1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
luda_lava [24]
2 years ago
6

Why should you delete files from your computer

Computers and Technology
2 answers:
soldier1979 [14.2K]2 years ago
7 0

Answer:

Why should you delete files from your computer

Explanation:

You should delete files permanently from your computer because removing that data completely opens up space on your hard drive and improves overral PC performance

notka56 [123]2 years ago
5 0

deleting files can free up space and prevent hackers from accessing your sensitive files

You might be interested in
Explain how the operating system controls the software and hardware on the computer?
NemiM [27]

<em>One of the features of Operating System is </em><em>it manages and communicates with your system hardware </em><em>by means of Drivers. </em>

<em>Drivers </em><em>are special software within the OS that interacts to the hardware. Drivers uses kernel, a part of the operating system that functions intended to it. For example, when you press Ctrl and P keys on the keyboard, the kernel would recognize this command and would trigger the corresponding hardware in relation to this command. In this case, the corresponding hardware is printer. The kernel would tell the printer to print the document.</em>

8 0
3 years ago
________ take computers with wireless connections through an area and search for unprotected wireless networks, and then monitor
KengaRu [80]

Answer:

The correct answer for the following question will be C. War driver.

Explanation:

The act of searching for network (wireless) in a moving vehicle by a person (using laptop and mobile phones) is known as War driver. We can also call it a free WiFi access point publicly.

The other three options like :

  • Key loggers (basically a software).
  • Pretexter (used for scam, getting someones personal information).
  • Phishers (used to obtain users sensitive information such as, username, password etc).

None of the option is used for networking, not able to perform such types of tasks as war driver.

So, option C is the correct answer.

3 0
3 years ago
If you get your foot stuck in a cloud how many colors can you smell with you ears
suter [353]

Answer: 42 is the answer to everything and just remember, Don,t panic.

For i am the hitch hikers guide to the galaxy.

 

Explanation:

7 0
3 years ago
Which features of words are used to separate numbers and texts into columns
ad-work [718]

Answer:Data Tools, Text to Columns can be used to separate data in a single column into multiple columns, such as if you have full names in one column and need a column with first names and a column with last names.

Explanation:

3 0
3 years ago
If Number = 7, what will be displayed after code corresponding to the following pseudocode is run? (In the answer options, new l
kherson [118]

Answer:

5,10; 6,12; 7,14

Explanation:

We will demonstrate the iteration of the loop:

First iteration: Number = 7, Count = 5 at the beginning. We will check if Count <= Number? Since it is correct, prints 5,10. Increment the Count by 1.

Second iteration: Number = 7, Count = 6. We will check if Count <= Number? Since it is correct, prints 6,12. Increment the Count by 1.

Third iteration: Number = 7, Count = 7. We will check if Count <= Number? Since it is correct, prints 7,14. Increment the Count by 1.

Forth iteration: Number = 7, Count = 8. We will check if Count <= Number? Since it is not correct, the loop stops.

8 0
3 years ago
Other questions:
  • Alice has to move around a lot to fetch objects at her workstation. Which ergonomic principle should Alice follow to prevent str
    8·2 answers
  • Given a floating point variable fraction, write a statement that displays the value of fraction on the screen. Do not display an
    13·1 answer
  • Word 2013 opens, by default, on a blank document?
    13·2 answers
  • A multistep protocol used to identify and control potential threats to food-safety is the
    8·1 answer
  • Write a C program that creates two threads to run the Fibonacci and the Runner processes. Threads will indicate the start and th
    14·1 answer
  • Attempting to determine a password that is not known to the attacker is often called ____.
    13·1 answer
  • What symbol do we use to denote a character?
    9·2 answers
  • When someone makes a bad or immoral decision because a group of their friends is also doing it, it is called:
    10·1 answer
  • Related to Image Classification
    13·1 answer
  • &gt;What is the output of the following code:
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!