1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ExtremeBDS [4]
3 years ago
14

bryce's computer is acting unusually sluggish today he calls you an it techniician to see if you can find out what is going on a

nd to improve his computer's perfermance you can run task manager on bryce's computer and find that a suspicious application has nearly 90% cpu which of the following can be used from task manager to stop the application from running
Computers and Technology
1 answer:
storchak [24]3 years ago
6 0

As an IT technician, I need to understand how to end processes on the process tab of the task manager. Most techies are interested in this tab to determine what process is consuming what resources. Bryce’s computer has a suspicious application that has 90% CPU consumption, and this, as a result, will affect the computer.

  • First on the list of things that I am required to identify the actual application that is causing the surge  on the CPU column,
  • Next I should be able to right click on it, and select End process on Windows 7 or End task on Windows 8 and later. Carrying out this task will noticeably stabilize Bryce’s computer.
  • Finally, I will try to find out whether this application is causing harm to the computer in any possible way. If it is, then I should consider uninstalling it. If it not, I should be able to request Bryce to do an upgrade on his PC in order to handle the application more effectively.

You might be interested in
Describe a sub routine​
Maksim231197 [3]

Explanation:

A routine or subroutine, also referred to as a function procedure and sub program is code called and executed anywhere in a program. FOr example a routine may be used to save a file or display the time.

4 0
3 years ago
The background image does not affect any cell’s format or content. _______
Korvikt [17]
Hmmm...that is true 
Here a quizlet about if you need it!
https://quizlet.com/15207805/csci-241-flash-cards/
3 0
3 years ago
Complete two examples of how scientists, technologists, engineers, and mathematicians may work together to create a new product
asambeis [7]

Answer:

By thinking of ways to create environment friendly products such as biodegradable water bottles

3 0
3 years ago
Create a class called Circle, which has (i) an attribute radius, (ii) a method that returns the current radius of a circle objec
nadya68 [22]

Answer:

Explanation:

The following class is written in Java. I created the entire Circle class with each of the methods and constructor as requested. I also created a tester class to create a circle object and call some of the methods. The output can be seen in the attached picture below for the tester class.

class Circle {

   double radius;

   public Circle(double radius) {

       this.radius = radius;

   }

   public double getRadius() {

       return radius;

   }

   public void resetRadius() {

       radius = 0;

   }

   public double calculateArea() {

       double square = Math.pow((Math.PI * radius), 2);

       return square;

   }

}

8 0
3 years ago
Al these are benefits of computer literacy except
Harrizon [31]

Explanation:

  • Being computer literate supports entrepreneurship. ...
  • Communication. ...
  • Enhance your employment opportunities. ...
  • Address the gap in your knowledge. ...
  • Computers Reconstruct Business
8 0
2 years ago
Other questions:
  • What did Edison's device to view motion pictures inspire the Lumiere brothers to invent?
    14·1 answer
  • Electromagnetic waves used in ovens and cell phone communications are called
    6·1 answer
  • A _____ is a modeling tool used in structured systems analysis and design (SSAD) analysis model that helps break down a complex
    13·1 answer
  • The purpose of the ___________ is to provide sufficient notice to individuals whose personal information has been stolen so they
    13·1 answer
  • Write an app that reads an integer, then determines and displays whether the integer is odd or even. [Hint: Use the remainder op
    10·1 answer
  • A ____________ would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a____________
    12·1 answer
  • Which of the following statements is true of computer networks?
    6·1 answer
  • If anyone knows how to code on python:
    8·1 answer
  • How to check the at&t internet speed on my computer
    9·1 answer
  • how could environmental and energy problem Kenya faces as far computer installations are concerned be avoided​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!