1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Marianna [84]
4 years ago
13

A Windows user is attempting to exit a locked up desktop application that is not responding to mouse or keyboard input. Which of

the following steps can be taken to end the application process without exiting other open applications?
Computers and Technology
1 answer:
Kamila [148]4 years ago
3 0

Answer:

Open Task Manager and end the process associated with the application.

Explanation:

When using a computer installed with the Windows Operating system and an application is not responding to the mouse or keyboard input, you can end such application process without exiting other open applications by opening the task manager using the key combinations "CTRL + ALT + DEL". This would open the Task Manager showing all the open application and then you can end the process associated with the application that is not responding.

You might be interested in
Engineers use science to ______ things that people use.
jek_recluse [69]

Answer:

Not 100% sure but I think it is either to solve things that people use or improve things that people use

Explanation:

8 0
3 years ago
What is the full meaning of RFID in computer​
Brut [27]

Answer:

radio frequency identification

Explanation:

i thought i had answered this already...?

8 0
3 years ago
Read 2 more answers
Ron is creating building blocks in Word. How can he make the building blocks that he created available?
Gre4nikov [31]

Answer: store those building blocks in the Normal template

Explanation:

Since Ron is creating building blocks in Word, he can make the building blocks that he created available by storing those building blocks in the normal template.

It should be noted that building blocks include lists, tables, text boxes or other contents that an individual uses for his or her word document.

So as to make them readily available whenever they're needed, it is important that they should be stored in the normal template. It will allow for easy access.

3 0
3 years ago
Read 2 more answers
Explain why blocking ping (ICMP echo request) packets at an organization's edge router is not an effective defense against ping
tresset_1 [31]

Answer:

The blocking ping is not effective in an organization because it may required ping echo message from some trusted system. the best method will be to do the filtering of incoming echo ICMP messages.

In systems we have ping utility, that is based on ICMP protocol. Its function is  to check the end to end connectivity of the system.

In this case a  fist all an echo ICMP message is send to the host then host reply with ICMP message. to defend yourself from this flood attack, we need to filter the incoming echo ICMP packet messages. a net filter can be used to achieve it.

The best method be to applied is the firewall having a net filter with limit setting or any intrusion system. In market we have various firewall and intrusion system available to do so.

Explanation:

Solution

Ping Flood Atack:

In this attack the main of the attacker is to saturate the system with ICMP for example (internet control message protocol) traffic. as you have saturated the system, it will have less CPU time to serve others.

Defence against this attack:

In our systems we have ping utility, that is based on ICMP protocol. Its used to check the end to end connectivity of the system. here fist all an echo ICMP message is send to the host then host reply with ICMP message. to defend yourself from this flood attack , we need to filter the incoming echo ICMP packet messages. a Net filter can be used to achieve this.

The best way will be to used the firewall having net filter with limit setting or any intrusion system. In market we have various firewall and intrusion system available to do so.

Blocking ping packets to avoid ping flood attack:

Its not a good approach to block ping packets. because you may required ping echo message from some trusted system. The best option will be to do the filtering of incoming echo ICMP message.

6 0
4 years ago
Which of the following statements is NOT true? a. An infeasible solution violates all constraints. b. A feasible solution satisf
lakkis [162]

Answer:

B. A feasible solution satisfies all constraints.

Explanation:

Linear programming can be explained as a simple technique where we depict complex relationships through linear functions then find the optimum points.

Linear programming is employed for obtaining the foremost optimal solution for a drag with given constraints. In applied mathematics,

real life problem are formulate into a mathematical model. It involves an objective function, linear inequalities with subject to constraints.

Constraints: The constraints are the restrictions or limitations on the decision variables. They usually limit the value of the decision variables.

Hence,

An infeasible solution violates all constraints.

A feasible solution point does not have to lie on the boundary of the feasible region.

An optimal solution satisfies all constraints.

3 0
3 years ago
Other questions:
  • Write a program that determines the price of a movie ticket (similar to the one in the chapter). The program asks for the custom
    9·1 answer
  • "This command will give you a listing of your basic IP information for the computer you are using"
    6·1 answer
  • Enables businesses and consumers to share data or use software applications directly from a remote server over the Internet or w
    6·1 answer
  • If you were investigating login issues on a Windows computer, which portion of the Event Viewer logs would be a good place to st
    7·1 answer
  • Why operating system is important software for a computer give five reasons
    13·1 answer
  • Why might the government censor what its citizens see on the internet?
    13·2 answers
  • Discuss the following
    14·1 answer
  • Information in _____ code can be transmitted without errors over the communication network.
    13·2 answers
  • A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their f
    13·1 answer
  • Q.3.1 Explain why devices on a network need addresses. (5)​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!