1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vazorg [7]
2 years ago
12

A user complains that her computer is performing slowly. She tells you the problem started about a week ago when new database so

ftware was installed. The software runs in the background to update a database synced between the user's workstation and database server. Which is the best tool or method to use to determine if the new software is hogging computer resources?
Computers and Technology
1 answer:
motikmotik2 years ago
6 0

Answer/Explanation:

It is best to use Performance Monitor and Process counters to observe performance.

Cheers

You might be interested in
Given two Generic variables, A with value "123" and B with value 456, what would the Write Line output of A + B be? 123456 579 A
Andreyy89

Answer:

123456

Explanation:

When an integer value is added to a string value the resulting value is a string.+ operator is used for both numeric additions and string addition also knows as string concatenation. In addition when one operand of the equation is a string the program interprets all values as string. As system is interpreting all values as a string it will apply a string addition method instead of mathematical addition.So here A is a string and B is an integer value. when we add A and B system will treat B aslo as a string, upon addition the result will be String concatenating both A and B to a single string.Hence the result of A+B will be

A+B = 123456

As WriteLine method takes string as Input it will just write the resulting string to file

6 0
3 years ago
You are the IT Administrator for a small corporate network. Until now, the network has consisted only of workstations accessing
ser-zykov [4K]

Answer:

Explanation:

Since you are using Windows Server 2012 these tasks are much easier. In order to accomplish this, you simply need to click on Disk Management in the GUI and then right-click on the 200 GB drive and click on the option that says "Extend Drive". Finally, choose the max available space for the drive and click accept. This will extend the drive completely to use all of the space. The same process can be done for changing the Drive Letter and Volume Label by right-clicking the drive and choosing the corresponding option. In order to get convert the file system to NTFS (assuming it is Fat32) you simply need to open command prompt and type the following command.

convert m:  /fs:ntfs

where m is the actual drive letter of the drive in question.

8 0
3 years ago
question 2 which data link layer protocol defines the process by which lan devices interface with upper network layer protocols?
erma4kov [3.2K]

The correct answer is MAC (Media Access Control).

<h3>What is MAC?</h3>

The Media Access Control (MAC) protocol is a data link layer protocol that defines the process by which local area network (LAN) devices interface with upper network layer protocols, such as the Internet Protocol (IP).

The MAC protocol is responsible for controlling access to the shared communication medium of the LAN and for providing a reliable link between devices on the LAN. It does this by defining a set of rules and procedures for how devices on the LAN can detect and avoid collisions when transmitting data, as well as for how they can recover from errors that may occur during transmission.

The MAC protocol is typically implemented in hardware, such as in the network interface controller (NIC) of a computer, and is an essential part of the LAN communication process.

To Know More About MAC, Check Out

brainly.com/question/29388563

#SPJ1

6 0
1 year ago
What is the purpose of a forecast worksheet?
Liono4ka [1.6K]

Answer: It’s a

Explanation:

I got it right on edj

8 0
2 years ago
To convince the server that a user is authentic, the authentication server creates a _________ that contains the user's ID and n
Rasek [7]

Answer: ticket

Explanation

6 0
3 years ago
Other questions:
  • What type of Windows Server is the most likely server to be targeted by a computer hacker?
    13·2 answers
  • What is the lowest and highest address of a 2^20 byte memory, if it is byte readable.
    11·1 answer
  • Which of the following is not a job title associated with a career in visual and audio technology? master control operator produ
    9·1 answer
  • What is the order of arrangement of files and folders on a computer?
    15·1 answer
  • Identify the mobile device deployment option that gives the user flexibility to select a device, but allows the company to contr
    5·1 answer
  • Write a program in python that ask the user to enter a word and then capitalizes every other letter of that word
    15·1 answer
  • Which of these BEST describes an inference?
    11·2 answers
  • Top/bottom rules allows user to apply conditional formatting cells that fall within the top or bottom numbers or percentile. how
    7·1 answer
  • Which of the following is the correct ordering of operating systems, oldest to newest?
    5·2 answers
  • What are two reasons why tuples exist in Python?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!