1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
olganol [36]
3 years ago
10

What cannot be performed using windows task manager

Computers and Technology
1 answer:
steposvetlana [31]3 years ago
3 0

Answer:

Window task manager cannot perform the following task:

1. It cannot Delete a program from hard disk.

2. It cannot view these application that are running at back ground.

3. It cannot recheck CPU usage

4. It cannot safe it self by virus.`

You might be interested in
Following the car in front of you at a closer distance _____.
tiny-mole [99]

Answer:

B. Doesn’t get you to your location faster.

Explanation:

Following the car in front of you at a closer distance doesn’t get you to your location faster.

6 0
3 years ago
Read 2 more answers
________ are viruses that masquerade as useful programs or files. hydras spyware programs worms adware programs trojan horses
Harrizon [31]
Trojan horse is the correct answer
5 0
3 years ago
Prior to the world wide web as we know it today, the internet was chaotic, without any ____.
atroni [7]
Search engines - there was no single way to ask a question
5 0
3 years ago
A. Convert decimal 37 to binary
lisabon 2012 [21]

Answer:

100101

25

5E7

101000011100

Explanation:

4 0
2 years ago
Think of an example in your life where a number could be described as data, information, and knowledge
zhannawk [14.2K]

Answer:

how many event you have been too in the last month (well non during this time but as an example)

Explanation:

4 0
2 years ago
Other questions:
  • Which key removes all data from an active cell with one click
    7·2 answers
  • Steve is proofreading his memo and he notices that he has typed a phrase twice. Steve should _____.
    5·2 answers
  • Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack.
    9·1 answer
  • The bubble sort algorithm sorts using what technique?
    14·1 answer
  • What is the purpose of application software
    12·1 answer
  • Please help me willgive u brainliest​
    14·1 answer
  • Podcasts can only be created by professional organizations
    11·2 answers
  • An object completes one round of circle of radius 7m in 20 sec. Distance travelled after 10 sec is? ​
    12·1 answer
  • How to check the at&t internet speed on my computer
    9·1 answer
  • How many residues separate amino acids that are stabilized by hydrogen bonds in α helices?.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!