1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
postnew [5]
2 years ago
12

Does anyone know how to permanently delete photos on a dell computer? For my cousin.

Computers and Technology
1 answer:
strojnjashka [21]2 years ago
6 0

Answer: If your trying to get rid of em. The best way to do that is to put them in the recyling bin and then empty it. Doing that will delete them off your computer so they can't be found.

Explanation: Also keep in mind that whether or not you delete them they'll still be on your hard drive.

You might be interested in
Organizations should communicate with system users throughout the development of the security program, letting them know that ch
Fed [463]

Answer:

Yes it is true.The organization should indeed communicate with a system user throughout the development of a security program. A corporation needs a security policy that must be developed by management at all levels, including organization and employees at the operational level. For a corporate security plan, it is essential to reduce the resistance of the expected changes and define the objective.

Explanation:

Three objectives of the security plan in an organization are:

  • Identify the sensitive system and plan
  • Create and define the strategy and control of the system.
  • Develop and implement the training programs.

Security Information is one of the essential factors in the organization.For an organization, the information should be protected.

7 0
3 years ago
What types of items can tab be used to complete once you start typing the entities' name?
White raven [17]
The answer to this question is <span>file, command, or directory names
File is the part of the program that could be used to store various information. The command is part of the program that give abilities for user to run a certain program within the system operation. Directory names will create some sort and arrangement on collection of files</span>
3 0
3 years ago
A bitmap picture can be represented by hexadecimal numbers. Each two-digit hexadecimal number represents a row. To convert a num
adelina 88 [10]

Answer:

answer C. 00 38 44 etc.

Explanation:

Divide the bitmap in horizontal strips of 4 pixels (let's call them nibbles).

Use the following table to map each nibble to a hexadecimal number where 0 =white, 1=black:

0000 = 0

0001 = 1

0010 = 2

0011 = 3

0100 = 4

0101 = 5

0110 = 6

0111 = 7

1000 = 8

1001 = 9

1010 = A

1011 = B

1100 = C

1101 = D

1110 = E

1111 = F

4 0
3 years ago
What's wrong with Brainly now? Now people think it's site for s.ex which it isn't. These weirdos need to go
Dmitry [639]

Answer:

Honestly it is disgusting.

6 0
3 years ago
Read 2 more answers
What is one outcome of an integration point?
mylen [45]

Answer:

What is one outcome of an integration point? It provides information to a system builder to potentially pivot the course of action. It bring several Kanban processes to conclusion. It supports SAFe budgeting milestones.

5 0
4 years ago
Other questions:
  • Max magnitude Write a method maxMagnitude() with two integer input parameters that returns the largest magnitude value. Use the
    13·1 answer
  • When using a target drive that is fat32 formatted, what is the maximum size limitation for split files?â?
    12·1 answer
  • Assume you have functions f and g such that f(n) is O(g(n)). For each of the following statements, decide whether you think it i
    12·1 answer
  • Developers and organizations all around the world leverage ______ extensively.
    9·2 answers
  • Which of the following demonstrates the proper way to specify a variable-length argument list?
    7·1 answer
  • Convert the following numbers to binary numbers: 5 , 6 , 7 , 8 , 9 .​
    13·2 answers
  • What’s your tiktok? if u have one
    10·2 answers
  • Bộ mã I mã hóa được nhiêu kí tự
    12·1 answer
  • It is most commonly used for self-running presentations.
    8·1 answer
  • Trying to make the baseplate red and turn off can collide then the game waits 5 seconds and turns on can collide, making the bas
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!