Examples of using Running processes in English and their translations into Spanish
{-}
-
Colloquial
-
Official
End any running processes and click Next.
That is, it only showed entities with no running processes.
List the running processes and their PID(Process ID).
Offers a detailed overview of all running processes.
Manage running processes to reduce battery draining.
This will show the currently running processes on your system.
Running processes not necessary to meet the needs of our customers.
It contains a list of running processes and loaded kernel modules.
The nobody and nobody4 accounts should never be used for running processes.
Shows all running processes, services and locked files.
First, you need to close iTunes and all its running processes, here's how.
Ensure that the running processes use the new binaries.
Allows you to check your system's performance and manage the running processes.
Detailed information about running processes(available via SNMP).
Scan running processes on your computer and kills those who are malicious.
Display information on all the running processes with ASCII art output.
DESCRIPTION Renice alters the scheduling priority of one or more running processes.
Applicative: running processes and services and related resource consumption.
Task Manager/Task killer(Free up RAM and CPU by killing running processes/apps).
Reniced- Renice running processes based on regular expressions.
Display information on all the running processes using BSD style output.
View running processes with detailed information about each process. .
Show all detailed information of running processes and threads on your machine;
Use short running processes where response time requirements are present.
Added ability to scan hidden running processes for Windows Vista and Windows 7.
Use short running processes or mediation flow components for such requirements.
Uninstall Wizard: detection of running processes among found traces; termination on request.
Individual long running processes orchestrate tasks and invocations to backend systems.
Use of these accounts for running processes could lead to unexpected security risks.