A user reports slow performance on a computer. A technician checks the computer and finds the RAM utilization Is very high. The technician restarts the computer, and the RAM use is still high. The technician discovers a program running in the background Is using most of the RAM. The user only uses this program once at the end of the year to produce a report. What steps should the technician take to improve the computer's performance?

Answers

Answer 1

Answer:

The answer is "disable the program on startup"

Explanation:

The technician simply disables the program on the startup, at this the utilization of the RAM is low. The startup tab is also known as an alternative in the initialization process of the system software, which is automatically started whenever the device boots. There has been an error. If you boot, the more applications you want to load the longer it will take to operate the computer.


Related Questions

What are the words that make up a high-level programming language called?

Answers

Answer:

just ask your teacher

Explanation:

How do motion sensors determine in simation
about a person?
They store information regarding a person's
health.
They record a person's surroundings.
They record who a person interacts with.
They track where they go and how they move.

Answers

Answer:

They record a person's surroundings.

Explanation:

Motion sensors like the passive infrared (PIR) work by detecting changes in the infrared radiation given off by objects in their surroundings. Normally most objects give off a small amount of infrared radiation. Human bodies, however, give off a large amount of infrared radiation.

So when motion sensors detect the presence of a person in a surrounding, they give off an alarm to indicate the presence of an intruder.

Answer:D

Explanation: the track where they go

What email program would you suggest and why?

Answers

Answer:

An email program

Explanation:

And why?

Answer:

I would suggest g m a i l.

Explanation:

I use G m a i l all the time and I think it is easy to use! A lot of people think it is great too! :)

If you are working in a word-processing program and need to learn about its features, the best place to get assistants is from the ________.
A. application's help menu
B. desktop
C. toolbar
D. start menu

Answers

Answer:

A

Explanation:

plz mark me brainlies

Answer:

A. Application's help menu

Explanation:

Write a constructor for BaseballPlayer. The constructor takes three int parameters: numHits, numRuns, and numRBIs storing the values within the class' ArrayList field named playerStats.

Answers

Answer:

Following are the code to the given question:

public class BaseballPlayer//defining a class BaseballPlayer

{

BaseballPlayer(int numHits, int numRuns, int numRBIs)//defining a parameterized cons

{

}

}

Explanation:

Some of the data is missing, which is why the solution can be represented as follows:

In this code, a class BaseballPlayer is defined, and inside the class a parameterized constructor is defined that holds three integer variable "numHits, numRuns, and numRBIs".

III. FILL-IN THE BLANK (five points each)
11. Open divided scales have scales going in
directions.
12. There are
groups of scales.
13. The open divided scales have an
unit preceding zero.
14. The triangular scale can have up to
different scales on one piece of plastic.
15. The mechanical inch is divided into
equal parts.

Answers

Jsjejshxjskksnxbfbsjchjsjens

Complete the getOdds method so it returns a new ArrayList of Integers containing all odd Integers from the parameter ArrayList vals in the order they originally appeared. The contents of vals should not change. For example if an ArrayList containing the Integers 2,5,8,6,7,3, 12 in that order is passed as a parameter to getOdds, it should return an ArrayList containing the Integers 5, 7,3 in that order. Write your getOdds method in the U7_L2_Activity Three class. Use the runner class to test your method but do not add a main method to your U7_L2_Activity Three.java file or your code will not be scored correctly.

Answers

Answer:

Following are the code to this question:

import java.util.*;//import package for user-input

public class U7_L2_Activity Three//defining  class U7_L2_Activity Three

{

  public static ArrayList<Integer> getOdds(ArrayList<Integer> val)//defining a static method getOdds as an ArrayList

  {

      ArrayList<Integer> odd = new ArrayList<Integer>();//creating ArrayList Object  

      int i; //defining integer variable  

      for(i=0;i<val.size();i++)//defining for loop for calculating odd values

      {

          if(val.get(i)%2!=0)//defining if block to check odd numbers

          {

              odd.add(vals.get(i));//add values in odd ArrayList  

          }

      }

      return odd;//return ArrayList odd

  }

  public static void main(String[] asr)//defining main method

  {

      int l,i;//defining integer variable

      Scanner sob = new Scanner(System.in);//creating Scanner calss Object

      ArrayList<Integer> num = new ArrayList<Integer>();//creating ArrayList object  

      System.out.println("Enter length of the ArrayList: ");//print message

       l = scan.nextInt();//input length value

      System.out.println("Enter ArrayList values: "); //print message  

      for(i = 0; i < l; i++)//use for to input value  

      {

          num.add(sob.nextInt());//input value

      }

      System.out.println("Odds list: " + getOdds(num));//calling method getOdds

      System.out.println("Original list: " + num);//print array value

  }

}

Output:

Enter ArrayList length:

7

Enter values:

2

5

8

6

7

3

12

Odds list: [5, 7, 3]

Original list: [2, 5, 8, 6, 7, 3, 12]

Explanation:

In the above-program inside the class, a static method "getOdds "is declared, that accepts an array list in its parameters, and defined an array list "odd", in this a for loop is defined, that check the odd numbers in the array and add the value in the odd Arraylist, and returns its values.

Inside the main method is defined that creates scanner class object for input array value and pass the value into the method "getodds" and print its return values.

Why are object-oriented languages very popular?
They can use flowcharts.
They can use pseudocode.
They are powerful, clear, and efficient.
They don't use binary.

Answers

Answer: I don't know the Choices but I can give u an example.

Explanation:

Other advantages of object-oriented programming languages are you can use it to kinds of web applications for thorough data analysis, less development time, accurate coding, easy testing, reusability, debugging, less data corruption, and maintenance.

Answer:

They are powerful, clear, and efficient.

Explanation:

HELP AASAP BRAINLIEST JUST HELP

Answers

Answer:

d

Explanation:

plz brainliest

Adding a paper clip to the vertical stabilizer of your glider will have what effect on its Center of Gravity (CG)?
The CG would move toward the rear.
The CG would stay the same.
The CG would move toward the nose.
O The CG would move lower

Answers

Answer:

the CG would move toward the rear.

Explanation:

Adding a paper clip to the vertical stabilizer of your glider will, the CG would move toward the rear. The correct option is A.

What is center of gravity?

The place on an item where the force of gravity is thought to act is known as the center of gravity (CG).

The gravitational pull is thought to be focused at the point where an object weighs on average. Depending on the object's size, shape, and mass distribution, the center of gravity will be in one place or another.

The impact of adding a paper clip to your glider's vertical stabilizer is to shift the center of gravity (CG) to the back of the glider.

This is due to the fact that the paper clip adds weight to the glider's rear, moving the center of mass there and, as a result, the center of gravity.

Thus, the correct option is A.

For more details regarding center of gravity, visit:

https://brainly.com/question/20662119

#SPJ6

write down the name of output devices

Answers

Answer:

Monitor

Printer

Headphones

Computer Speakers

Projector

GPS

Sound Card

Video card

Explanation:

monitor

printer

headphones

computer speakers

projector

GPS

sound card

video card

hope it helps you

plese follow me

attribute variables have the same meaning as participants variables. is this true or false?​

Answers

Answer:

true

Explanation:

because I said so dude

The measure of software complexity that measure how complex a software is in machine's viewpoint in terms of how the size of the input data affects an algorithm's usage of computational resources is known as Computational Complexity.

a. True
b. False

Answers

Answer:

a. True

Explanation:

In Computer science, an algorithm can be defined as a standard formula or procedure which comprises of set of finite steps or instructions for solving a problem on a computer.

Basically, the time complexity of an algorithm is defined by f(n) if; for all "n" and all inputs with length "n" the execution of the algorithm takes a maximum of f(n) steps. Therefore, this is a measure of the efficiency of an algorithm.

Hence, the time complexity is a measure of the amount of time required by an algorithm to run till its completion of the task with respect to the length of the inpu

Computational complexity can be defined as a measure of software complexity that measure how complex a software is in machine's viewpoint in terms of how the size of the input data affects an algorithm's usage of computational resources such as memory or running time.

The tool chest for programmers is also known as the CPU.
True or False?

Answers

Explanation:

I would say yes, but I'm not sure

Yeah I’m pretty sure it’s true

The Circle and CircleTester have been created, but they have errors. The public and private settings for variables and methods are not all correct.
Your job is to go through and fix them. You will need to make edits in both files to get them working correctly, but once complete, your output should match the output below.
Sample Output:
Circle with a radius of 5.0
The diameter is 10.0
The perimeter is 31.41592653589793
CIRCLE.JAVA
public class Circle {
public double radius;
private Circle(double myRadius) {
radius = myRadius;
private void setRadius(int myRadius){
radius = myRadius;
}
private double getDiameter() {
return radius*2;
}
public double getRadius() {
return radius;
}
private double getPerimeter() {
return Math.PI*getDiameter();
}
private String toString() {
return "Circle with a radius of " + radius;
}
}
CIRCLE TESTER.JAVA
public class CircleTester {
public static void main(String[] args) {
Circle circ = new Circle(10);
circ.radius = 5;
System.out.println(circ);
System.out.println("The diameter is " + circ.getDiameter());
System.out.println("The perimeter is " + circ.getPerimeter())
}
}

Answers

Answer:

CIRCLE.JAVA

public class Circle {

  private double radius;

  public Circle(double myRadius) {

    radius = myRadius;

    private void setRadius(int myRadius){

    radius = myRadius;

 }

 public double getDiameter() {

    return radius*2;

 }

 public double getRadius() {

   return radius;

 }

 public double getPerimeter() {

   return Math.PI*getDiameter();

 }

 public String toString() {

    return "Circle with a radius of " + radius;

 }

}

CIRCLE TESTER.JAVA

public class CircleTester {

 public static void main(String[] args) {

    Circle circ = new Circle(10);

    circ.radius = 5;

    System.out.println(circ);

    System.out.println("The diameter is " + circ.getDiameter());

    System.out.println("The perimeter is " + circ.getPerimeter())

 }

}

Explanation:

public class Circle {

  //This could be made private or public.

  //Making it private is better

  private double radius;

  //This is a constructor. It should be made public

  //since it would most likely be used in another class

  //to create an object of this class.

  //Making it private means no other external class can create

  //an object of this class.

  //Since the tester class (CIRCLETESTER.java), as shown on line 3,

  // needs to create

  //an object of this class, this should be made public

  public Circle(double myRadius) {

    radius = myRadius;

    private void setRadius(int myRadius){

    radius = myRadius;

 }

 //This should be made public since it will be

// used in another class (CIRCLETESTER.java in this case)

 public double getDiameter() {

    return radius*2;

 }

 public double getRadius() {

   return radius;

 }

 //This should be made public since it will be

 //used in another class (CIRCLETESTER.java)

 public double getPerimeter() {

   return Math.PI*getDiameter();

 }

 //The toString() method is the string representation

 //of an object and is called when there is an attempt to

 //print the object. It should be made public since it will

 //be used in another class (CIRCLETESTER.java)

 public String toString() {

    return "Circle with a radius of " + radius;

 }

}

CIRCLE TESTER.JAVA

public class CircleTester {

 public static void main(String[] args) {

    Circle circ = new Circle(10);

    circ.radius = 5;

    System.out.println(circ);

    System.out.println("The diameter is " + circ.getDiameter());

    System.out.println("The perimeter is " + circ.getPerimeter())

 }

}

At Moore High, 456 students attended the prom. This is 65 more students than
the previous year.
To the nearest percent, what is the percent of increase from last year to this
year?
12%
15%
17%
19%

Answers

Answer:

B-15%

Explanation:

Yes I agree the answer is B 15%

Many interesting science-, technology-, engineering-, and math-oriented websites provide open-source data to the public. Which of the following sites provide that information?

a. DATA.GOV
b. Whitehouse.gov
c. NYC Open Data
d. National Cancer Institute
e. International Genetics Foundation
f. creditscore.com
g. USPostal Service

Answers

Answer: a. DATA.GOV

b. Whitehouse.gov

c. NYC Open Data

d. National Cancer Institute

e. International Genetics Foundation

Explanation:

The mentioned websites will provide information about science, engineering, mathematics, and technology. These are open source websites and they can provide information to the public.

creditscore.com  and  US Postal Service these websites the above mentioned information. The former provides the credit report provided by the credit bureau and the other latter is related with the independent agency which provides postal services.

Write a program to insert an array of letters (word), then arrange the letters in ascending order and print this array after the arrangement.​

Answers

Answer:

def split(word):  

   return [char for char in word]

word = input("Enter a word: ")

chars = split(word)

chars.sort()

sorted = ''.join(chars)

print(sorted)

Explanation:

Here is a python solution.

divide the difference of 47 and 23 by the difference of 25 &13​

Answers

Answer:

The answer is 2

Explanation:

Why are object-oriented languages very popular?
They can use flowcharts.
They can use pseudocode.
They are powerful, clear, and efficient.
They don't use binary.

Answers

Answer:

Explanation:

Other advantages of object-oriented programming languages are you can use it to kinds of web applications for thorough data analysis, less development time, accurate coding, easy testing, reusability, debugging, less data corruption, and maintenance.

Which of the following is NOT one of the Internet sources that hackers use to gather information about a company's employees?

1. Blogs
2. Company website
3. Social networking sites
4. Regional Internet registries

Answers

Answer:

4. Regional Internet registries

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

With cybersecurity theory, security standards, frameworks and best practices we can guard against cyber attacks and easy-to-guess passwords such as using alphanumeric password with certain composition and strength.

Some examples of the Internet sources that hackers use to gather information about a company's employees includes;

I. Blogs.

II. Company website.

III. Social networking sites.

However, Regional Internet registries cannot be used by hackers to gather information about a company's employees because it is an internet protocol resource organization saddled with the responsibility of allocating and registering internet protocol (IP) addresses.

Which of the following is not a form of technology?

A) computer

B) ketchup

C) pencil

D) umbrella

Answers

Answer:

ketchup because all of the others are objects with certain creative functions but ketchup is just K e t c h u p.

Answer:
A well known answer yes u guessed ryt it’s “Ketchup”.
Horaayy felicitations to u


Now back to the question, according to the definition of “technology”:
“An equipment or machinery made by engineering or applied science/sciences is called technology”.
As u can c that ketchup is this certainly not a technology rather a recipe/food item etc.

How do we use game maker?

Answers

Answer:

The easy to use powerful game engine that is the best for 2D games

compare and contrast Charles bebbage and Blaise Pascal inventions

Answers

Explanation:

A computer might be described with deceptive simplicity as “an apparatus that performs routine calculations automatically.” Such a definition would owe its deceptiveness to a naive and narrow view of calculation as a strictly mathematical process. In fact, calculation underlies many activities that are not normally thought of as mathematical. Walking across a room, for instance, requires many complex, albeit subconscious, calculations. Computers, too, have proved capable of solving a vast array of problems, from balancing a checkbook to even—in the form of guidance systems for robots—walking across a room.

Before the true power of computing could be realized, therefore, the naive view of calculation had to be overcome. The inventors who laboured to bring the computer into the world had to learn that the thing they were inventing was not just a number cruncher, not merely a calculator. For example, they had to learn that it was not necessary to invent a new computer for every new calculation and that a computer could be designed to solve numerous problems, even problems not yet imagined when the computer was built. They also had to learn how to tell such a general problem-solving computer what problem to solve. In other words, they had to invent programming.

They had to solve all the heady problems of developing such a device, of implementing the design, of actually building the thing. The history of the solving of these problems is the history of the computer. That history is covered in this section, and links are provided to entries on many of the individuals and companies mentioned. In addition, see the articles computer science and supercomputer.

Early history

Computer precursors

The abacus

The earliest known calculating device is probably the abacus. It dates back at least to 1100 BCE and is still in use today, particularly in Asia. Now, as then, it typically consists of a rectangular frame with thin parallel rods strung with beads. Long before any systematic positional notation was adopted for the writing of numbers, the abacus assigned different units, or weights, to each rod. This scheme allowed a wide range of numbers to be represented by just a few beads and, together with the invention of zero in India, may have inspired the invention of the Hindu-Arabic number system. In any case, abacus beads can be readily manipulated to perform the common arithmetical operations—addition, subtraction, multiplication, and division—that are useful for commercial transactions and in bookkeeping.

The abacus is a digital device; that is, it represents values discretely. A bead is either in one predefined position or another, representing unambiguously, say, one or zero.

Analog calculators: from Napier’s logarithms to the slide rule

Calculating devices took a different turn when John Napier, a Scottish mathematician, published his discovery of logarithms in 1614. As any person can attest, adding two 10-digit numbers is much simpler than multiplying them together, and the transformation of a multiplication problem into an addition problem is exactly what logarithms enable. This simplification is possible because of the following logarithmic property: the logarithm of the product of two numbers is equal to the sum of the logarithms of the numbers. By 1624, tables with 14 significant digits were available for the logarithms of numbers from 1 to 20,000, and scientists quickly adopted the new labour-saving tool for tedious astronomical calculations.

Most significant for the development of computing, the transformation of multiplication into addition greatly simplified the possibility of mechanization. Analog calculating devices based on Napier’s logarithms—representing digital values with analogous physical lengths—soon appeared. In 1620 Edmund Gunter, the English mathematician who coined the terms cosine and cotangent, built a device for performing navigational calculations: the Gunter scale, or, as navigators simply called it, the gunter. About 1632 an English clergyman and mathematician named William Oughtred built the first slide rule, drawing on Napier’s ideas. That first slide rule was circular, but Oughtred also built the first rectangular one in 1633. The analog devices of Gunter and Oughtred had various advantages and disadvantages compared with digital devices such as the abacus. What is important is that the consequences of these design decisions were being tested in the real world.

Digital calculators: from the Calculating Clock to the Arithmometer

In 1623 the German astronomer and mathematician Wilhelm Schickard built the first calculator. He described it in a letter to his friend the astronomer Johannes Kepler, and in 1624 . .

write an algorithm to find the average of six numbers​

Answers

Answer:

Input: two numbers x and y Output: the average of x and y Step 1 : input x,y Step 2: sum=0,average=0 Step 3:sum = x + y Step 4:average = sum /2 Step 5: print average.

Explanation:

Input: two numbers x and y Output: the average of x and y Step 1 : input x,y Step 2: sum=0,average=0 Step 3:sum = x + y Step 4:average = sum /2 Step 5: print average.

Algorithms are set of instructions which are to be followed in other to solve a particular problem. The algorithm which gives the average of six values goes thus:

1.)

Input : a, b, c, d, e, f

#takes input of the six numbers

2.)

sum=0 ; average=0

# initialize sum and average variables to 0

3.)

sum = a + b + c + d + e + f

#takes the sum of the six numbers

4.)

average = sum /6

#divide the sum by the number of values.

5)

print average.

#display the average value

Learn more : https://brainly.com/question/24266817

What effect would excluding quotation marks from a search phrase have?
A.
It would narrow down the search.
B.
It would have little or no impact on the search.
C.
It would broaden the search.
D.
It would cause the search engine to bring up very different results.

Answers

Answer: C

 it would broaden the search

Explanation:

Placing quotation marks around a search term or phrase limits your search to that exact term or phrase. Without the quotes, your search engine may return all results that contain each separate word. Placing AND between your keywords will return results that only include both or all your keywords.

Answer:

The answer is C. It would broaden the search.

Explanation:

I got it right on the Edmentum test.

Consider the following code segment.
firstList + ["guitar", "drums", "bass"]
secondList + ["flute", "violin"]
thirdList = []
thirdList + firstList
firstList secondList
secondlist thirdList
What are the contents of secondList after the code segment is executed?
А
[]
00
["guitar", "drums", "bass"]
с
["flute", "violin"]
D
["flute", "violin", "guitar", "drums", "bass"]

Answers

Answer:

[tex]secondList = ["guitar", "drums", "bass"][/tex]

Explanation:

At the third line of the code segment:

An empty list thirdList is created

At the fourth line of the code segment:

The content of firstList is passed into thirdList

i.e. [tex]thirdList = ["guitar", "drums", "bass"][/tex]

At the fifth line of the code segment:

The content of secondList is passed into firstList

i.e. [tex]firstList =  ["flute", "violin"][/tex]

At the fifth line of the code segment:

The content of thirdList is passed into secondList

i.e. [tex]secondList = ["guitar", "drums", "bass"][/tex]

write a python program to accept a number and check whether it is divisible by 4 or not​

Answers

Answer:

number = int(input("Enter number: "))

if (number % 4):

 print("{} is not divisible by 4".format(number))

else:

 print("{} is divisible by 4".format(number))

Explanation:

If the %4 operation returns a non-zero number, there is a remainder and thus the number is not divisable by 4.

When defining a class, it is a best practice to declare ____ as private. constructors mutators nothing should be private accessors variables

Answers

Answer:

The answer is "variables".

Explanation:

It is necessary to declare a variable privately when declaring a class because the private variable 'protects' the code while it is in operation. It may not aim to protect it at this stage from changing the codes themselves for other developers. Its purpose of the so-called "data hiding" is to hold the internal data from many other classes using the class protected.

What is the relationship between a database and an information system and what impact does this relationship have on database design?
Respond to one or both of the following statements:

a. It is impossible to produce good information from poor data.
b. No matter how sophisticated the application programs are, it is impossible to use good application programs to overcome the effects of bad database design.

Answers

Answer:

b

Explanation:

hhiivibibu9 gg8 oh 8h h9 h 0h9

Other Questions
A fish tank has 150 gallons of water and is being drained at a rate of 1/2 gallon each second. A fish tank has 120 gallons of water and is being filled at a rate of 1/4 gallon each second. After how many seconds will the ywo fish tanks have the same amount of water? what was a possible danger Washington warned you may lay ahead and the future of our nation? Possible reasons we need sleep include.. rest and repair of the body. B. brain development. C. processing of memories. D. all of the above. True or false Anabolic steroids are mostly made from estrogen and are used to build muscle mass and make people stronger. Lena placed a dot on each vertex (corner) of this cube.How many dots did she use? how can scientists use fossil records from locations around the world to determine geologic timescale the radius of a cylindrical gift box is (3x+2) inches the height of the box is three times the radius what is the surface area of the cylinder AZT works by interfering with HIV's production of offspring inside a host cell. It does so by interacting with a molecule called reverse transcriptase.a. Trueb.False What is the indirect object pronoun in this sentence? He gives her them,hergivesthemhe What makes up a complex sentence? pls help i will give brainliest Write expressions that represent the horizontal and vertical side lengths of the triangle. Which statement best describes Africa after ww2 ughhhhhhh help again please!!! If s= 6 inches, and the altitude, h, is 21 inches, what is the volume of the pyramid? Priscilla makes bracelets that cost her $4 each to make. If she marks them up 120%, How much does she sell one bracelet for ? A) $4.48B) $4.80C) $8.80D) $9.60The Beta Club just finished raising money for a community service project. The goal for the fundraiser was $600 and they exceeded the goal by 12%. How much money did the club raise for the service project? A) $50B) $72C) $672D) $720 what do you mean by social duty? A box of cereal weighs 12 ounces and costs $2.16. What is the price of the cereal per ounce? "The students were like ants around a cereal box," is an example of what type of figurative language?A.metaphorB.simileC.idiomD.onomatopoeia The solution to a system of linear equations is (0, 4).One of the linear equations in the system isy = 8x +4.Which equation could be the other linear equation in the system? y=8 y= 4.0 y = 80 y=4