1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lana66690 [7]
1 year ago
12

Which tools can help you gather information about the processes running on a windows operating system?

Computers and Technology
2 answers:
Licemer1 [7]1 year ago
6 0

A tool that can help you gather information about the processes running on a windows operating system is known as Microsoft system information (Msinfo32.exe).

<h3>What is an Operating system?</h3>

An Operating system may be defined as a type of computer program that can effectively maintain all sorts of information and application programs in a computer. It regulates computer hardware and software resources and furnishes common services for computer programs.

Window most commonly includes a tool which is known as Microsoft system information (Msinfo32.exe). This tool collects all kinds of information related to your computer and expresses an extensive visualization of your hardware, system components, and software environment, which you can utilize in order to diagnose your computer concerns.

Therefore, Microsoft system information (Msinfo32.exe) is a tool that can help you gather information about the processes running on a windows operating system.

To learn more about Microsoft System information, refer to the link:

brainly.com/question/24643423

#SPJ12

Brrunno [24]1 year ago
3 0

Answer:

Microsoft System Information (Msinfo32.exe)


i think hope it helps

You might be interested in
Read "Penetration Testing – Reconnaissance with NMAP Tool," located within the required readings. In the article, the authors di
steposvetlana [31]

Answer:

Check the explanation

Explanation:

The two tools that are utilized for consideration in cyber attacks are operating systems and computer systems. The operating system Kali Linux 2.6 3.x Mix (64-bi) and windows XP SPO (32-bit).

Penetration testing is a very important technique or procedure in auditing the loopholes and security in a particular operating system. The computer systems are Nmap and VMware. The author posit that VMware is a virtual machines programming that gives a virtual PC the capacity for more than one event or action of the working frameworks to keep cunning one similar server.

Nmap (“Network Mapper”) according to the authors, it is a free and open source utility for system reviewing and security. these tools are used for the purpose of finding an open port and to also gain access while another considers the vulnerabilities of the operating system.

ALL together these tools assist in building the foundation for ethical hacking. Using Nmap allows a hacker to gain access to the system thereby seeing all the flaws to actively peruse that account. All these tools work together for a successful hacking process and procedures.

5 0
3 years ago
How are some businesses capitalizing on social media at the time of someones death
stiv31 [10]
They'll post condolences messages etc which means many people will discover their business if they are looking for posts mentioning the deceased's name on social media. 
7 0
3 years ago
When you need to discipline employees, it is important to discipline different employees differently for the same policy violati
madreJ [45]

Answer: False

Explanation:

Employees should be discipline same way for same policy violations. This will give the employees the impression that no one was cheated or given preferential treatment. Everyone gets same stroke for same offence. The human resources department can't be do away with. They are the ones in charge of employees.

8 0
3 years ago
Which of the following statements is false ^^^^^Please Help^^^^^^
Dvinal [7]
3, I think. I hope that is right!
3 0
3 years ago
What is the procees called when deleting a hard drive securelly
zlopas [31]
The process of securely erasing a hard drive is called wiping :)
8 0
3 years ago
Other questions:
  • A tool that is used to search for and gather data from a page on the internet is called a ?
    11·2 answers
  • What does the proofreading mark "..." mean?
    14·2 answers
  • Here is a Test Code segment:
    13·1 answer
  • Select two netiquette guidelines. In a paragraph of no less than 125 words, explain why these guidelines make professional onlin
    9·1 answer
  • A website's ____ page provides basic information about the individual or organization and includes a navigation bar with links t
    13·1 answer
  • Any1??<br> Write the names of atleast 22 high-level programming languages
    13·1 answer
  • I need a C++ program to ask the user to put in different numbers until zero is pressed then the program counts the numbers that
    10·1 answer
  • PLZZZZZZZZZZZZZZZZZ HELP I WILL GIVE 85 POINTS AND MARK BRAINLIEST
    15·1 answer
  • When LDAP traffic is made secure by using Secure Sockets Layer (SSL) or Transport Layer Security (TLS), what is this process cal
    9·1 answer
  • In cell b12 create a formula using max f7nction to calculate maximum value in B4:B9
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!