List five types of system information that can be obtained from the Windows Task Manager. How can you use this information to confirm the presence of malware on a system

Answers

Answer 1

Answer:

Part A;

Five types of system information that can be obtained from the Windows Task Manager includes;

1) The processes taking place

2) The performance of the system components, including the, CPU, Memory, Disk, Wi-Fi, GPU, and a live summary of the metrics of the computer

3) The App  history

4) The list of startup

5) The current users of the computer

Part B;

By going through list of active processes on the Windows Task Manager, a malware can be detected as a rogue or unidentified process that may be running on the background. The name of a process may seem legit, but however, the process is not supposed to be running, such as a program which is not running or installed on the system  but the process is seen running on the Windows Task Manager, that is a sign of a malware on the system

Explanation:


Related Questions

The Internet:

O A. only gives us access to our local communities.

O B. hinders our ability to influence people.

O C. limits us to local social networking sites.

O D. enables us to join global online communities.​

Answers

Answer:

D- it enables us to join global online communities.

Explanation:

Thanks to social media and other websites, content you produce can be seen all over the world.

6
development with reference to Nepal.
Mention the objectives of sustainable development,
How can you relate the role of environment while can​

Answers

Answer:

objective of sustainable development are:

Explanation:

1.to help in poverty alleviation

2.to conserve the environment effectively

3.to gain human development and progress

4.to use resources and means carefully

Match the image to its type.


Rgb messes up taking pics from a iPhone 11 to a computer sorry it looks bad

Answers

Warm Colors:

Red flowersOranges

Cool Colors:

Blue skiesPurple butterflies

Neutral Colors:

Brown woodWhite birds

Reds, oranges, and yellows are considered warm, and greens, teals, blues, and purples are considered cool. Colors such as white, black, brown, or gray are all neutral.

Anyone know the logic notation of this following logic circuit?

Answers

Answer:

Concept: Logic Circuit

You have two variables A and B A and B go to the XOR logic command.B goes to the NOT operator Lastly the result of both XOR & NOT go to the OR operator Please rate positively and give brainlist

Name the stringed instrument that's known for its haunting sound, wide pitch capability, and large numbers in the orchestra.

A. Harp
B. Violin
C. Viola
D. Clarinet

The subject is Music Technology.

Answers

Answer:

VIOLIN

Explanation:

The VIOLIN is the stringed instrument that's known for its haunting sound, wide pitch capability, and large numbers in the orchestra.

I think the correct answer would be harp!! BRANLIEST plz

can someone please help its late

Answers

Answer:

The correct answer to this question is given below in the explanation section.

Explanation:

The labels to AS engine are given below from left to right respectively.

FanCompressorCombustionTurbineMixer Nozzle

Fan: Drawer air into the engine

Compressor: Compressor spins the air very fast. This sequeezes or compresses the air

Combustion: Air and fuel are mixed together and ignited in the combustor and it gets super hot and gas expanded.

Turbine: The hot gases enter the turbine, causing the blade on it to spin.

Mixer: The mixer combines the hot air with outside air in the engine. This reduces the heat and noise that is coming from the engine.

Nozzle: nozzle is where the exhaust is coming out from the engine, creating thrust. It works according to newton's third law.

b) Describe the computer processing that is required to maintain the correct growing
conditions.​

Answers

Answer:

Explanation:To get the best plant growing conditions, the temperature and humidity (moisture in the air) have to be controlled.

The greenhouse therefore has temperature and humidity sensors linked to a computer, and the computer has a control program storing details of the correct temperature and humidity settings. The greenhouse is fitted with a heater, sprinkler and window motor which are also linked to the computer.

If the humidity falls below the values stored in the program, the computer activates the sprinklers and closes the windows. If the temperature falls outside the values stored in the program, the heater is activated by the computer.

The First Amendment of the Constitution is one of the most important parts of the Bill of Rights. What specific rights does this amendment guarantee to every American citizen?

Answers

Answer:

The First Amendment to the U.S. Constitution protects the freedom of speech, religion and the press. It also protects the right to peaceful protest and to petition the government

Explanation:

if this answer is correct make me as brainlelist

Answer:

its guarantees the freedom of speech, religion, and the freedom of the press.

