1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ugo [173]
3 years ago
15

Using Task Manager, you discover an unwanted program that is launched at startup. Of the items listed below, which ones might le

ad you to the permanent solution to the problem? Which ones would not be an appropriate solution to the problem? Explain why they are not appropriate.
a.Look at the registry key that launched the program to help determine where in Windows the program was initiated.
b.Use Task Manager to disable the program.
c.Search Task Scheduler for the source of the program being launched.
d.Use System Configuration to disable the program.
e.Search the startup folders for the source of the program.
Computers and Technology
1 answer:
sweet-ann [11.9K]3 years ago
8 0

Answer: A) - E)

Explanation: <em>A and E might be the most helpful options to your question.</em>

You might be interested in
What type of database contains multiple collections of data that are related to one another cells
statuscvo [17]
The different types<span> of </span>databases<span> include operational </span>databases<span>, end-user </span>databases<span>, distributed </span>databases<span>, analytical </span>databases<span>, relational </span>databases<span>, hierarchical </span>databases<span> and </span>database<span> models. 

Source Bing</span>
7 0
3 years ago
Can someone answer these 2 please
Leto [7]

Answer:

c for the first one and d for the secound one

Explanation:

5 0
2 years ago
Evaluate the arithmetic expression 234 + 567​
Anton [14]

Answer:

801

Explanation:

234 + 567 = 801

6 0
3 years ago
What is a segment
monitta
A length of uninterrupted cable connecting two devices
3 0
3 years ago
A security technician is configuring a new firewall appliance for a production environment. The firewall must support secure web
Zielflug [23.3K]

Answer:

Explanation:

Based on the information provided in the question, the best rules that the technician should add to the firewall would be the following

Permit 10.10.10.0/24 0.0.0.0 -p tcp --dport 443

Permit 10.10.10.0/24 192.168.1.15/24 -p udp --dport 53

This is because port 443 is used for "Secure webs services" while UDP port 53 is used for queries and domain name resolution. Both of which are the main configurations that the security technician needs to obtain.

8 0
3 years ago
Other questions:
  • Write an exception class named InvalidTestScore. Modify the TestScores class you wrote in Part I so that it throws an InvalidTes
    10·1 answer
  • The most common type of local correction system is
    11·1 answer
  • Why does the job market change overtime
    9·1 answer
  • From the following list choose all the tasks an operating system performs.
    5·2 answers
  • 2. What is a cap? (0.5 points)
    9·1 answer
  • An ____ is a collection of tools, features, and interfaces that enables users to add, update, manage, access, and analyze the co
    10·1 answer
  • What of the following is not a benefit of active listening
    8·2 answers
  • in the world of computing accessibilty most often refers to: a how quickly software opens , b password protection, c assistance
    6·1 answer
  • Hey yall wanna send me some just ask for my phone #
    13·1 answer
  • Help pweeze this is due today :(<br><br> I will give u brainliest just pweeze, I need this answer :(
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!