What programs are always running when your computer is turned on? Enter the names of the programs in the space provided. Click the Submit button when you are finished to view the suggested response.

Answers

Answer 1

Answer:

open your task manager

Explanation

right click the toolbar below and click on task manager and you will see what programs are running on your pc

Answer 2

Answer:

Items commonly found in the system tray include antivirus settings; battery status; and volume. Sometimes e-mail programs, printers, or faxes are also present. Your computer may have other items in the system tray too.

Explanation:

I just took  a test on edguenity and that was the correct answer hope this helps


Related Questions

This isn't academic, but what do I do if HI-REZ won't let me sign into an existing account. “Something went wrong” keeps popping up when I type in the correct info

Answers

Answer:

contact their support

Explanation:

write examples of hacking in internet?​

Answers

Answer:

Although hacking is very bad, it can be found everywhere and anywhere.

Examples: Phishing, password checking, and keyloggers

Explanation:

Explanation:

Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorised access to or control over computer network security systems for some illicit purpose.

To better describe hacking, one needs to first understand hackers. One can easily assume them to be intelligent and highly skilled in computers. In fact, breaking a security system requires more intelligence and expertise than actually creating one. There are no hard and fast rules whereby we can categorize hackers into neat compartments. However, in general computer parlance, we call them white hats, black hats and grey hats. White hat professionals hack to check their own security systems to make it more hack-proof. In most cases, they are part of the same organisation. Black hat hackers hack to take control over the system for personal gains. They can destroy, steal or even prevent authorized users from accessing the system. They do this by finding loopholes and weaknesses in the system. Some computer experts call them crackers instead of hackers. Grey hat hackers comprise curious people who have just about enough computer language skills to enable them to hack a system to locate potential loopholes in the network security system. Grey hats differ from black hats in the sense that the former notify the admin of the network system about the weaknesses discovered in the system, whereas the latter is only looking for personal gains. All kinds of hacking are considered illegal barring the work done by white hat hackers.


What requirements are necessary in order for you to share a file?
Check all that apply.
You own it.
You commented on it.
You can edit.
You know about the topic of the document.

Answers

Answer:

I. You own it.

II. You can edit.

Explanation:

A file can be defined as a computer resource that avails end users the ability to store or record data as a single unit on a computer storage device.

Generally, all files are identified by a name and type such as audio, image, video, document, system, text, etc. Each type of files can be transferred or send from one computer node to another computer node through the use of a wired or wireless connection and with the necessary level of permission.

The requirements which are necessary in order for you to share a file are;

I. You must own the file. This simply means that you have the authority to share the file and have it saved on your device.

II. You have the permission or required credentials to edit the file. A read-only permission cannot be used to edit a file but a full permission can be used.

What would be the result after the following code is executed? int[] numbers = {40, 3, 5, 7, 8, 12, 10}; int value = numbers[0]; for (int i = 1; i < numbers.length; i++) { if (numbers[i] < value) value = numbers[i]; } The value variable will contain the highest value in the numbers array. The value variable will contain the sum of all the values in the numbers array. The value variable will contain the average of all the values in the numbers array. The value variable will contain the lowest value in the numbers array.

Answers

Answer:

The value variable will contain the lowest value in the numbers array.

Explanation:

Given

The given code segment

Required

The result of the code when executed

The illustration of the code is to determine the smallest of the array.

This is shown below

First, the value variable is initialized to the first index element

int value = numbers[0];

This iterates through the elements of the array starting from the second

 for (int i = 1; i < numbers.length; i++) {

This checks if current element is less than value.

     if (numbers[i] < value)

If yes, value is set to numbers[i]; which is smaller than value

value = numbers[i];

Hence, the end result will save the smallest in value

Consider the classes below: Which of the following statements is true? Group of answer choices The value of counter will be different at the end of each for loop for each class. The value of j will be the same for each loop for all iterations. Both The value of counter will be different at the end of each for loop for each class and The value of j will be the same for each loop for all iterations are true. Neither The value of counter will be different at the end of each for loop for each class nor The value of j will be the same for each loop for all iterations is true.

