Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

A Quick Introduction to the Drives in Microsoft Windows

A Quick Introduction to the Drives in Microsoft Windows

Windows is, for the most part, the default operating system you can expect to see in a business setting. That said, some owners have never used a Windows computer before, instead using a simple Chromebook or a Mac. Still, it’s good to know how Windows works, especially since it seems there’s a significant gap in knowledge.

Today, we’re exploring how the different drives on Windows PCs work so you can make better use of your workplace tools.

For more information regarding the Windows OS, make sure you check out the rest of our “Learning Windows” blog articles.

Locate and Manage Your Drives

Windows 11’s drives can be found through the File Explorer. Open it up with the Windows Key + E shortcut. From here, you’ll see all connected drives in My PC. Here are the most likely drives you’ll see:

  • The C: Drive - This is the primary drive that hosts the operating system and most software you’ll use.
  • Additional Drivers and Partitions - Other drives and partitions (segmented portions of your existing drives) will be lettered alphabetically. They’ll be listed starting with C: since A: and B: are reserved for removable media that aren’t used often these days. Most business networks will have a network drive that is centrally located on the network rather than installed into the computer itself.
  • The Optical Drive - This is the drive that lets your PC read discs and other similar media. It will usually be the last drive listed.
  • External Drives - These drives are listed in the File Explorer when you connect them to the computer.

To explain it in different terms, you can think of the File Explorer as the Windows version of Finder. You can also create new folders and move files without too much trouble.

Good News: You Can Add More Storage

The thing about Macbooks is that you usually can’t add additional drives. While you might be able to swap one out for larger storage, or connect an external hard device, you simply can’t add more internal drives to certain Mac models.

Windows makes it easy to add as many drives as your motherboard is compatible with, or as many as the case can hold. If you have more ports, you can connect more drives. The form factor does play into this, though, and you want to make sure the hard drives match your PC hardware.

We Can Help You Manage Storage Options

There are other options available for data storage on your PC, including local storage on servers, cloud options, and so on. It doesn’t matter what your business needs—we’ve got you covered.

To learn more about data storage options, call Voyage Technology at 800.618.9844.

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Internet Hardware Efficiency IT Support Malware Privacy Google Phishing Email Computer Workplace Tips IT Services Users Hosted Solutions Collaboration Mobile Device Workplace Strategy Ransomware Quick Tips Microsoft Cybersecurity Small Business Passwords Data Backup Communication Smartphone Backup Saving Money VoIP Smartphones Android Business Management Mobile Devices communications Managed Service Upgrade Disaster Recovery Browser Data Recovery Social Media Managed IT Services Microsoft Office Windows Network Remote Tech Term Current Events Internet of Things Productivity Automation Artificial Intelligence Facebook Gadgets Cloud Computing Covid-19 AI Remote Work Server Managed Service Provider Miscellaneous Information Holiday Outsourced IT Spam Encryption Employee/Employer Relationship Office Training Windows 10 Compliance Government Data Management Business Continuity Blockchain Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Apps Data Security Mobile Office Two-factor Authentication Employer-Employee Relationship App BYOD Vendor Mobile Device Management Gmail Chrome Managed Services Voice over Internet Protocol Budget Apple Networking How To BDR Hacker Computing Applications Avoiding Downtime Information Technology Marketing Access Control Office 365 IT Support Tip of the week Conferencing WiFi Computers Operating System HIPAA Router Virtual Private Network Risk Management Website Health Help Desk Analytics Office Tips Augmented Reality Retail Storage Password Healthcare Bring Your Own Device Big Data Managed IT Services Cooperation Free Resource Project Management Windows 7 Going Green Patch Management Save Money Microsoft 365 Remote Monitoring Customer Service Vulnerability End of Support Vendor Management Solutions Cybercrime Physical Security Display Printer Paperless Office Infrastructure Monitoring Windows 11 Firewall 2FA Document Management Excel Remote Workers The Internet of Things Telephone Scam Data loss Social Data Privacy Images 101 Customer Relationship Management Telephone System Multi-Factor Authentication Robot Mobility Cost Management Settings Hacking Printing Wireless Content Filtering Presentation IT Management VPN Employees YouTube Meetings Integration Wireless Technology Cryptocurrency User Tip Modem Computer Repair Mobile Security Processor Virtual Desktop Holidays LiFi Word Data storage Data Storage Smart Technology Video Conferencing Outlook Machine Learning Managed Services Provider Supply Chain Professional Services Money Saving Time Virtual Machines Humor Safety Managed IT Service Maintenance Antivirus Sports Downloads iPhone Mouse Licensing Vulnerabilities Entertainment Administration Best Practice Trends Supply Chain Management Alert IBM Human Resources Cables Managed IT Customer Resource management FinTech Buisness File Sharing Regulations Dark Data Google Calendar Term How To Microsoft Excel Legal Data Analysis IT solutions Star Wars IT Assessment Business Growth Gamification Flexibility Notifications Staff Value Google Apps IT Maintenance Organization Travel Social Networking Legislation Cortana Competition Business Intelligence Techology Fileless Malware Digital Security Cameras Google Maps Smart Devices Alt Codes Content Remote Working Wearable Technology Memory Shortcuts Ransmoware Health IT Downtime Unified Threat Management Motherboard Data Breach Comparison Google Play Permissions Vendors Unified Threat Management Directions Videos Hosted Solution Assessment Electronic Health Records Typing Wasting Time User Be Proactive Workforce Trend Micro Network Congestion Specifications Security Cameras Knowledge Fraud Threats Google Drive User Error Microchip Internet Exlporer Software as a Service Username Managing Costs IP Address Workplace Strategies Meta Point of Sale eCommerce 5G Black Friday SSID Experience Virtual Assistant Amazon Google Docs Unified Communications Database Surveillance Bitcoin Network Management Running Cable Tech Support IT Technicians Virtual Machine Recovery Hard Drives Outsource IT Google Wallet Proxy Server Reviews Cookies Monitors Cyber Monday Medical IT Tactics Development Hotspot Transportation Domains Environment Media Windows 8 Laptop Websites Mirgation Hypervisor PowerPoint Refrigeration Small Businesses Drones Shopping Nanotechnology Optimization Addiction Electronic Medical Records Language Employer/Employee Relationships Public Speaking Displays SharePoint Management PCI DSS Halloween Chatbots Lithium-ion battery Navigation Writing Distributed Denial of Service Outsourcing Entrepreneur Lenovo Gig Economy Screen Reader Service Level Agreement Internet Service Provider Virtual Reality Computing Infrastructure Teamwork Hacks Server Management Regulations Compliance Scary Stories Private Cloud Identity Evernote Workplace Fun Undo Hiring/Firing Superfish Bookmark Identity Theft Smart Tech Memes Deep Learning Download Net Neutrality Twitter Alerts SQL Server Paperless Financial Data Error History Co-managed IT Social Engineering Break Fix Technology Care Browsers Smartwatch Education Connectivity IT Upload Procurement Remote Computing Azure Business Communications Scams Mobile Computing Social Network Telework Cyber security Multi-Factor Security Tech Application Search Dark Web Hybrid Work CES Tablet IoT Communitications

Blog Archive