The provided assignment submission attach file

Assignment Help Basic Computer Science
Reference no: EM13865591

Exploring the Machine

Submission Instructions

  • Submit all files and written responses at the same time as one (1) complete submission.
  • Screenshot File Submission: You must submit the screenshot file(s) using the provided Assignment Submission Attach File function located in the Blackboard online course shell. To access Assignment Submission Attach File function, you must select the Assignment submission link located in Week 2 of the online course shell. Note: If you need a tutorial on taking a screen shot, visit one of the following locations:  PC UsersMAC Users
  • Written Submission: You must submit written responses in the provided assignment submission text box located in the Blackboard online course shell. To access the assignment submission text box, you must select the Assignment submission link located in Week 2 of the online course shell.

Complete the following:

  1. Viewing system information (Screenshot and written response required)
    1. View the system information (i.e., operating system, processor, memory) of the computer. (Help: From the Control Panel, select System and Security, and then select System; This navigation may vary depending on the version of Windows that you are currently using.)
    2. List the computer's operating system, version of operating system, processor, and total memory (RAM) installed.
    3. Take a screenshot displaying the system information as evidence of completion. Save the screenshot using an image file format (e.g., .png, .jpg, .jpeg, .gif, or .bmp). Name the screenshot file using your full name followed by the word 'System' (e.g. JohnDoeSystem.png).
    4. Submit the file and written response according to the submission instructions.
  2. Exploring the Task Manager (Screenshot required)
    1. Locate and view the Windows Task Manager on the computer. (Help: Commonly, you may open the Task Manager by right-clicking the taskbar, and then clicking 'Start Task Manager'; Or, by using the keyboard shortcut Ctrl+Shift+Delete; This navigation may vary depending on the version of Windows that you are currently using.)
    2. Record the total number of processes that are actively running.
    3. Record the single process that is using the most memory.
    4. Take a screenshot displaying the total number of processes running, and the process that is using the most memory as evidence of completion. Save the screenshot using an image file format (e.g., .png, .jpg, .jpeg, .gif, or .bmp). Name the screenshot file using your full name followed by the word 'Activity' (e.g. JohnDoeActivity.png). Note: You may submit two (2) screenshots if necessary.
    5. Submit the file(s) and written response according to the submission instructions. 
    Creating a new folder (Screenshot required) 
    1. Create a folder on the desktop of the computer and name the folder using your full name. (e.g. John Doe).
    2. Take a screenshot of the desktop with your newly created folder in the screenshot.
    3. Save the screenshot using an image file format (e.g., .png, .jpg, .jpeg, .gif, or .bmp). Name the screenshot file using your full name followed by the word 'Folder' (e.g. JohnDoeFolder.png).
    4. Submit the file according to the submission instructions.

Reference no: EM13865591

Questions Cloud

How ford handled the matter with the pinto? : Evaluate Toyota actions from a corporate governance perspective. How would you characterize the ethical culture at Toyota at least with respect to the Lexus incident? Can you draw any parallels between the Toyota experience and how Ford handled the m..
Relationnal database design : 1-Relationnal database design: (Relationnal database design )Given the following table that keeps track of student clubs memberships: StuentClub( S
Discuss what you think jennings meant by this statement : When an organization collapses ethically it means that those in the organization have drifted into rationalizations and legalisms and all for the purpose of getting the results they want and need at almost any cost  Discuss what you think Jennings me..
What are some of the ethical issues : What are some of the ethical issues that have emerged as the result of technology based globalization?
The provided assignment submission attach file : Screenshot File Submission: You must submit the screenshot file(s) using the provided Assignment Submission Attach File function located in the Blackboard online course shell. To access Assignment Submission Attach File function, you must select the ..
What is at stake for you (kristen)? : What is at stake for the key parties? What is at stake for you (Kristen)?What are the main arguments that you are trying to counter assuming you know Troy position on the matter and what are the reasons and rationalizations you need to address?
Write a select statement that will display student details : Write a select statement that will display student id, student last name and the number of courses a student has been enrolled. You will need to join two table, use a COUNT aggregate and a GROUP BY clause in your SELECT statement.
Explain the importance of business rules in database design : How would you explain the importance of business rules in database design? What tables would you create, and what would be the entity names and attribute names? What are the business rules that must be considered in this design?
What is the ethical message of phar-mor? : Assume Cherelstein decides to use Rest Model of Morality to reason out what the right thing to do is and how to carry out the action. Apply the logic of the model to Cherelstein decision-making process What do you think he should do at this point and..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Prove by induction of recurrence relation has solution

Describe why Kim's recurrence relation is correct. Prove by induction that Kim's recurrence relation has solution: M(k) = 3^(k - 1).

  Cybersecurity research papersummary:

Cybersecurity Research PaperSummary: After selecting a topic from the approved list (see below), you will research a cybersecurity incident using news articles, magazine articles (trade press), journal articles, and/or technical reports from governme..

  Compare time complexity of convolution with kernel

Compare the time complexity of convolution with a n x n kernel when using: direct convolution with the 2-D mask, and separable kernel.

  Designing vb applications across multiple platforms

This assignment will contain two (2) Parts: Written Paper and Visual Basic Prototype. The Visual Basic Prototype is not included in the total page count but is included in the evaluation of your assignment. You must submit both parts for the compl..

  Characteristic of databases

1. Which of the following is a characteristic of databases?

  Find an efficient algorithm to determine

Find an efficient algorithm to determine

  Is it possible free internet content might one day replace

Is it possible that free Internet content might one day replace textbooks

  Describe the risks associated with not fulfilling activities

Describe the risks associated with not fulfilling the activities outlined within your maintenance plan. Indicate specific activities, personnel / resources required, and frequency of execution.

  Research options for improving the current use of tcp/ip

Research options for improving the current use of TCP/IP and recommend new software and equipment that's available.

  How can you delete the windows old folder

How can you delete the Windows old folder.

  Write a module to determine mean of the grades

Write a module to print the student's id, name, and grade for student with highest grade and with lowest grade, respectively.

  Techniques attacker use to access information on system

Recognize all potential security threats on home personal computer. Recognize some of techniques the attacker might use to access some information on system.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd