1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olganol [36]
3 years ago
10

What cannot be performed using windows task manager

Computers and Technology
1 answer:
steposvetlana [31]3 years ago
3 0

Answer:

Window task manager cannot perform the following task:

1. It cannot Delete a program from hard disk.

2. It cannot view these application that are running at back ground.

3. It cannot recheck CPU usage

4. It cannot safe it self by virus.`

You might be interested in
Which of the following is not a property of a constructor?A. The name of a constructor can be chosen by the programmerB. A const
inna [77]

Answer:

The answer is "Option A"

Explanation:

The constructor is a special member function whose task is to initialize an object from its class, and it doesn't return any value like int, float, double, etc. Its name and class name will always be the same, and when we create the class object so, the constructor is automatically called, and it may be overloaded, that's why we can say that except the "choice A", all were correct.

4 0
3 years ago
Enter function in cell I6 that determines average salary of all full time employees with at least one dependent
Ostrovityanka [42]

Answer:

Throughout the below segment, the solution to the given question is provided.

Explanation:

  • The CELL formulas include context justification quantities or properties as well as return failures when evaluated using such a separate Excel dominant language.
  • This same CELL function returns configuration, positioning, or specific cell data or documentation relating.

<u>The formula is provided below</u>:

⇒  In \ I6 \ cell \ use =AVERAGEIF(B4:B34,"FT",D5:D34)

5 0
3 years ago
Jane wishes to forward X-Windows traffic to a remote host as well as POP3 traffic. She is worried that adversaries might be moni
chubhunter [2.5K]

Answer:

She can the following tool to protect the link:

Secure Socket Shell

Explanation:

Secure Socket Shell:

It is also known as secure shell and has short form SSH. A method that is used to secure the communication over the unprotected network. This network protocol was introduced in 1995 and its most common use include the managing of different systems as the network administrator can execute different commands remotely.

In our question, Jane can use Secure socket shell in order to communicate the information to the remote end without being monitored by the adversaries.

8 0
4 years ago
Name an analog quantity other than temperature and sound
liq [111]
I know that this might be wrong but is it light?
6 0
4 years ago
Which option is used in order to configure switchboards for a complex database?
Ostrovityanka [42]

Answer:

switch board manager

Explanation:

8 0
3 years ago
Read 2 more answers
Other questions:
  • Prompt the user to input an integer, a double, a character, and a string, storing each into separate variables. Then, output tho
    9·1 answer
  • Which description best describes how mass spectroscopy is useful in the field of forensic toxicology
    6·1 answer
  • If it malfunctions and I can throw it, then it's a hardware problem; if I have to yell at it because there is nothing to pick up
    14·2 answers
  • Develop Java methods to perform the following operations on an unordered list (using linked lists). What is the complexity of ea
    15·1 answer
  • Is open office compatible will all web browsers without requiring a plug in?
    8·1 answer
  • The ____ option must be used when running a program in order to see the results of assert statements.
    7·1 answer
  • Explain why you will do these particular things when driving.
    11·1 answer
  • What are the procedures use in installing a sound card
    12·1 answer
  • PLSS HELP ASAP ILL GIVE BRAINLIEST THANKS
    15·2 answers
  • 5.9.5 Fibonacci <br><br> Y’all I’m struggling here do any of you have the code?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!