Explanation:

Which of the following is an object-oriented language?

A. C
B. C++
C. BASIC
D. COBOL

Answers

Answer:

C++

Explanation:

Significant object-oriented languages include: (list order based on TIOBE index) Java, C++, C#, Python, R, PHP, Visual Basic.NET, JavaScript, Ruby, Perl, Object Pascal, Objective-C, Dart, Swift, Scala, Kotlin, Common Lisp, MATLAB, and Smalltalk.

The programs' structure is made obvious via OOP. OOP makes the C++ code easier to maintain, alter, and debug by encouraging “Don't Repeat Yourself” (DRY) programming practices. OOP allows for quicker development times and less code needed to create fully reusable apps. Thus, option B is correct.

What role of C++ as an object-oriented language?

The following are several justifications for calling C++ a partial or semi-object oriented language. The primary action is not a class action.

Object-oriented programming is supported by C++, but it is not a feature of the language itself. You don't even need to use an object once to construct a legitimate, well-coded, and brilliantly styled C++ program.

Therefore, Object-oriented programming can be implemented using C++'s core features. It contains classes and objects as well as the OOP principles of inheritance, encapsulation, abstraction, and polymorphism. It also has access to specifiers.

Learn more about language here:

https://brainly.com/question/29751978

#SPJ2

select the correct option
and thanks

Answers

M cucumber
Should be the ans

Answer:

Cucumber

Explanation:

Cucumber has the largest portion. .08 kg/tray/day. The entire graph equals 100%, and the cucumbers take up 17.8% of it.

which of the following types of correspondence is used to inform the reader of new information such as a policy change

Answers

Answer: Memo

Explanation: Have a good day, pls mark me brainliest <3

If you had three extra siblings, what would be your birth order and what personalities would you like them to have?

Answers

Answer:

mixed personalities l

that will be cool

Answer:

I already have 4 step brothers, 2 real brothers, 1 step sister, and a half sister, so 3 more people would be a lot. If I got to pick their personalities and gender, I would want 1 more sister and 2 more brothers. I would watn a more alt brother, a more fem brother, and an indie sister. Kinda just an aesthetic type for them.

In which situation is coauthoring of presentations primarily utilized?

A reviewer must be able to make changes to a presentation after an author creates it.
Multiple authors must be able to simultaneously make changes to a presentation.
Multiple reviewers have to be able to view one another’s changes after they are made.
One author and one reviewer work on a presentation at different times.

Answers

Answer:

A i belive

Explanation:

Answer:

B) Multiple authors must be able to simultaneously make changes to a presentation.

Explanation:

Co indicates being part of a whole. So this means that two or more authors are working on this project simultaneously. Such as co-management; two bosses working together in an equal position.

PLEASE HURRY!!
Look at the image below!

Answers

The answer would be 2&5 because this is correct
The answer should be 2&5 I’m not 100% sure on this but it makes the most sense

Give short answers.
h.
How have computers affected education?
i.
What roles do computers play at home?

j.What effects have computers had on the practice and enforcement of law?

k. How have computers changed entertainment?

Answers

Answer:

H) Well it depends how you put it. I'm Doing virtual School for my education. And it is so easy when we have technology out their to provide the help that we need. So I think it has affected education pretty good. You can Also google the answers.

I) Looking up Answers at home

J) Parents can check up on their child's school work and see if they can help them. Also The law is involved in Education.

K) It depend's on how you put it

Explanation:

Short Answers

Can someone help me I am coding.

Answers

Answer:

i will help u

Explanation:

what did you want

Help with my Nintendo DS please I now it’s not school related but I need it for my little sister

Answers

Answer:Go to settings and do factory reset!

Explanation:

What do you mean by word-wrap?

Answers

Answer:

it is also know as line breaking

Explanation:

is breaking a section of text into lines so that it will fit into the available width of a page, window or other display area

Match the terms with their definitions

Answers

Answer:

Malware goes with the third definition, single sign-on goes to the fourth definition, phishing goes to the second definition, and clickjacking goes to the first definition.

