1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vlad1618 [11]
3 years ago
7

Using Task Manager, you discover an unwanted program that is launched at startup. Of the following items, which ones might lead

you to the permanent solution to the problem? Which ones would not be an appropriate solution to the problem? Explain why they are not appropriate.
a. Look at the registry key that launched the program to help determine where in Windows the program was initiated.
b. Use Task Manager to disable the program.
c. Search Task Scheduler for the source of the program being launched.
d. Use Msconfig to disable the program.
e. Search the startup folders for the source of the program.
Computers and Technology
1 answer:
Harrizon [31]3 years ago
7 0

Answer: Option (a) ,(c) and (e) can become a solution for the problem.

               Option(b) and (d) are not exactly a solution to the issue rather can    be considered on temporary basis

 

Explanation: Windows Task Manager is used for processing task taking place in the system and monitors the performance of that task or program that is running.To stop the unnecessary program execution on the system. methods like searching the source of the program from Task scheduler, startup files or registry key that initiated the execution that unwanted task.

Methods like disabling the program by using Msconfig and Task manager will only deactivate them but they are not eliminated from the source .Thus the appropriate answers would be option(a), (c) and (e).

You might be interested in
The ____ allows a core to communicate with other cpu components, such as the memory controller and other cores
Gnoma [55]
The appropriate response is Bus Interface Unit or BIU. The BIU gives different capacities, including era of the memory and I/O addresses for the exchange of information between outside the CPU, and the EU. 
The EU gets program direction codes and information from the BIU, executes these guidelines, and store the outcomes in the general registers. By passing the information back to the BIU, information can likewise be put away in a memory area or kept in touch with a yield gadget. Note that the EU has no association with the framework transports. It gets and yields every one of its information through the BIU.
4 0
4 years ago
PLEASE HELP
vitfil [10]

Answer:

1. I would ask her how big is her house, because when it’s big fiber optic cable is the best choice.

2. I would also ask her how loud is her house, as STP cable would be best choice.

Explanation:

Fiber optic cables have larger bandwidth than conventional metal cables. The amount of information transmitted per unit time using fiber over other transmission media is higher when compared to other alternatives. Power loss is minimal as this aid transmission over a long distance, this is why it is the best for big houses.

STP cables, are known for their better efficiency. But are expensive and hard to install, way stiffer and needs a lot of space.

5 0
3 years ago
BRAINLIEST
Naddik [55]

Answer:

E.  \: blog

8 0
3 years ago
Read 2 more answers
4. Refer to the following code the answer the remaining questions. loop: load r1, r5, 40 ; r1  data_memory[r5 + 40] add r1, r1,
Anni [7]

Answer:

See explaination

Explanation:

Loop Unrolling

Assembly code

loop:

load r1, r5, 40 //r1 = Mem[r5 + 40]

load r6, r5, 36 //r6 = Mem[r5 + 36]

add r7, r6, r2 //r7 = r6 + r2

store r7, r5, 36 //Mem[r5 + 36] = r7

add r1, r1,r2 //r1 = r1 + r2

store r1, r5, 40 //Mem[r5 + 40] = r1

addi r5, r5, -8 //r5 = r5 -8

bne r5, 0, loop //if(r5 != 0)branch to loop

4 0
4 years ago
__________________ is a technique can be beneficial when driving next to parked vehicles or approaching signal lights or interse
NISA [10]

Answer:

Covering the brakeis a technique can be beneficial when driving next to parked vehicles or approaching signal lights or intersections

7 0
3 years ago
Other questions:
  • Due to the shift from host-based networks to microcomputer based networks, more than _____ percent of most organizations' total
    8·1 answer
  • According to the 2010/2011 Computer Crime and Security Survey, ____ is "the most commonly seen attack, with 67.1 percent of resp
    10·1 answer
  • A dendrochronologist interprets:
    10·2 answers
  • Clarisse is setting the white spaces at the edge of her Word document to be 1 inch. She is setting the _____.
    7·1 answer
  • Micah may be able to repeat the last few digits in a phone number even if he was not paying attention. Because this is auditory
    13·1 answer
  • Some request lists might cause the disk scheduler to act the same when the three different algorithms are run. Create a request
    13·1 answer
  • )What item is at the front of the list after these statements are executed?
    8·1 answer
  • What information is used in a communication between two system
    10·1 answer
  • Harry has created a Microsoft Excel workbook that he wants only certain people to be able to open. He should use
    13·1 answer
  • Real life example of hexadecimal and octal decimal “for example in binary light switch”
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!