1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MaRussiya [10]
3 years ago
10

In addition to telling you which programs are currently running, what other information does the task bar display

Computers and Technology
1 answer:
faust18 [17]3 years ago
6 0

I've got task manager open right now; it shows you

  • Applications
  • Processes
  • Services
  • Performance
  • Networking
  • Users

(In that order)

You might be interested in
An administrator has been working within an organization for over 10 years. He has moved between different IT divisions within t
rodikova [14]

Answer:

User roles and access authorization

(Explanation of this question is given below in the explanation section.

Explanation:

As noted in question that a terminated employee comeback in office and installed some malicious script on a computer that was scheduled to run a logic bomb on the first day of the following month. And, that script will change administrator passwords, delete files, and shut down over 100 servers in the data center.

The following problem can be with that account

  • Unauthorized user access and privileges

The user may be given unauthorized access to system resources. If a user has unauthorized access to system resource then he can modify or destroy the system function easily.

  • The firewall may be disabled to detect the malicious script

The firewall should be enabled to detect such types of attack from unauthorized access to the system

  • Role

May be user role is not defined properly. If role would be defined according to user role then there are very fewer chances in doing unauthorized changes in the system that will result in an unexpected outage.

5 0
4 years ago
While traditionally employers used computers to track ordering and inventory, computers are used now to
AlexFokin [52]

Answer:

The correct answer should be A. automate merchandise ordering and inventorying.

5 0
4 years ago
1.is there a digital way to mark your favorite website in the internet?Expound your thoughts.
charle [14.2K]

Yes, there is a way to mark your favourite website on the internet by adding it to bookmark

Explanation:

No, I didn't find it difficult to create a bookmark.

It was easy you just have to click on the bookmark button

5 0
3 years ago
Computer forensics is practiced _____. A. Only by specially trained government and law-enforcement personnel B. By many organiza
laiz [17]

Answer:

Option B is the correct answer.

<h3>Computer forensics is practiced by many organizations, including public- and private-sector organizations such as hospitals, law enforcement, and businesses. </h3><h3 />

Explanation:

Computer forensics can be defined as a branch of digital forensics that deals with the evidences and and proofs found on all digital storage media such as computers.

It is basically a step for enhancing security bases of communication. Therefore it is mainly used by law-enforcement personnel but it can also be practiced by other institutions for the purpose of self security.

<h3>I hope it will help you!</h3>
4 0
3 years ago
If there are three classes, Shape, Circle and Square, what is the most likely relationship among them?
xz_007 [3.2K]

Answer: B) Shape is a base class, and circle and square are derived classes of Shape.

Explanation:

Shape is a base class because circle and squares are the shapes so these are the derived class of the shape, which is inherited by the shape like circle and square. As, the base class (shape) is the class which are derived from the other classes like circle and square and it facilitates other class which can simplified the code re-usability that is inherited from the base class. Base class is also known as parent class and the super class.  

8 0
4 years ago
Other questions:
  • Laura would like to include additional text that is related to the document but not contained within the document.
    13·2 answers
  • Cleaning the keyboard is the most important part of keeping your computer running at peak performance.
    5·2 answers
  • Why a design that doesn't fail initially fails after some time/use? identify at least 3 such mechanisms?
    9·1 answer
  • Which one of the following provides an authentication mechanism that would be appropriate for pairing with a password to achieve
    13·1 answer
  • Anybody good with Microsoft excel? I need help with this class.
    9·2 answers
  • What does it mean to have an "online presence"? Explain how it can affect a job search?
    11·1 answer
  • PLEASE CLICK THIS VIRUS LINK
    7·1 answer
  • How does the Evaluate Formula dialog box help fix errors?
    9·2 answers
  • Please help i will give you brainlest!!!!!!!!!
    6·1 answer
  • What does l m a o actually mean?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!