Answer:
Depending on what operating system you have my best choice would be D since on some folders you can share permissions with other people. It really depends on what computer you're talking about.
Answer:
The operations that can be carried out using process explorer include but are not limited to:
Explanation:
- Killing a Process Tree
- Ending or terminating a process
- Suspending a process
- Examining which process has locked a file
- Manually detecting a virus
- Unhiding a process. This can help to callup the window for a process that is not visible under normal explorer activities
- Monitor CPU usage
- setting the priority of a process
- changing a service process's access security
- Monitoring Graphics Processing Unit
Cheers
Answer:
a. Objectivity
Explanation:
Zeke ignored objectivity as a criteria for evaluating Web sources.
USE SOCRACTIC IT WOULD REALLY HELP WITH QUESTIONS LIKE THIS
Answer: Option B. System logs
Explanation:
A system log contains records of events that are logged by the operating system components. These events are often predetermined by the operating system itself and they indicates how the system processes and drivers were loaded. System log files may contain information about device changes, device drivers, system changes, events, operations and more.