1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlad1618 [11]
3 years ago
7

Using Task Manager, you discover an unwanted program that is launched at startup. Of the following items, which ones might lead

you to the permanent solution to the problem? Which ones would not be an appropriate solution to the problem? Explain why they are not appropriate.
a. Look at the registry key that launched the program to help determine where in Windows the program was initiated.
b. Use Task Manager to disable the program.
c. Search Task Scheduler for the source of the program being launched.
d. Use Msconfig to disable the program.
e. Search the startup folders for the source of the program.
Computers and Technology
1 answer:
Harrizon [31]3 years ago
7 0

Answer: Option (a) ,(c) and (e) can become a solution for the problem.

               Option(b) and (d) are not exactly a solution to the issue rather can    be considered on temporary basis

 

Explanation: Windows Task Manager is used for processing task taking place in the system and monitors the performance of that task or program that is running.To stop the unnecessary program execution on the system. methods like searching the source of the program from Task scheduler, startup files or registry key that initiated the execution that unwanted task.

Methods like disabling the program by using Msconfig and Task manager will only deactivate them but they are not eliminated from the source .Thus the appropriate answers would be option(a), (c) and (e).

You might be interested in
What is the difference between front-end and back-end?
IgorLugansk [536]

Front-end the part with which the user interacts.

usually people who write this are called layout designers what languages ​​are used (Html, css, js)

Beck-end The northern part is the structure of the site due to which it works, this includes the DBMS, logic, etc. which languages ​​will be used(python, php, java)

People who can do both are called: full stack developr

3 0
3 years ago
After adding text to a shape, a user can make the text bold and change its color using options in the
lozanna [386]

Answer:

Top area of Word, the second segment.

Explanation:

To make it bold, press the "B" button and to change the colour press the "A" underlined with a colour (normally red).

6 0
3 years ago
What is the LER for a rectangular wing with a span of 0.225m and a chord of 0.045m
ch4aika [34]

Calculate LER for a rectangular wing with a span of 0.225m and a chord of 0.045m. The weight of the glider is 0.0500 Newtons. (Note: the wing span is the width of the wing and is measured from wing tip to wing tip, or perpendicular to the fuselage. The wing chord is the length of the wing measured parallel or along the length of the fuselage.)

Answer:

Area of rectangular wing = span × chord = 0.225×0.045= 0.010125m2

LER = Area/weight = 0.010125/0.0500 = 0.2025

4 0
3 years ago
How can ICTs be used in the workplace to improve the way employees
nadezda [96]

Answer:

it allows them to work more efficiently, with fewer waisted resources

Explanation:

3 0
3 years ago
A display that is thin flexible, light, and easy to read in all types of light is an
Nuetrik [128]

Answer; Electric Paper Display

Explanation:

<em>"PDs are extremely thin and only require power when a new image is requested. Instead of a traditional display that uses backlighting to illuminate pixels, an EPD is based on the scientific phenomena known as "electrophoresis," the movement of electrically charged molecules in an electric field."</em>

Above is the definition, as you can see it resembles your question greatly so this is most likely the answer you're looking for.

Good luck :D

8 0
3 years ago
Read 2 more answers
Other questions:
  • Exposing employee and customer personal data to an untrusted environment is an example of:
    9·1 answer
  • List 3 ways that you can use excel and the features it includes and explain why a spreadsheet is the best choice for this task.
    5·1 answer
  • 8 POINTS!!!!!!!!
    6·2 answers
  • In this story, the reader is strongly encouraged to believe that Skidmore is guilty of poisoning his brother Manchester. Explain
    6·1 answer
  • After a new technology is purchased,what are some additional costs that must be incorporated into an upgrade budget?
    6·1 answer
  • . What is automated testing?
    10·1 answer
  • Which of the following variable names is not valid? 1price 1 price price 1 price1
    15·2 answers
  • Which of the following sets of acronyms is concerned with encoding data for secure transmission?
    11·1 answer
  • company gives the following discount if you purchase a large amount of supply. Units Bought Discount 10 - 19 20% 20 - 49 30% 50
    13·1 answer
  • write a function that takes two integer arrays as input return true if any two of the numbers in the first array input add up to
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!