1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nata [24]
3 years ago
6

You are having trouble closing a program. You have tried to hit the Close button, the keyboard shortcut to close the program, an

d closing it from the taskbar. Before shutting down your computer, what other troubleshooting steps could you try?
Computers and Technology
1 answer:
vladimir2022 [97]3 years ago
4 0

Answer:

You can open the version of your computer or device from the task manager to see the running programs and close the application

Explanation:

Right-click on the Windows Start menu and choose Task Manager (another way to open it is to press the keyboard shortcut Ctrl + Alt + Delete and select it from the options that appear).

NOTE: Click here if you don't know how to display Windows 8 Start.

You will see the main Administrator window (as in the image above). Displays a list of the programs that are currently running.

Find the application or process you want to close. Click on it with the RIGHT button and choose End task. In some cases a notice appears asking you to confirm it. Read what it says to know the consequences of forcing it. Confirm if you are determined to do so.

IMPORTANT:

There are viruses, adware or other spam programs that you may not be able to close even in this way. For these cases follow this link on how to clean viruses without entering Windows.

When you're done you can exit the Task Manager window. Click here to close background applications.

Estos pasos sirven para forzar que se cierren programas que no responden en Windows 10, 8 u 8.1. Enlazan además a instrucciones para cerrar programas o aplicaciones

You might be interested in
My 2 in 1 laptop/tablet
katovenus [111]

"My 2 in 1 laptop/tablet  goes black and does this weird glitching thing..."

2-in-1 has a bunch of connections bet the keyboard n screen. its weaker than a laptop cuz' the keyboard is detachable. bad news if u have a flaky connection there.

if its brand new or under warranty, i wuld send it back. good luck!


8 0
3 years ago
A user found that their personal data had been exfiltrated from their computer by a malicious program that they clicked on sever
Firlakuza [10]

Answer:

Assuming this can only have one answer, i believe adware is very far from the type of malware that did infect the system, Spyware.

Explanation:

8 0
3 years ago
An advertisement for new headphones lists the cool colors available, the great sound quality, and the fabulous reviews but fails
Mama L [17]

d transfer

ive seen the ad

7 0
3 years ago
Question 8 of 25
denis23 [38]

Answer:

D to Protect sensitive data, Enterprise has certain security features and is mostly used in business settings.

5 0
2 years ago
What is computer and its features<br>​
dlinn [17]

Answer:

A computer is a machine that can be programmed to manipulate symbols.

Explanation:

Following are the features of PC (computer)

Processor  

speed  

reliability  

accuracy  

automation  

diligence  

consistency    

Random access memory (RAM)  

Operating system  

Graphics adapter and video RAM  

Monitor

3 0
3 years ago
Read 2 more answers
Other questions:
  • What are issues to consider when deciding to build software in-house or purchase commercial off-the-shelf software (cots)?
    14·1 answer
  • What type of diagram will you find nodes?
    15·1 answer
  • San Diego broker Cal Abrams has avoided the technological trend of the past 20 years. Finally, he's jumped online and realized w
    14·1 answer
  • . Describe a way to simplify a complex problem.
    8·1 answer
  • In our discussion of Computer Hardware, we talked about three essential hardware components that are there inside every computer
    14·1 answer
  • After separating from Mexico, Texas passed laws that made it harder for slave owners to _____________ slaves.
    12·2 answers
  • An IT suspects that an unauthorized device is connected to a wireless network. This is a result of passkey sharing on a device b
    14·1 answer
  • The capability of moving a completed programming solution easily from one type of computer to another is known as ________. Grou
    15·1 answer
  • Hi am feeling really happy just passed a test after a lot of tries :-)
    5·1 answer
  • Which backup requires a small amount of space and is considered to have an involved restoration process?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!