1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vitek1552 [10]
2 years ago
12

In the processes tab of task manager, the ____ tab displays the âworking setâ of a process, or the amount of memory it is active

ly using.
Computers and Technology
1 answer:
VLD [36.1K]2 years ago
6 0
That would be the "memory" tab, displayed with a percentage.
You might be interested in
What might a programming prefer the top-down approach to programming design?
navik [9.2K]

Top down program design is an approach to program design that starts with the general concept and repeatedly breaks it down into its component parts. In other words, it starts with the abstract and continually subdivides it until it reaches the specific. Consider creating the prime factorization of a number like 1540. The steps involved might look like:

1540

2 x 770

2 x 2 x 385

2 x 2 x 5 x 77

2 x 2 x 5 x 7 x 11

Top down program design works the same way. We start with the overall objective and wind up with a series of steps needed to accomplish it.

3 0
3 years ago
Which command would you use to move a file from one location to another?
Ksivusya [100]
On Windows, if you use CMD, there is a command called 'move' and using a Linux terminal, it's 'mv'
7 0
3 years ago
Read 2 more answers
Which feature of cryptography is used to prove a user's identity and prevent an individual from fraudulently reneging on an acti
Zinaida [17]

A feature of cryptography which is used to prove an end user's identity and prevent an individual from fraudulently reneging on an action is nonrepudiation.

<h3>What is nonrepudiation?</h3>

Nonrepudiation can be defined as an assurance that the sender of a message is given a proof of delivery and the recipient of this message is also provided with a proof of the sender’s identity, so none of them can deny having processed this message.

This ultimately implies that, nonrepudiation is a security service which has a feature of cryptography and it can be used to prove an end user's identity and prevent an individual from fraudulently reneging on an action

Read more on nonrepudiation here: brainly.com/question/14631388

#SPJ1

7 0
2 years ago
What is the most commen code used in games?
melamori03 [73]
Uw12e72jeu3j3gd72hd21heys1738he73ue73jdba
3 0
3 years ago
As Juan sat in his biology lab, his instructor was droning on about the techniques of vivisection. Juan kept thinking about the
MaRussiya [10]

Answer:

attending

Explanation:

7 0
3 years ago
Other questions:
  • Software can be distributed on the web. <br> a.true <br> b.false
    12·1 answer
  • How can the Column settings be accessed?
    12·2 answers
  • Describe safe motherhood​
    9·2 answers
  • Provide a few examples of how cryptography actually secures data.
    8·1 answer
  • Write SQL statements for the following: 1. 2. 3. Change the column Z of a table XYZ to now acceptdefault value 9999 Delete a tab
    8·1 answer
  • How do i do a class in java??
    5·1 answer
  • To switch from one open document to another, press _____.
    6·1 answer
  • PLEASE HURRY!!!
    11·1 answer
  • Calvin needs to design a simple yet professional interface for his users. Which option should he implement?
    9·2 answers
  • Instructions
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!