexing mechanism at its core. Factors that affect their efficiency include: data type, data size, search strategy, and DeepSeek performance. High-quality data, refined search queries and sufficient computing resources are essential to optimize search results.