Hope this helps! :)

Malware = a term used for software designed to damage your computer or steal your personal information

Single sign-on = when you use a single credential to log into multiple websites

Phishing = when random links mislead you into giving your password or other vital information to an unscrupulous website or person

Clickjacking = when you unknowingly click a malicious link, thinking it to be a legitimate link
:)

Soft skills are more likely to be transferable than hard skills?

True or false

Answers

Answer:

The correct answer is true.

Explanation:

Examples of Soft skills are

Communication TeamworkPositive Attitude etc.                              

These skill can be applied to any job. That is why we have said that soft skill are transferrable.

Now let look at hard skill,

Hard skill like programming in python. Making the architecture of computer. These skill can not be transferred to a new job like authoring a book.

so, hard skills are not easily transferrable.

Whenever you are designing a project for commercial use (making money) and need to use photographs with people in them you must obtain a__________release.

Answers

Answer:

Copyright

Explanation:

Read the following scenario. How might Sarah correct successfully complete her task?
To permanently remove a file from her computer, Sarah doubled-clicked on the My Computer icon and searched for her
file under the “Uninstall or change a program" menu option. A

Answers

Answer:

Explanation:

A: To permanently remove a file from her computer, Sarah doubled-clicked on the My Computer icon and searched for her file under the “Uninstall or change a program” menu option.

or

b: empty the recycle bin : You can permanently delete a program file installed in the computer by following the procedure in option A. The option above will take you to the control panel and you'll be able to select the program you'd want to permanently remove. If you had initially deleted a file like a picture or a document or anything else that you necessarily do not need, it will go to recycle bin. You can head over there and select the Empty the Recycle Bin option to permanently delete the file.

can some one please help

Answers

Answer:

the thing is black for me. retake?

Explanation:

What are the most common forms of information?

Answers

Answer: web search

Explanation:

Major innovations made from the establishment of abucus to the 5th computer generation

Answers

Answer:

Cogs and Calculators

It is a measure of the brilliance of the abacus, invented in the Middle East circa 500 BC, that it remained the fastest form of calculator until the middle of the 17th century. Then, in 1642, aged only 18, French scientist and philosopher Blaise Pascal (1623–1666) invented the first practical mechanical calculator, the Pascaline, to help his tax-collector father do his sums. The machine had a series of interlocking cogs (gear wheels with teeth around their outer edges) that could add and subtract decimal numbers. Several decades later, in 1671, German mathematician and philosopher Gottfried Wilhelm Leibniz (1646–1716) came up with a similar but more advanced machine. Instead of using cogs, it had a "stepped drum" (a cylinder with teeth of increasing length around its edge), an innovation that survived in mechanical calculators for 300 hundred years. The Leibniz machine could do much more than Pascal's: as well as adding and subtracting, it could multiply, divide, and work out square roots. Another pioneering feature was the first memory store or "register."

Apart from developing one of the world's earliest mechanical calculators, Leibniz is remembered for another important contribution to computing: he was the man who invented binary code, a way of representing any decimal number using only the two digits zero and one. Although Leibniz made no use of binary in his own calculator, it set others thinking. In 1854, a little over a century after Leibniz had died, Englishman George Boole (1815–1864) used the idea to invent a new branch of mathematics called Boolean algebra. [1] In modern computers, binary code and Boolean algebra allow computers to make simple decisions by comparing long strings of zeros and ones. But, in the 19th century, these ideas were still far ahead of their time. It would take another 50–100 years for mathematicians and computer scientists to figure out how to use them (find out more in our articles about calculators and logic gates).

Explanation:

If you got band from a local library, what would be the reason for it besides shouting and talking? You're answer has to fit you're personality?

Answers

Answer:

I would get a band from the library because I check out ten books and returned them in a week. I also would just be in the library all the time and they would get frustrated. That or I would spend hours talking to a librarian about my favorite books and they would get fed up with me.

how are web design & web development different from each other?

Answers

Answer:

Developers are people who build a website's core structure using coding languages, while designers are more visually creative and user-focused. Developers use their programming knowledge to breathe life into the designer’s creative vision.

