Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Quick Introduction to the Drives in Microsoft Windows

A Quick Introduction to the Drives in Microsoft Windows

Windows is, for the most part, the default operating system you can expect to see in a business setting. That said, some owners have never used a Windows computer before, instead using a simple Chromebook or a Mac. Still, it’s good to know how Windows works, especially since it seems there’s a significant gap in knowledge.

Today, we’re exploring how the different drives on Windows PCs work so you can make better use of your workplace tools.

For more information regarding the Windows OS, make sure you check out the rest of our “Learning Windows” blog articles.

Locate and Manage Your Drives

Windows 11’s drives can be found through the File Explorer. Open it up with the Windows Key + E shortcut. From here, you’ll see all connected drives in My PC. Here are the most likely drives you’ll see:

  • The C: Drive - This is the primary drive that hosts the operating system and most software you’ll use.
  • Additional Drivers and Partitions - Other drives and partitions (segmented portions of your existing drives) will be lettered alphabetically. They’ll be listed starting with C: since A: and B: are reserved for removable media that aren’t used often these days. Most business networks will have a network drive that is centrally located on the network rather than installed into the computer itself.
  • The Optical Drive - This is the drive that lets your PC read discs and other similar media. It will usually be the last drive listed.
  • External Drives - These drives are listed in the File Explorer when you connect them to the computer.

To explain it in different terms, you can think of the File Explorer as the Windows version of Finder. You can also create new folders and move files without too much trouble.

Good News: You Can Add More Storage

The thing about Macbooks is that you usually can’t add additional drives. While you might be able to swap one out for larger storage, or connect an external hard device, you simply can’t add more internal drives to certain Mac models.

Windows makes it easy to add as many drives as your motherboard is compatible with, or as many as the case can hold. If you have more ports, you can connect more drives. The form factor does play into this, though, and you want to make sure the hard drives match your PC hardware.

We Can Help You Manage Storage Options

There are other options available for data storage on your PC, including local storage on servers, cloud options, and so on. It doesn’t matter what your business needs—we’ve got you covered.

To learn more about data storage options, call Voyage Technology at 800.618.9844.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Efficiency Hardware Internet Malware IT Support Privacy Google Computer Email Workplace Tips Phishing IT Services Collaboration Hosted Solutions Users Mobile Device Workplace Strategy Ransomware Small Business Quick Tips Microsoft Passwords Backup Cybersecurity Saving Money Communication Data Backup Smartphone Managed Service Android Business Management VoIP Smartphones Upgrade Mobile Devices communications Disaster Recovery Data Recovery Productivity Windows Browser Social Media Microsoft Office Managed IT Services Current Events AI Remote Tech Term Network Internet of Things Automation Artificial Intelligence Facebook Covid-19 Gadgets Cloud Computing Holiday Training Server Managed Service Provider Remote Work Miscellaneous Information Outsourced IT Employee/Employer Relationship Compliance Encryption Spam Windows 10 Office Data Management Business Continuity Government Business Technology IT Support Windows 10 Bandwidth Virtualization Blockchain Wi-Fi Two-factor Authentication Mobile Office Data Security Apps Vendor Mobile Device Management Chrome Gmail Budget Managed Services Apple Networking Voice over Internet Protocol App Employer-Employee Relationship BYOD Avoiding Downtime Access Control Marketing Office 365 Tip of the week Conferencing WiFi How To BDR HIPAA Computing Hacker Applications Information Technology Website Health Help Desk Analytics Office Tips Augmented Reality 2FA Retail Storage Password Bring Your Own Device Big Data Managed IT Services Healthcare Operating System Computers Router Virtual Private Network Risk Management Printer Solutions Paperless Office Infrastructure Monitoring Windows 11 Firewall Document Management Excel Telephone The Internet of Things Scam Data loss Remote Workers Social Cooperation Going Green Patch Management Save Money Free Resource Remote Monitoring Vulnerability End of Support Project Management Customer Service Windows 7 Vendor Management Cybercrime Microsoft 365 Physical Security Display Processor Computer Repair Mobile Security Virtual Desktop Employees Data storage Integration LiFi Word Smart Technology Outlook Machine Learning Holidays Money Saving Time Humor Data Storage Supply Chain Managed IT Service Video Conferencing Safety Maintenance Sports Downloads Managed Services Provider Antivirus Virtual Machines Mouse Professional Services Licensing Entertainment Administration iPhone Robot Telephone System Customer Relationship Management Vulnerabilities Cost Management Data Privacy Settings Printing Wireless Content Filtering Images 101 Hacking IT Management Presentation VPN Mobility YouTube Meetings Multi-Factor Authentication Cryptocurrency Wireless Technology User Tip Modem Videos Electronic Health Records IP Address Google Docs Workforce Unified Communications Database Experience Running Cable Tech Support IT Technicians Wasting Time Threats Bitcoin Network Management Trend Micro Google Wallet Proxy Server Security Cameras Workplace Strategies Cookies Monitors Cyber Monday Software as a Service Meta Recovery Tactics Hotspot Laptop Websites Mirgation Managing Costs Amazon Hard Drives Windows 8 eCommerce Domains Drones SSID Nanotechnology Surveillance SharePoint Virtual Assistant Outsource IT Addiction Electronic Medical Records Language Media Halloween Chatbots Virtual Machine Environment Refrigeration Management Public Speaking Lenovo Medical IT Screen Reader Writing Distributed Denial of Service Reviews Development Lithium-ion battery Transportation Small Businesses Service Level Agreement Virtual Reality Computing Infrastructure Entrepreneur Scary Stories Private Cloud Identity Hypervisor Displays Hacks Server Management Optimization Superfish Bookmark PowerPoint Identity Theft Smart Tech Fun Shopping Employer/Employee Relationships Outsourcing Deep Learning Download Twitter Alerts Navigation Error PCI DSS Undo Browsers Workplace Education Connectivity Social Engineering Break Fix Gig Economy Internet Service Provider Teamwork Hiring/Firing Upload Remote Computing Evernote Paperless Multi-Factor Security Regulations Compliance Mobile Computing Social Network Memes Co-managed IT Tablet IoT Search Dark Web Net Neutrality SQL Server Technology Care Application Best Practice Trends Alert Business Communications Buisness File Sharing Regulations Dark Data Google Calendar Financial Data History Managed IT Customer Resource management IT IBM Legal Data Analysis Scams IT solutions Star Wars How To Microsoft Excel Smartwatch Procurement Azure Hybrid Work Business Growth Gamification Notifications Staff Tech Human Resources Travel Social Networking Legislation Telework Cyber security Communitications Techology Fileless Malware Cables Google Maps Cortana CES Supply Chain Management Alt Codes Content Wearable Technology Health IT Term Google Apps Downtime Unified Threat Management Motherboard Comparison FinTech Competition IT Assessment Unified Threat Management Directions IT Maintenance Hosted Solution Assessment Permissions Flexibility Value Business Intelligence Typing Shortcuts Network Congestion Specifications Organization Smart Devices Google Drive User Error Microchip Ransmoware User Internet Exlporer Knowledge Fraud Digital Security Cameras Remote Working Memory Vendors Username Google Play Be Proactive Point of Sale 5G Black Friday Data Breach

Blog Archive