1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
elena-s [515]
4 years ago
7

Your computer is slowing down because you’ve started a process that is taking most of the memory and CPU resources. Which of the

following commands enables you to find the process id so you can stop that process?
ps
df
du
free
Computers and Technology
1 answer:
photoshop1234 [79]4 years ago
6 0

Answer:

ps is the command that enables you to find the process id so that you can stop that process. In fact, ps is an abbreviation of "Process Status".

Explanation:

ps is a Unix/Linux command which is commonly used to find information on current running processes in a computer. The process id will be shown in a column named "PID". The other useful information shown by the ps command includes the amount of CPU time in minutes and second that a process has been running ("TIME").

In practice, ps is used along with another Unix command, kill, to identify a target process and stop the process. Firstly, ps command is used to identify the PID of a target process (e.g. the process that consume most of the memory and CPU resources).  It is then followed with fetching the PID to the kill command to stop the process.

You might be interested in
What information most likely presents a security risk on your personal
11111nata11111 [884]

An information which most likely presents a security risk on your personal social networking profile is: personal e-mail address or password.

A social networking profile can be defined as a database that contains information about the social characteristics and some personal details of an individual on social media websites.

Some of the social characteristics and details of an individual that are shared on social media websites include the following:

  • Date of birth.
  • Occupation.
  • Religion.
  • Gender (sex).
  • Location.
  • Friends.

However, you should not share your personal e-mail address or password on any social media websites because with such information your social media account can be accessed by an attacker or a hacker.

In conclusion, personal e-mail address or password is a sensitive information that must never be shared on a social media website in order to avoid compromising the safety or security of your personal social networking profile.

Read more: brainly.com/question/21765376

6 0
2 years ago
Which tags do you use to write the header and items of an ordered list on a web page?
Blababa [14]

Answer:

H1 tag and LI tag

hopefully it will help you

4 0
3 years ago
You recently purchased a new laptop for home. You want to ensure that you are safe from malware. You should install a personal _
german

Answer:

You should install a personal firewall, a program that protects your computer from unauthorized access by blocking certain types of communications.

Explanation:

In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted internal network and untrusted external network, such as the Internet.

8 0
4 years ago
Ms office suite comes with its own set of pictures in the​
goldfiish [28.3K]

Answer:

clipart ...........................

Explanation:

clipart is the correct answer for the above question.

6 0
3 years ago
This is for the folks that is rude:
S_A_V [24]
This isn’t twitter but anyways the answer is 29
8 0
4 years ago
Other questions:
  • Which sentence in the passage conveys the message that drones can be used in the study of history?
    11·2 answers
  • Which is a good guideline to follow for adding animation to a presentation?
    12·1 answer
  • Payroll deductions are the same for all employees. True False
    12·1 answer
  • A computer scientist creates an app that tells you a funny joke each time you touch the Joke button.
    15·1 answer
  • A pre-design document you can use to create a new project quickly
    5·1 answer
  • When an instruction is sent to the CPU in a binary pattern, how does the CPU know what instruction the pattern means
    7·1 answer
  • And tags are examples of stand - alone tags.
    15·1 answer
  • Which of the following HTML codes is correct for an ordered list?
    6·1 answer
  • Which statement best describes network security?
    7·1 answer
  • The pci express version 4.0 can provide up to what amount of throughput with 16 lanes for data?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!