1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
chubhunter [2.5K]
2 years ago
8

You have an application that renders videos for your online business. You want to make sure that the application continues to re

ceive adequate attention from the system CPU, even if you open other applications. How can you adjust the amount of attention given to that application
Computers and Technology
1 answer:
olga2289 [7]2 years ago
5 0

Step 1 :- Open the Task Manager.

Step 2 :- Find the task of the required app.

Step 3 :- Right click on the video renderer task and select "Set Priority" and set it to High or Medium as required.

This is how we can adjust the amount of attention given to that application.

You might be interested in
Positive and negative points of Computer and Information Systems Managers
belka [17]

Answer:

Well the first advantage is they get paid very well with $115,000 a year in 2015. Which is projected to increase in the next 10 years. Having experience in this career will give you many options for other careers like this. This is not the job you would want if you plan on wanting to work with other people with this job you are a one man job.

Explanation:

6 0
3 years ago
Write a statement that increments (adds 1 to) one and only one of these five variables: reverseDrivers parkedDrivers slowDrivers
MariettaO [177]

Answer:

The c++ coding for this scenario is given below.

if( speed < 0 )

           reverseDrivers = reverseDrivers + 1;

   else if( speed >= 0 && speed < 1 )

           parkedDrivers = parkedDrivers + 1;

   else if( speed >= 1 && speed < 40 )

           slowDrivers = slowDrivers + 1;

   else if( speed >= 40 && speed < 65 )

          safeDrivers = safeDrivers + 1;

   else

     speeders = speeders + 1;

Explanation:

First, five integer variables are declared and initialized.

int reverseDrivers = 0, parkedDrivers = 0, slowDrivers = 0, safeDrivers = 0, speeders = 0;

All the above variables need to be incremented by 1 based on the given condition, hence, these should have some original value.

Another variable speed of data type integer is declared.

int speed;

The variable speed is initialized to any value. User input is not taken for speed since it is not mentioned in the question.

Based on the value of the variable speed, one of the five variables, declared in the beginning, is incremented by 1.

The c++ program to implement the above scenario is as follows.

#include <iostream>

using namespace std;

int main() {

   int reverseDrivers = 0, parkedDrivers = 0, slowDrivers = 0, safeDrivers = 0, speeders = 0;

   int speed = 34;

   

   if( speed < 0 )

   {

       reverseDrivers = reverseDrivers + 1;

       cout<<" reverseDrivers " <<endl;

   }

   else if( speed >= 0 && speed < 1 )

   {

       parkedDrivers = parkedDrivers + 1;

      cout<<" parkedDrivers "<<endl;

   }

   else if( speed >= 1 && speed < 40 )

   {

       slowDrivers = slowDrivers + 1;

      cout<<" slowDrivers "<<endl;

   }

   else if( speed >= 40 && speed < 65 )

   {

       safeDrivers = safeDrivers + 1;

       cout<<" safeDrivers "<<endl;

   }

   else

   {

       speeders = speeders + 1;

       cout<<" speeders "<<endl;

   }

return 0;

}

The program only outputs the variable which is incremented based on the value of the variable speed.

3 0
3 years ago
Which generation is characterized by conspicuous consumption?
yulyashka [42]

Answer:

The is the type of consumption is typically associated with the wealthy but can also apply to any economic class.

Explanation:

7 0
3 years ago
Describe at least two ways social media has impacted cybersecurity.
dybincka [34]

Answer:

Its Providing Too Much Personal Information since you will be using social media to promote your own small business, you need to take extra precautions. For starters, don’t leave a trail of breadcrumbs for social media hackers. Whether you are representing yourself or your company, avoid sharing stuff like your date of birth, places where you have attended school, as well as names and pictures of your family members.

Disgruntled Employees

While it’s fairly normal for your employees to vent about working for your company, in doing so, they may inadvertently reveal more than they should. It’s a lot more common than you think, since 98% of all employees are using at least one social media platform, and as much as 50% of those are talking about their respective companies. Whether they are sharing sensitive info or posting pictures from their workplace, they may end up sharing something that might hurt your business.

Explanation:

7 0
3 years ago
Why would you not restore a Domain Controller that was last backed up twelve months ago
Angelina_Jolie [31]

Answer:

All the data and information that was updated or added since then will be lost so it is useless to restore a Domain Controller that was backedup twelve months ago.

Explanation:

A domain conttoller back-up must be prepared on regular basis else if DC breaks, restoration of most recent database will be impossible.

7 0
3 years ago
Other questions:
  • Assume you have a sorting algorithm that you can use as a black box. Use the sorting algorithm to sort the input list. Now write
    10·1 answer
  • If you select three separate parcels from a parcel feature class, how many rows would be selected in the associated attribute ta
    13·1 answer
  • You are the systems administrator for a scientific research company that employs over 100 scientists who write and run Linux pro
    13·1 answer
  • You can create a negative indent, sometimes called a(n) ________________, by dragging the indent markers on the ruler to the lef
    12·1 answer
  • Which statement is false? Select one: a. A class is to an object as a blueprint is to a house. b. Classes are reusable software
    5·1 answer
  • 21
    5·1 answer
  • Histogram 9AMAA 12/01/2021.
    9·1 answer
  • 4. //Program prompts users for names and quantities for a $2.00 product and displays total for each user until “XXX” is entered
    15·1 answer
  • Which of the following is the safest authentication method?
    13·1 answer
  • Which agency motors the sale and registration of vehicles and vessels within the state
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!