What processes on my computer should not be closed?

Updated on technology 2024-03-21
6 answers
  1. Anonymous users2024-02-07

    Use the System Process Status of 360 Security Guard's Advanced Features to know which processes can be shut down.

    For the "advanced" features, some beginners are often afraid to do it, in fact, it is not very difficult, here I will only talk about some commonly used, easy functions.

    1. Fix Internet Explorer. This feature is useful when the Internet Explorer browser is not working properly, especially when the Internet Explorer homepage is modified.

    We generally don't choose these repair options above, you can use the default selection of the system, we directly click "Repair Now" to enter the window below:

    It means that the repair has been completed, and click "Back" to perform other operations.

    2. Initiation status. The so-called startup items are programs that start running when the computer is turned on, and some Trojans and viruses will also appear here. So if we clean up the useless startup items, we can improve the performance of the computer and prevent some wooden and virus from running.

    Click "Startup Item Status" to automatically detect the PC, and then go to the window below:

    In the image above, we can see from the "Security Level" column that we can enable what the system thinks is "safe". For the "unknown", if you know what it is for, useless to yourself, then you can disable it, but be cautious. For the "Dangerous" one, then be sure to select it and click "Disable Selection".

    3. System service status. Stopping some malicious services can improve your computer's performance. Click "System Service Status", the system will automatically detect the startup program of the computer, and then enter the following window:

    As with the startup status above, we can ignore it for "safe" or "unknown", but stop for "dangerous" by clicking on the item you want to stop and clicking "stop" in the prompt that appears. As shown below:

    4. System process status. Click "System Process Status" and the system will automatically detect the processes that are running on the computer, stop useless and dangerous processes, and improve the performance of the computer, as shown in the following figure:

    Computer Skills Collector - Computer Basics - 360 Security Guard Basic Tutorial: Advanced Features).

    In the upper window, we ignore it in the lower part and only look at the "Security Level" in the upper half, and again, if it is "Dangerous", then select it and click the "End Selected Process" button.

    5. Comprehensive diagnosis of the system. Click "System Comprehensive Diagnosis", the system will automatically detect the running status of the computer, and enter the following window:

    This item seems to be very complicated, in fact, the principle is the same, we don't pay attention to the green symbol in the "group", for other symbols, we click on it, and then look at the details of the window on the right, mainly look at the "security level", "recommended action", "repair method", if the "security level" is dangerous, select it, and then click "repair the checked", the following prompt appears:

    Click "Continue Repair" and you're done. Isn't it easy?

  2. Anonymous users2024-02-06

    The easiest way to do this is: open the Task Manager, click on Processes, and see.

    The username is the owner's, and the process you don't need to use it.

    It doesn't matter if it's disabled. Whereas.

    The username is system.

    Indicates that it is a system process and is disabled.

    Some features may be lost. Therefore, the owner process is generally disabled. Look at what you need.

    What. No, you don't.

    owner process.

    It's disabled.

  3. Anonymous users2024-02-05

    Start --- run -- enter msconfig enter--- system configuration utility appears --- point start,Cancel the checkmark in front of all programs except antivirus software,Firewall,Input method,Restart the computer,So that the redundant process is also closed accordingly。

  4. Anonymous users2024-02-04

    It is part of the BVR** software tool suite. It provides fax, book, email, and other functions.

    hpwuschd2

    Or the process name: hewlett

    packard

    software

    update

    scheduler

    The rest is either Rising's process or the 360 process.,As for the rundll32 process,You can delete it or not.,But it doesn't take up much memory.,Deleting it doesn't do much.。

  5. Anonymous users2024-02-03

    1. I believe everyone understands that this is the process of PS. If PS is running, the process will run. Closing the process is just turning off the ps.

    2. The process is the process of Google Chrome. To close the process is to close Google Chrome.

    3. : It is the process of Kugou**.

    4. It is Windows Program Manager or Windows Explorer.

    Tray: It's the process of 360 Security Guard.

    6. : Input method language column.

    7. Input method.

    9. : Setting of the sound card.

    10. : Intel's user interface public handler, which can be turned off.

    12. :IE's process is closed, and the web page is closed.

    13、:sogou input method.

  6. Anonymous users2024-02-02

    Open".Task Manager”。Select the second item, Process. Locate the software process that needs to be shut down.

    Select "End Process" to end the computer process. Detailed steps:

    1. Right-click the taskbar at the bottom of the system interface.

    Select Task Manager.

    2. Click on the option to open the "Task Manager". Select the second item, Process.

    3. In the process column, find the software process that needs to be closed.

    4. Select "End Process" to end the computer process.

Related questions
8 answers2024-03-21

Sir. No, you can't

Arranger: Xu Liang L >>>More

13 answers2024-03-21

In Yunnan, ethnic minorities like to use it"Mixed drinking method", that is, adding their favorite adjuncts to Pu'er tea, such as Tibetan butter tea; The Han prefers the "clear drinking method", that is, brewing without any auxiliary ingredients. Only by deeply understanding the tea properties of Pu'er tea can we easily brew the color, aroma, taste, taste, rhyme and gas of Pu'er tea. By the Shentong tea artist, the aged Pu'er tea can be brewed in a purple clay pot, which can be brewed for more than 20 bubbles, and its taste is not reduced, and its color is still bright, which is comparable to the best wine. >>>More

33 answers2024-03-21

The landlord is not in a good situation, people have made it clear that the installer has not arrived can not open the box, and you yourself have opened, if you really want to open it should be asked to open in person when Suning personnel are there, but you have opened this yourself It is not easy to say, not to mention that the bill of goods has also been taken away, it is good to say that there is no payment, if you pay it is difficult to do. In the current situation, if you want to protect your interests, then you have to insist that everything is incomplete, and if you stick to it, it is estimated that they will not entangle you for a small giveaway. >>>More

6 answers2024-03-21

First of all, it depends on which disk your system is installed in (usually in the C drive), and it doesn't matter if the system is not in the C drive. Except for system files, all other files can be deleted.

9 answers2024-03-21

The configuration is no problem.,I guess you seem to have been instigated to buy a dual graphics card.,It doesn't seem to have switched to 512 independent graphics when you play lol? >>>More