1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KonstantinChe [14]
3 years ago
6

A developer calls you with a problem. He was trying to debug a new daemon and mistakenly placed it on the production machine ins

tead of on a lab machine. To ensure that the CPU gives preference to other processes, you need to lower the daemon's priority. The PID number is 2345. Which command would you use to decrease the daemon's priority
Computers and Technology
1 answer:
butalik [34]3 years ago
3 0

Answer:

kill -9 2345

Explanation:

This would solve the problem

You might be interested in
A user receives a phone call from a person claiming to be from technical support. This person knows the users name and that the
klasskru [66]

Answer:

This is an example of Social Engineering security threats

Explanation:

Social Engineering is a process whereby cyber attackers manipulate victims to divulge personal information. These victims are tricked to granting attackers access to valuable and confidential information.

Social Engineering is considered one of the greatest threats to organizations because it is different from hackers trying to break into a system. Social Engineers are granted legitimate access by unsuspecting victims.

Tips to help against Social Engineers.

  1. Don't be too hasty to respond.
  2. Be careful of the links you click, research on them before you click them.
  3. Don't be quick to download files that you are not sure of the source, always check before you download.
  4. Don't be quick to jump into foreign offers, as they could be the bait to getting your information.

7 0
3 years ago
Which of the following statement is correct ? A . potential difference is measured by ammeter . B . The unit of potential differ
lina2011 [118]

Answer:

C.Battery is a source of potential difference in a circuit.

Explanation:

A battery is a source of electrons and positive ions which sets one of it's terminal (cathode) at negative potential and the other (anode) at positive potential. Hence a battery is a source of electricity(electrons) which sets a potential difference across the battery terminals.

4 0
3 years ago
What translates binary data into images on a monitor?
g100num [7]
A video card is what allows a computer to translate the binary data into images.
8 0
4 years ago
How do you turn on the Track Changes feature in a spreadsheet?
myrzilka [38]
I would "turn on" this track changer as I would usually go to the top left corner, where it would say edit, and then, usually, as you look down at the bottom, you would then see where it would then be a switch that would say "turn on" or "turn off" track changer.
4 0
4 years ago
What is a common indicator of a phishing attempt cyber awareness 2022
vivado [14]

There are several types of malicious document. A common indicator of a phishing attempt cyber awareness 2022 is that It includes a threat of dire circumstances.

  • Phishing attacks often makes use of email or malicious websites to infect the machine with malware and viruses so as to collect personal and financial information.

Cybercriminals often uses different means to lure users to click on a link or open an attachment that infects their computers thereby producing vulnerabilities for criminals to use to attack.

Learn more from

brainly.com/question/24069038

7 0
3 years ago
Other questions:
  • We may think of relationships in the E/R model as having keys, just as entity sets do. Let R be a relationship among the entity
    14·1 answer
  • Which wildcat character will return a single character when using the find dialog box
    14·1 answer
  • What is an allocation unit?
    10·1 answer
  • Maggie is preparing a document.she wants to open the help menu to sort out a formatting problem.which key should she press to op
    15·2 answers
  • A computer is an electronic device operating under the control of instructions stored in its own memory that can accept, manipul
    11·1 answer
  • Define some everyday if else statements you use to determine action. What are the branches of your statement?
    12·1 answer
  • Employees at the Red Bluff Golf Club & Pro Shop have the opportunity to become certified trainers if they log enough hours.
    13·1 answer
  • Suppose that, on average, a certain binary search algorithm takes one second to search through 1,000 items. Approximately how lo
    9·1 answer
  • True or False. A geosynchronous satellite changes its area in the sky each day.
    5·2 answers
  • What is the half of 3/18
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!