1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kryger [21]
3 years ago
15

The windows troubleshooting utility that identifies and eliminates nonessential files is called _____.

Computers and Technology
2 answers:
Virty [35]3 years ago
8 0
I think it is Defragment
postnew [5]3 years ago
8 0

Answer:

Disk cleanup

Explanation:

Disk cleanup utility program was created by Microsoft and it helps to identify and eliminate unnecessary files on the disk space (computer hard drive). Removing these files help to greatly improve the CPU performance and this is also a good maintenance activity. Some of the files that could be removed during the clean up are the Recycle bin files, thumbnails, browser caches and temporary files used by applications.

You might be interested in
Name three actions you should take if you believe you’ve been victimized by crimeware or online fraud
allochka39001 [22]

Try restating system software and delete anything that may have caused the online fraud then remove all credit cards and info on the device. Tell the authorities and get a new device and email with a software protector. When doing this DO NOT DO WHAT YOU ORIGINALLY DID TO GET VICTIMIZED AND (DON'T TRY TO SIGN INTO YOUR PREVIOUS EMAIL ON A NEW DEVICE)  

4 0
4 years ago
Read 2 more answers
Explain why you cannot the Apple OS install on a regular windows computer and vice versa, without the aid of a virtualization so
Phoenix [80]

Answer:

The reason is due to proprietary design of the Operating System (OS) which require a virtualization software to blanket or "disguise" the hardware (processor) borderlines of the computer onto which it is to be installed.

Explanation:

An Apple system that has the RISC processor and system architecture which has an operating system made entirely for the Apple system architecture

If the above Apple OS is to be installed on a windows computer, then the procedure to setup up the OS has to be the same as that used when on an Apple system, hence, due to the different processors and components of both systems, a virtualization will be be needed to be provided by a Virtual box, Parallels desktop or other virtualization software.

6 0
3 years ago
In the SDLC's third phase, the way in which a proposed information system will deliver the general abilities described in the pr
kifflom [539]

Answer: Detailed

Explanation:

SDLC consist of 7 phases. They are:

1. Planning.

2. System analysis and requirement

3. Design:

4. Coding:

5. Testing:

6. Installation

7. Maintenance

Here we are talking of the third phase. In this phase it is the design phase which consist of high and low level design. Here the preliminary design is included in high level design where it describes the required hardware, software, network capabilities and the modelling of the interface. However the detailed design in low level design will implement the coding and will finding of any errors in the implemented design as described by the preliminary design.

3 0
3 years ago
Question 16 of 40
neonofarm [45]

Answer:

D hjjhhhhhhhhhhhhhhh

Explanation:

cuz

6 0
4 years ago
Read 2 more answers
The Joint Photographic Experts Group developed the ___________ graphic format.
jolli1 [7]
1. <span>The Joint Photographic Experts Group developed the jpeg graphic format. 
2. </span><span>It is important to include the alt attribute of the tag because some people use text-only Web browsers. </span>
4 0
3 years ago
Read 2 more answers
Other questions:
  • When programming in Scratch, to make our Sprite walk across the background, in which category would we find the programming bloc
    7·1 answer
  • It is always better to run over and give more information when you are giving a presentation versus quitting on time. true false
    15·2 answers
  • Discuss the use of distributed (federated) authentication systems in use at your institution. If no such system is in use, then
    5·1 answer
  • Reading log of any book with page numbers​
    5·1 answer
  • A ____________ would be a misconfiguration of a system that allows the hacker to gain unauthorized access, whereas a____________
    12·1 answer
  • Which of the following scenarios is an example of irrelevant media?
    11·1 answer
  • Define a class called Counter. An object of this class is used to count things so it records a count that is a non-negative whol
    12·1 answer
  • 3.
    9·1 answer
  • Na2CO3 → Na2O + what
    13·2 answers
  • Design algorithm and the corresponding flow chart for adding the subject score of 5, total value and rank.​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!