1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vitfil [10]
3 years ago
14

Which task manager tab provides details about how a program uses system resources?

Computers and Technology
1 answer:
almond37 [142]3 years ago
8 0
It will be the performance tab.
You might be interested in
Danielle is analyzing logs and baselines of the systems and services that she is responsible for in her organization. She wants
GalinKa [24]

Answer:

b. Machine learning

Explanation:

The technique that is being described in this situation is known as Machine Learning. This is a fairly new technology that has become popular over the last decade. Machine learning uses artificial intelligence to analyze data and learn from it. Every time the system analyzes the data it learns something new, saves it, and implements it to its processes. Therefore, the more times it repeats the more it learns. These systems are continuously getting better and learning more, which makes them incredibly efficient.

5 0
3 years ago
Write a program that reads a list of integers into a vector, and outputs the two smallest integers in the list, in ascending ord
AnnyKZ [126]

Answer:

In C++:

#include <bits/stdc++.h>

#include <iostream>

#include <vector>

using namespace std;

int main(){

vector<int> vectItems;

cout << "Vector length: ";

int ln; cin>>ln;

int num;

for (int ikk = 0; ikk < ln; ikk++){

 cin >> num;

 vectItems.push_back(num);}

int small, secsmall;

small = secsmall = INT_MAX;  

for (int ikk = 0; ikk < ln; ikk++){

 if(vectItems[ikk] < small){

     secsmall = small;  

           small = vectItems[ikk];   }

 else if (vectItems[ikk] < secsmall && vectItems[ikk] != small) {

           secsmall = vectItems[ikk];} }

 cout<<small<<" "<<secsmall;

 return 0;}

Explanation:

See attachment for program file where comments are used for explanation

Download cpp
8 0
3 years ago
Which implementation uses both the legacy system and new system until all users verify that the new system functions correctly?
olasank [31]

Answer:

Explanation:

One group of students did an experiment to study the movement of ocean water. The steps of the experiment are listed below.

Fill a rectangular baking glass dish with water.

Place a plastic bag with ice in the water near the left edge of the dish.

Place a lighted lamp near the left edge of the dish so that its light falls directly on the plastic bag.

Put a few drops of ink in the water.

The student did not observe any circulation of ink in the water as expected because the experiment had a flaw. Which of these statements best describes the flaw in the experiment? (2 points)

Not enough ink was added.

Not enough water was taken.

The dish was too small for the experiment.

The lamp and the ice bag were at the same place.

3 0
3 years ago
Tara is a recent computer science graduate. After completing a three-month internship at an IT firm, she decides to become a tes
KengaRu [80]

Answer:

Explanation:

A tester has to evaluate, test and find errors, in this job you have to provide all the analysis and improve the software.

A tester has to evaluate:

  • Interact with buttons
  • Enter data
  • design for multiple situations

A tester must have these abilities:

  • The ability to work calmly under pressure.
  • Organizational capacity .
  • Logical thinking.
  • Ability to plan future work.
  • Pay attention to the details.

7 0
3 years ago
The two internal networks are using the same internal network. Does this work? Why or Why not?
lana [24]

Answer:yes

Explanation:

They are the same network

3 0
3 years ago
Other questions:
  • Why can't you test a program for run-time errors when it has compile-time (syntax) errors
    6·1 answer
  • 8. A pattern of being late for work or for appointments is usually
    12·1 answer
  • Voice and fingerprint _______ can significantly improve the security of physical devices and provide stronger authentication for
    14·1 answer
  • When you open a program, the hard drive___
    6·1 answer
  • Which can be used to decode a Unicode character encoding into text?
    13·1 answer
  • Tell me the most scariest website you know and i'll give you brainlest
    5·1 answer
  • Which feature allows you to copy attributes of
    11·1 answer
  • You are developing a Website that is going to be viewed extensively on smartphones and tablets. Which of the following should yo
    7·1 answer
  • What data type or you use to represent true or false values?
    13·1 answer
  • Which of the following is not an Error Style for data validation?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!