You could think of developers as construction workers, and web designers as architects – both necessary, but different, skill sets.

I hope this helped :D

Explanation:

What is one way to make a presentation stand out by using PowerPoint Online?

Use different images and videos throughout the presentation.

Use a plain white background throughout the presentation.

Use the same font and font size throughout the presentation.

Use the same slide format throughout the presentation.

Answers

Answer:

Answer: Use different images and videos throughout the presentation.

Explanation:

I just took this test and got it correct :)

Answer:

give person on top brainlist they are right i got 100 percent

Explanation:

thank you

For Internet Protocol (IP) v6 traffic to travel on an IP v4 network, which two technologies are used

Answers

Answer:

These technologies are: Dual Stack Routers, Tunneling, and NAT Protocol Translation.

Explanation:

Dual Stack Routers -  This is the process in which a router’s interface is attached with IPv4 and IPv6 addresses

Tunneling -Tunneling is used as a medium to help the different IP versions  communicate with the transit network.

NAT Protocol Translation -  This helps the IPv4 and IPv6 networks communicate with each other since they do not understand the IP addresses of each other since, they are different IP versions.

The two technologies that are used when Internet Protocol (IP) v6 traffic travel on an IP v4 network are datagrams and ipv6.

A datagram can be defined as a transfer unit that is associated with a packet-switched network.

Internet Protocol version 6 (IPv6) is a protocol used for packet-switched inter-networking.

The IPv6 is a protocol used for end-to-end datagram transmission through multiple Internet Protocol networks.

In conclusion, the two technologies that are used when Internet Protocol (IP) v6 traffic travel on an IP v4 network are datagrams and ipv6.

Learn more in:

https://brainly.com/question/14851068

Could u give me brief summary of New Years

Answers

....................................

Answer:

happy new year friend

sorry for late..

Other Questions
You use a line of best fit for a set of data to make a prediction about an unknown value. The correlation coefficient for your data set is -0.015. Can you be confident that your predicted value will be reasonably close to the actual value?a. Yes, because the correlation is close to zero, it is strong.b. Yes, No, because the correlation is close to zero, it is strong.c. No, because the correlation is close to zero, it is weak.d. No, because the correlation is negative, it is weak. anyone help please will give brainliest John Quincy Adams supported a U.S. foreign policy that Why do you think George Washingtons presidency was so important in the development of the US? What - anatomically - allows the characteristic human sound of speech? please help me with this HELP WILL GIVE BRAINLISTQuestion 9 (1 point)Article IV, Clause 2 states that the US Constitution is...A)the supreme law of the landB)set up to remove a president from officeC)what gives the Congress power to make lawsD)is able to be easily changed 2. The Constitution cannot be changed on a whim; a lot of people have to work together for an amendment to be ratified. Why do you think it's necessary to make amending the Constitution such an involved process? How many solutions does the system of equations below have?y = 3x + 4y + 6 = 3x HURRY PLEASE!!!Which aspect of the Roman Catholic Church established in the 300s remains today?O The Roman Catholic Church's leader is still the bishop of Rome, or the pope.O The Roman Catholic Church remains the official church of the city of Rome.O The Roman Catholic Church remains the only official church.O The Roman Catholic Church's power structure remains unchanged. what career cluster does a mailman fall under PLEASE LOOK AT PICTURE! WHOEVER HAS CORRECT ANWSER I WILL MARK BRAINIEST!!! well what do you call a sheep and a goat name mixed together help me please, if it's right i'll mark you brainliest :DFind the area of the parallelogram. Which of the following describes a major cause of the expansion of theOttoman Empire in the fifteenth and sixteenth centuries? A motocross ramp is 16 feet tall and 24 feet long what is the slope of the ramp Molly shared a spool of ribbon with 12 people. Each person received 3 feet of ribbon. Which equation can she use to findr, the number of feet of ribbon that her spool originally had? PLEASE HELP ME ASAP!! What dividend is represented by the synthetic division below? The temperature on Sunday was 45 degrees. The next day the temperature dropped by 13 degrees. What is the temperature the next day" *