A user is complaining about sluggish performance on her Linux system, and the technician suspects a running process is consuming excessive processor resources. Which of the following commands will the technician most likely use to locate the offending process?a. ps
b. kill
c. dd
d. vi

Answers

Answer 1
Answer:

Answer:

Option (A) i.e., ps is the correct option to the following question.

Explanation:

Because this is the command used in Linux to know about the processes that are currently running including the (PID's). If the user of the Linux operating system runs that command without the argument then it shows that processes that are currently running on the current shell and every process have the PID number i.e., process identification number.


Related Questions

(JAVA PLS)Your job in this assignment is to write a program that takes a message as a string and reduces the number of characters it uses in two different set ways. The first thing your program will do is ask the user to type a message which will be stored as a String. The String entered should be immediately converted to lowercase as this will make processing much easier. You will then apply two different algorithms to shorten the data contained within the String.Algorithm 1This algorithm creates a string from the message in which every vowel (a, e, i, o, and u) is removed unless the vowel is at the very start of a word (i.e., it is preceded by a space or is the first letter of the message). Every repeated non-vowel character is also removed from the new string (i.e., if a character appears several times in a row it should only appear once at that location). So for example the string "I will arrive in Mississippi really soon" becomes "i wl arv in mssp rly sn".After applying this algorithm, your program should output the shortened message, the number of vowels removed, the number of repeated non-vowel characters removed, and how much shorter the shortened message is than the original message. The exact format in which the program should print this information is shown in the sample runs.Algorithm 2This algorithm creates a string by taking each unique character in the message in the order they first appear and putting that letter and the number of times it appears in the original message into the shortened string. Your algorithm should ignore any spaces in the message, and any characters which it has already put into the shortened string. For example, the string "I will arrive in Mississippi really soon" becomes "8i1w4l2a3r1v2e2n1m5s2p1y2o".After applying this algorithm, your program should output the shortened message, the number of different characters appearing, and how much shorter the shortened message is than the original message. The exact format in which the program should print this information is shown in the sample runs.Sample Run 1Type the message to be shortenedThis message could be a little shorterAlgorithm 1Vowels removed: 11Repeats removed: 2Algorithm 1 message: ths msg cld b a ltl shrtrAlgorithm 1 characters saved: 13Algorithm 2Unique characters found: 15Algorithm 2 message: 4t2h2i4s1m5e2a1g1c2o1u3l1d1b2rAlgorithm 2 characters saved: 8Sample Run 2Type the message to be shortenedI will arrive in Mississippi really soonAlgorithm 1Vowels removed: 11Repeats removed: 6Algorithm 1 message: i wl arv in mssp rly snAlgorithm 1 characters saved: 17Algorithm 2Unique characters found: 13Algorithm 2 message: 8i1w4l2a3r1v2e2n1m5s2p1y2oAlgorithm 2 characters saved: 14
A device that makes it possible for multiple customers to share one address is called a/n _____.NATWLANDSLURL
MacBook Pro (2019) at 93% max capacity battery rating after 100 charge cycles. Is this normal? Used coconut battery to check this.
A plain text e-mail and the same text entered into a word processing document would be about the same file sizes.
Scientific NotationRepresent the following numbers in scientific notation0.0000000000067890.14780000000000000030.20000000000.00673480000.000003561201000000002000.34

The file extension of MS-Word document in office 2007 is?(a) .pdf (b) .doc (c) .docx (d) .txt

Answers

It is usually .doc but if you use notepad, (the free version of Word) it's .docx

Answer:

dotx

Explanation:

Just took the test on Edge

What is the speed of sound?

Answers

The answer is 340 m/s

The process of combining rows and columns in a table is called _____.Choose one answer.
a. marrying
b. blocking
c. banding
d. merging

Answers

The Answer of the given question : D. Merging

The small diagonal arrow in some command groups lower-right corner is a __________.A. drop-down arrow
B. dialog box launcher
C. navigation control
D. gallery launcher

Answers

The correct answer is B

Weakness in software can be more quickly uncovered and exploited with new software tools and techniques. True
False

Answers

false because it might damage it more but if it was recommended by lots of people i mean the software then its true

While investing an email issue, a support technician discovers no user can access their email accounts on the company’s email server connected to the private LAN. Pinging the email server form several workstations on the LAN results in 0% packet loss.Which of the following is the next step the technician should take in troubleshooting the issue?

Contact ISP, inform provider of issue, ask provider to check server.
Verify server has valid IP address on Lan subnet
Escalate problem to server admin to check issues with server.
Check workstations on Lan for APIPA configuration.

Answers

Answer:

The answer is D Check workstations on Lan for APIPA configuration.

Explanation:

1)

While investing an email issue, a support technician discovers no user can access their email accounts on the company’s email server connected to the private LAN.

Pinging the email server form several workstations on the LAN results in 0% packet loss.

Check workstations on Lan for APIPA configuration next step the technician should take in troubleshooting the issue.

Answer:

Check workstations on Lan for APIPA configuration.

Explanation:

IP address is a logical address used in a network to initiate communication between devices. It is assigned to all the end devices like the client computers, servers, printers, scanners etc.

IP addresses can be assigned statically or dynamically. Static IP address configuration requires that a hardcoded address is configured to a computer permanently. The address must be in the same subnet or network. Dynamic IP addressing configures a DHCP server or router to lease IP addresses dynamically to computers. When the computer is unable to reach the server, the APIPA is automatically configured to system which responds to ping but does not receive or send packets to servers.