1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serhud [2]
3 years ago
6

Carmen wanted to clear up space on her computer and remove unwanted files. What would be the best for her to delete?

Computers and Technology
2 answers:
Verdich [7]3 years ago
8 0

Answer:

A. junk files

Explanation:

I just took the test :)

melisa1 [442]3 years ago
7 0

Answer:

junk files

Explanation: if a file is in a junk file it is most likely unwanted

You might be interested in
What are the six command groups in powerpoint
DiKsa [7]

Answer:

Clipboard, Slides, Font, Paragraph, Drawing, and Editing

3 0
3 years ago
The next few questions will be based on interpretations of a topographic map from East Brownsville, TX. To answer these question
11111nata11111 [884]

Answer:

a. Youthful

Explanation:

The river gets its water from youth stage fluvial water. The river meanders from side to side. East Brownsville will be less stable in international boundary in terms of physical position on the landscape because its base level drops.

8 0
3 years ago
________ is an encryption standard used for secure transactions such as credit card processing and online banking. TLS DMZ White
Fynjy0 [20]

Answer:

TLS

Explanation:

In the field of computer security, TLS refers to Transport Layer Security it is closely related to the Secure Sockets Layer (SSL) although TLS is more commonly used these days. They are both techniques in cryptography that provides for the safe transfer of information between two parties (servers, systems and user applications)

TLS particularly provides a balance between transmission speed and data security through the use of symetric and asymmetric cryptography and the encryption and decryption key is the session key at both ends (sender and reciever), as such TLS has found usage in most advanced data exchange systems like credit card processing and online banking.

8 0
3 years ago
What is your opinion on gaming? do you think it has more positive or negative impacts
joja [24]

Answer:

positive bc you can learn from them wwhat to do what not to do mistakes that you wont make in. real life

4 0
2 years ago
Read 2 more answers
Để các hình chiếu cùng nằm trên mặt phẳng to phải làm gì
goldfiish [28.3K]

Answer:

pls translate to English so we can help

3 0
3 years ago
Other questions:
  • Custom parameters 1, 2 and 3 provide the same end value for all keywords. true or false?
    14·1 answer
  • Oday's color display devices represent color using the ______ color model.â
    13·1 answer
  • Is the following statement true or false information literacy is a subset of health literacy
    15·1 answer
  • Jin needs to add a row into his spreadsheet, but he does not want to remove any existing data. Which combination of options shou
    6·2 answers
  • What is the meaning of 4 8 15 16 23 42?
    14·1 answer
  • Which of the following is true about advertisements?
    15·1 answer
  • Both employers and employees have responsibilities and ___________.
    10·2 answers
  • ____________ reference is used when you want to use the same calculation across multiple rows or columns.
    10·2 answers
  • Compare the graphs. Find the value of h, k, or a.
    7·1 answer
  • Which of the following are true about algorithms? (You may select more than one)
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!