pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Disk Defragmenting with Task Scheduler in Windows XP for Computer Maintenance

Scheduling Disk Defragmentation is a little different, inasmuch as it doesn’t appear in the default list of software displayed by the the Scheduled Task Wizard.

Browse

In this case you need to click Browse and locate the program in the Windows/system32 folder.

Select the frequency …

Time

… the time at which you want the software to be run …

Password

… and your username/password, as before.

Scheduled

Click Finish.

Finish Select

Select the defrag.exe file and click Open.

Frequency

Note that for a user to be allowed to schedule a task, it is necessary for their associated user account to have a password. If this isn’t the case, the error condition 0x80070005 will result.

No

See the HOW TO CREATE AND CONFIGURE USER ACCOUNTS tutorial for instructions on how to specify or change a password for an existing user account.

Relevant Microsoft Knowledge Base Articles:

  • 178706: How to Schedule a Program Using Task Scheduler
  • 315246: How to Automate the Disk Cleanup Tool in Windows XP
  • 555098: How to Automate Disk Defragmenter Using Task Scheduler Tool in Windows XP
  • Scheduling Tasks Cleanup
  • Disk Defragmenting with Task Scheduler in Windows XP for Computer Maintenance

Filed Under: How to Schedule A Program Using Task Scheduler Tagged With: automatic disk defrag, schedule disk defragmentation, task schedule disk defragmenter

Latest Articles

Cable Modems – for cable Internet connections

Cable modems offer the prospect of fast and affordable Internet access by leveraging existing broadband cable TV networks. The technology is more applicable to home than business users since it is residential areas that are more likely to be wired for cable. The devices, manufactured by such … [Read More...]

VBA Macro that Counts the Number of Files in a Folder

You may want to count the number of PNG files in a folder. This is pretty easy if you only have one folder. You just have to right-click the folder and then click the "Properties" attribute. However, this can be a pain if you have a lot of folders, because you need to do this process for every one … [Read More...]

WaveTable Synthesis

WaveTable doesn't use carriers and modulators to create sound, but actual samples of real instruments. A sample is a digital representation of a waveform produced by an instrument. ISA-based cards generally store samples … [Read More...]

Top Taplio Alternatives in 2025 : Why MagicPost Leads for LinkedIn Posting ?

LinkedIn has become a strong platform for professionals, creators, and businesses to establish authority, grow networks, and elicit engagement. Simple … [Read More...]

Shocking Cybercrime Statistics for 2025

People all over the world are becoming more concerned about cybercrime than ever. We have recently collected some statistics on this topic and … [Read More...]

Gaming Laptop Security Guide: Protecting Your High-End Hardware Investment in 2025

Since Jacob took over PC Tech Guide, we’ve looked at how tech intersects with personal well-being and digital safety. Gaming laptops are now … [Read More...]

20 Cool Creative Commons Photographs About the Future of AI

AI technology is starting to have a huge impact on our lives. The market value for AI is estimated to have been worth $279.22 billion in 2024 and it … [Read More...]

13 Impressive Stats on the Future of AI

AI technology is starting to become much more important in our everyday lives. Many businesses are using it as well. While he has created a lot of … [Read More...]

Graphic Designers on Reddit Share their Views of AI

There are clearly a lot of positive things about AI. However, it is not a good thing for everyone. One of the things that many people are worried … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Using Sudo for Super User Access to Root Privileges in Linux

The Linux super user, or root user, is a special user that has tremendous power, with the ability to access and modify all files on the operating … [Read More...]

Browser Hijacker– Sweet Page

Classified as adware, Sweet Page is also popularly known as the browser hijacker. This adware is bundled with free programs that can be availed by the … [Read More...]

Basic structure of a Pentium microprocessor

A Pentium processor's major functional components are: Core: The heart of a Pentium is the execution unit. The Pentium has two parallel integer … [Read More...]

[footer_backtotop]

Copyright © 2026 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors