________provides a real-time graph of computer performance, either in the current time or as logged historical data

a. Performance Monitor
b. Reliability Monitor
c. Resource Monitor
d. Task Manager

A. Performance Monitor displays activity for selected objects and counters.

Computer Science & Information Technology

You might also like to view...

MSDS is a type of fire extinguisher

Indicate whether the statement is true or false

Computer Science & Information Technology

Using ________, attackers find vulnerabilities in the target system and then exploit those vulnerabilities.

A. privacy loss B. social engineering C. system and network attacks D. information leakage

Computer Science & Information Technology