1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ludmilkaskok [199]
3 years ago
6

Which is the simplest way to permanently get rid of an unwanted file

Computers and Technology
2 answers:
Over [174]3 years ago
8 0
Go to system files, find the file and destroy the whole thing or just what you dont want. ;]
Law Incorporation [45]3 years ago
6 0
I guess you could take the file and drag it to your trash can and then you could clear your trash can.
You might be interested in
An information system includes _____, which are programs that handle the input, manage the processing logic, and provide the req
Ronch [10]

Answer:

applications

Explanation:

In an information system, applications or software are indispensable. This is because the entire data/info processing pipeline running on daily basis have been digitized. Users are heavily rely on the applications to gain and store new data, to manage and process the data and to deliver the necessary output. The applications enable the entire data processing work become more efficient, systematic and also more secure.

7 0
3 years ago
Adding Web pages helps Web designers ___. Choose all answers that are correct.
ss7ja [257]

Answer:

B

Explanation:

7 0
2 years ago
Which function is used for creating a date table?
netineya [11]

Explanation:

When one wants to express his or her feelings on each other

4 0
2 years ago
Question 1 of 40
Novay_Z [31]

Answer:

D. Federal Work-Study

Explanation:

8 0
3 years ago
The
saveliy_v [14]
The answer is Undo I think
4 0
2 years ago
Read 2 more answers
Other questions:
  • The smallest building block of a wireless lan is a ______.
    5·1 answer
  • In Python, arrays are usually reserved for
    12·1 answer
  • 1. What are copyright laws? (6 points)
    15·1 answer
  • 4.17 LAB: Varied amount of input data ( C++)
    5·1 answer
  • Which term is defined as an exploit that takes place before the security community or software developer knows about the vulnera
    12·1 answer
  • What is the meaning of Re:?
    12·2 answers
  • Why are control components necessary in traditional software and generally not required in object-oriented software?​
    11·1 answer
  • Explain the bad effect and good effect of mobile phone and internet.<br>​
    15·2 answers
  • Which tool can be used to increase the space between a bullet point or a number and text?
    11·2 answers
  • Which of the following are true about algorithms? (You may select more than one)
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!