1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
luda_lava [24]
2 years ago
6

Why should you delete files from your computer

Computers and Technology
2 answers:
soldier1979 [14.2K]2 years ago
7 0

Answer:

Why should you delete files from your computer

Explanation:

You should delete files permanently from your computer because removing that data completely opens up space on your hard drive and improves overral PC performance

notka56 [123]2 years ago
5 0

deleting files can free up space and prevent hackers from accessing your sensitive files

You might be interested in
Write a program in C/C++ to draw the following points: (0.0,0.0), (20.0,0.0), (20.0,20.0), (0.0,20.0) and (10.0,25.0). For this
Fed [463]

Introductory program; just a static picture of a colored triangle.
Shows how to use GLUT.
Has minimal structure: only main() and a display callback.
Uses only the default viewing parameters (in fact, it never mentions viewing at all). This is an orthographic view volume with bounds of -1..1 in all three dimensions.
Draws only using glColor and glVertex within glBegin and glEnd in the display callback.
Uses only the GL_POLYGON drawing mode.
Illustrates glClear and glFlush.
triangle.cpp
// A simple introductory program; its main window contains a static picture
// of a triangle, whose three vertices are red, green and blue. The program
// illustrates viewing with default viewing parameters only.

#ifdef __APPLE_CC__
#include
#else
#include
#endif

// Clears the current window and draws a triangle.
void display() {

// Set every pixel in the frame buffer to the current clear color.
glClear(GL_COLOR_BUFFER_BIT);

// Drawing is done by specifying a sequence of vertices. The way these
// vertices are connected (or not connected) depends on the argument to
// glBegin. GL_POLYGON constructs a filled polygon.
glBegin(GL_POLYGON);
glColor3f(1, 0, 0); glVertex3f(-0.6, -0.75, 0.5);
glColor3f(0, 1, 0); glVertex3f(0.6, -0.75, 0);
glColor3f(0, 0, 1); glVertex3f(0, 0.75, 0);
glEnd();

// Flush drawing command buffer to make drawing happen as soon as possible.
glFlush();
}

// Initializes GLUT, the display mode, and main window; registers callbacks;
// enters the main event loop.
int main(int argc, char** argv) {

// Use a single buffered window in RGB mode (as opposed to a double-buffered
// window or color-index mode).
glutInit(&argc, argv);
glutInitDisplayMode(GLUT_SINGLE | GLUT_RGB);

// Position window at (80,80)-(480,380) and give it a title.
glutInitWindowPosition(80, 80);
glutInitWindowSize(400, 300);
glutCreateWindow("A Simple Triangle");

// Tell GLUT that whenever the main window needs to be repainted that it
// should call the function display().
glutDisplayFunc(display);

// Tell GLUT to start reading and processing events. This function
// never returns; the program only exits when the user closes the main
// window or kills the process.
glutMainLoop();
}
6 0
3 years ago
Objects both in the real world and in object-oriented programming contain ____ and methods.
larisa86 [58]

Objects both in the real world and in object-oriented programming contain <u>attributes</u> and methods.

<h3>What is an attribute?</h3>

In Computer technology, an attribute can be defined as a unique characteristic or quality which primarily describes an entity in a software program.

<h3>What is a method?</h3>

In Computer programming, a method can be defined as a block of executable code (sets of instruction) that are written and used by programmers to break down a given problem into small but manageable fragments (pieces).

This ultimately implies that, methods are typically written and used by programmers to break down any complex problem into simple and manageable fragments (pieces). Also, all modern programming languages comprises several methods that are predefined.

In this context, we can infer and logically deduce that all objects both in the real world and in object-oriented programming generally contain <u>attributes</u> and methods.

Read more on methods here: brainly.com/question/25619349

#SPJ4

6 0
2 years ago
Name the wireless technology that may work with one device and not with another.
horsena [70]

Answer: Im guessing b

Explanation:

bc the other ones work devices.

7 0
3 years ago
PLATO: Select all the correct answers.
AnnZ [28]

Answer:

sending email  and low set up cost

Explanation:

The options are:

sending email

blocking multiple people to use the same file

low security

low set up cost

limited access to files

And generally, the universities look for sending mail option, and the low set up cost. They never look for blocking multiple people, low security, or limited access to the files. And hence, the correct options are as mentioned in the answer section.

6 0
3 years ago
___________ messaging enables two or more individuals to use the internet or an intranet to chat in real time by exchanging brie
In-s [12.5K]
I think its a Chat Room.
Dont forget to thanks
3 0
3 years ago
Read 2 more answers
Other questions:
  • 7. While an adjacency matrix is typically easier to code than an adjacency list, it is not always a better solution. Explain whe
    5·1 answer
  • Write the DML statement to query the database for the following: Output the fname, lname, total_amount_owed of the student with
    5·1 answer
  • The _______________ database structure is considered one of the key technologies of a new generation of Web-based applications.
    7·1 answer
  • If you go over 255 in RGB by 1 does it reset to 0 or 1
    11·1 answer
  • How do you turn a .bat file into a .exe file, running the same code? I want to publish something on the internet without everyon
    10·1 answer
  • Write a program that reads from a file called dictionary.txt which contains pairs of English and translated words separated by a
    12·1 answer
  • You need to view the contents of /var/log/auth.log to get information about the users that have been logging on to the system. T
    6·1 answer
  • Difference between private and confidential data?​
    5·1 answer
  • What does an upright (straight) body posture convey or show? [ ]
    10·1 answer
  • One of the most notable impacts of IT on business is improved
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!