Answers

Answer:

probly

Explanation:

Both The value of counter will be different at the end of each for loop for each class and The value of j will be the same for each loop for all iterations are true.

Which of the following images illustrates safe driving?

Answers

Answer:

bottom left

Explanation:

Answer:

keep your eyes on the road!!!!

Select the correct answer from each drop-down menu.
Complete the following sentences.

_________ effort is an important and necessary factor for the success of any project. In software development projects,
_______team members carry out several tasks to ensure the quality of the process and the final product.

Options for the first box are: managers, A teams, an individuals

Options for the second box are:internal, specific, external

Answers

Answer:

First, A teams, Second ,Specific

Explanation:

You are working on a ticketing system. A ticket costs $10. The office is running a discount campaign: each group of 5 people is getting a discount, which is determined by the age of the youngest person in the group. You need to create a program that takes the ages of all 5 people as input and outputs the total price of the tickets. Sample input: 55 28 15 38 63 sample output: 42.5 the youngest age is 15, so the group gets a 15% discount from the total price, which is $50 - 15% = $42.5

Answers

Answer:

Explanation:

The following program is written in Java. It takes 5 inputs of int values for the ages of each member in the group. Then it loops through all of the ages and chooses the youngest age. Finally, it applies that age as a discount to the final price which would be $50, outputting the final discounted price. The output for the test case provided can be seen in the attached picture below in red.

import java.util.Scanner;

class Brainly

{

   public static void main(String[] args) {

       Scanner in = new Scanner(System.in);

       int[] person = new int[5];

       System.out.println("Enter age of individual 1: ");

       person[0] = in.nextInt();

       System.out.println("Enter age of individual 2: ");

       person[1] = in.nextInt();

       System.out.println("Enter age of individual 3: ");

       person[2] = in.nextInt();

       System.out.println("Enter age of individual 4: ");

       person[3] = in.nextInt();

       System.out.println("Enter age of individual 5: ");

       person[4] = in.nextInt();

       int youngest = person[0];

       for (int x = 0; x < person.length; x++) {

           if (person[x] < youngest) {

               youngest = person[x];

           }

       }

       double discount = 1 - (((double)youngest) / 100);

       double output = 50 * discount;

       System.out.println("Total Price: " + output + " the youngest is " + youngest);

   }

}

You have created a group policy that prevents users in the accounting department from accessing records in a database that has confidential information. The group policy is configured to disable the search function for all users in the Accounting OU no matter which workstation is being used. After you configure and test the policy, you learn that several people in the Accounting OU have valid reasons for using the search function. These users are part of a security group named Managers. What can you do to prevent the Group Policy object (GPO) that you have configured from applying to members of the Managers group

Answers

Answer: Add the Managers group to the GPO's discretionary access control list (DACL).

Deny the apply Group Policy and read permissions to the Managers group.

Explanation:

To prevent the Group Policy object (GPO) which had been configured from applying to the members of the Managers group, the Managers group should be added to the GPO's discretionary access control list (DACL).

Likewise, the apply Group Policy can be denied and read permissions to the Managers group. This will further help in the prevention of users.

No links it’s just a normal question about iPhones.
If you have someone in your contacts you talk with a lot but like everyday you delete the conversation multiple times will you stop receiving texts from that person even if you text them and it says delivered?

Answers

Answer:

You will still get the messages. You are just deleting the messages from YOUR device not the other persons, in order to stop recieving messages from the person you block them. In order to stop receving notifications, you put them on DND. But, if you talk to them everyday I would assume you would not want to stop receiving messages from them.

(WEB DESIGN FINAL QUESTION) PLEASE HELP
what is a trademark?

Answers

Answer:

a trade mark is something where someone owns the rights to something in a specific country

Other Questions
If y varies directly as x and y = 64 when x = 16, what is the value of y when x = 12 ? lodine-131 is radioactive. If after 160 days only 1/8 of the sample remains, how long isits half-life?A. 92.2 daysB. 20 daysC. 53.3 daysD. 16 days Which shows how to determine the volume of the pyramid? To say that Susie does something every day, she would say -plusieurs fois -quelquefois. - tous les jours. Which of these WOULD NOT be an appropriate subject for a vignette?A. The time you got hit in the face by your surfboard.B. The time a dolphin popped up in front of your surfboard.C. The first day you surfed. Compare Gothic and Romanesque styles. What MOST LIKELY makes these two styles different from one another?A. Romanesque artwork brings more emotional appeal than art from the Gothic style.B. Romanesque sculptures use a more realistic depiction of humans than Gothic art.C. Gothic art has a greater humanistic quality than we find in Romanesque art.D. Gothic art uses stained glass; Romanesque art does not use any stained glass. TessellationsFind the coordinates of quadrilateral PQRS with vertices P(1, 4), Q(-1,4), R(-2, -4) and S(2, -4) under the translation (x,y) (x-5,y+3)a. P' (-4, 7), Q' (-6, 7), R' (-7, -1) and S' (-3, -1)b. P' (6, 7), Q' (4, 7), R' (3, -1) and S' (7, -1)c. P' (-4, 1), Q' (-6, 1), R' (-7, -7) and S' (-3, -7)d. P' (6, 1), Q' (4, 1), R' (3, -7) and S' (7, -7)Please select the best answer from the choices provided What is the measure of arc BC? Write the correct expression of por/para and thecorrect conjugation for the verb in the following short story.1. (tener) muchos libros en la librera. Nosotros 2. (vender)los librosF113. (por/para) el internet. Hoy recib un mensaje electrnicode Mara, ella 4. (vivir) en Inglaterra y ella 5. (leer)bastante. Maria 6. (querer) comprar un libro 7. (por/para)su hermana que vive en Espaa. Nosotros 8. (mandar) ellibro 9. (por/para)el correo areo y le llega muy rpido.CNos gusta mucho leer! Look at the painting below. Name the painting and the artist and describe its important features. How many 1/3s are in 1 2/3? i will give brainliest to correct answer - link = report (Sorry, I forgot to post the graph on the last one) The table below shows the water temperature at certain depths of a lake. Using an logarithmic model, write an equation for the curve of best fit, then estimate the depth of water at a temperature of 50 degrees F. Which expression is equivalent to 5(6x+ 3y)? What is the approximate distance from the origin to the point (5, 6, 1)? Round to the nearest tenth. o3.2 units o3.5 units o7.7 units o7.9 units The equation below is used to calculate the mechanical advantage of an ideal wheel and axle.mechanical advantage = wheel radius __________ axle radiusA student compares two wheel-and-axle simple machines. Machine 1 has a wheel radius of 50 centimeters, and an axle radius of 10 centimeters. Machine 2 has a wheel radius of 100 centimeters, and an axle radius of 10 centimeters. What is true of these simple machines mechanical advantage? A. Machine 1s mechanical advantage is greater, which means that this machine can do more work with less force than Machine 2. B. Machine 1s mechanical advantage is greater, which means that this machine can move faster than Machine 2. C. Machine 2s mechanical advantage is greater, which means that this machine can do more work with less force than Machine 1. D. Machine 2s mechanical advantage is greater, which means that this machine can move faster than Machine 1. If a=-2 and b = 3, what is the value of -3a2b?1.-362.363.-544.54 will you have enough room for a dance floor that is 8 m x 8 m please explain why or why notasap Which word a synonym is for mystified?A.dazedB.staggeredC.perplexedD.seemed A truck spilled 1000 gallons of asphalt on the 5 freeway. Come up with a way to approximate the cost of the cleanup