1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ExtremeBDS [4]
2 years ago
14

bryce's computer is acting unusually sluggish today he calls you an it techniician to see if you can find out what is going on a

nd to improve his computer's perfermance you can run task manager on bryce's computer and find that a suspicious application has nearly 90% cpu which of the following can be used from task manager to stop the application from running
Computers and Technology
1 answer:
storchak [24]2 years ago
6 0

As an IT technician, I need to understand how to end processes on the process tab of the task manager. Most techies are interested in this tab to determine what process is consuming what resources. Bryce’s computer has a suspicious application that has 90% CPU consumption, and this, as a result, will affect the computer.

  • First on the list of things that I am required to identify the actual application that is causing the surge  on the CPU column,
  • Next I should be able to right click on it, and select End process on Windows 7 or End task on Windows 8 and later. Carrying out this task will noticeably stabilize Bryce’s computer.
  • Finally, I will try to find out whether this application is causing harm to the computer in any possible way. If it is, then I should consider uninstalling it. If it not, I should be able to request Bryce to do an upgrade on his PC in order to handle the application more effectively.

You might be interested in
Gaven's instructor told him to include a personal statement in his work portfolio. Why did his instructor recommend including a
KatRina [158]
The recommendation of the instructor for Gaven to include a personal statement in his work portfolio will allow him to identify his career goals. If he is unable to show this to his work portfolio then he may simply state it in the personal statement. Thus, the answer to this item is letter A. 
6 0
2 years ago
Which statement compares the copy and cut commands?
ella [17]

Answer: duplicate

Explanation:

5 0
2 years ago
Read 2 more answers
Which of the following is primarily operated by a touchscreen?
LUCKY_DIMON [66]

Answer: The correct answer is Mobile device

Explanation:

A Mobile device is any portable equipment that can be easily connected to an internet. Example of mobile devices include; smart phones, palmtop, smart watch and other computer gadgets. The use of touchscreen for input or output on mobile devices can not be overemphasized. Mobile devices are handy and can be used for making work easy. As such, in order to effectively use mobile devices, touchscreen can be primarily used.

4 0
2 years ago
Suppose you want to sell your product to of one of the school canteen of El Salvador city thus you conducted study to one of the
Lyrx [107]

The interpretation of the table is that it shows that 45.12 percent of the respondents are in 16 years of age when likened to 12.20 percent who are 19 years old and 18.29 percent that are in 18 years of age.

<h3>What is the table about?</h3>

The table is one that shows the age profile for Filipino children from 0 to 4 years and above to 19 years,

Note that it is also made up of the largest age group making up from 10.1 to 10.7 percent as seen on the Philippine Statistics Authority (PSA).

Therefore, students that are in 16 years of age will have the ability to take in or consume products more than the older students as seen in El Salvador City.

Learn more about product  from

brainly.com/question/10873737

#SPJ1

4 0
2 years ago
you arrive at a scene where a computer must be seized as evidence. the computer is powered off and has an external usb hard driv
larisa [96]

The first thing that must be done is Thoroughly documenting the state of equipment before it is hidden is critical to adhere to chain-of-custody procedures. Failure to do so will render collected evidence inadmissible.

Security+ can be defined as the entry-level cybersecurity credential offered by the CompTIA non-profit trade association. This is usually the first certification in information security that an IT professional obtains. By having this, you may get more job opportunities, because you are judged as a more competitive candidate.

The CompTIA Security+ exam (SY0-601) is a test that tests an applicant that he or she has the basic knowledge to perform tasks in IT security and work in cybersecurity. The CompTIA Security+ exam is a vendor-neutral exam that tests applicants' knowledge of IT security materials and their ability to perform core security functions.

You can learn more about Security+ here brainly.com/question/17109203

#SPJ4

7 0
1 year ago
Other questions:
  • Describe one activity that belongs to the organizing phase software engineering.
    8·2 answers
  • Which statement best represents the denotation for the word “woman”? A woman is an adult human female. Both man and woman are re
    11·2 answers
  • Explain what occurs when you synchronize computer and mobile devices.
    5·1 answer
  • Implement a program to measure the impact of application-level buffer sizes on read time. This involves writing to and reading f
    13·1 answer
  • Help me plase will give brainliest
    12·2 answers
  • Which routing protocol does an exterior router use to collect data to build its routing tables?
    8·1 answer
  • A seven-octet pattern of alternating 0s and 1s used by the receiver to establish bit synchronization is a _______
    11·1 answer
  • Business cards are generally designed so that this item stands out the most.
    8·1 answer
  • Here's a better picture of my pc mouse and keyboard​
    5·2 answers
  • Which description best applies to a macro?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!