________provides a real-time graph of computer performance, either in the current time or as logged historical data
a. Performance Monitor
b. Reliability Monitor
c. Resource Monitor
d. Task Manager
A. Performance Monitor displays activity for selected objects and counters.
Computer Science & Information Technology
You might also like to view...
MSDS is a type of fire extinguisher
Indicate whether the statement is true or false
Computer Science & Information Technology
Using ________, attackers find vulnerabilities in the target system and then exploit those vulnerabilities.
A. privacy loss B. social engineering C. system and network attacks D. information leakage
Computer Science & Information Technology