1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
garik1379 [7]
4 years ago
13

How long do deleted items remain in the recycle bin? forever one week until it is emptied until you log off or shut down?

Computers and Technology
2 answers:
GarryVolchara [31]4 years ago
7 0
C. Until it is emptied is the answer to your question!
Fynjy0 [20]4 years ago
4 0

C until it is emptied

You might be interested in
You should periodically perform basic computer maintenance on your computer.<br> True<br> False
kotegsom [21]

Answer:

that's true after some period of time it's necessary

8 0
2 years ago
Read 2 more answers
You are the information security officer at a medium-sized company (1,500 employees). the cio asks you to explain why you believ
Ivahew [28]
If your CIO asks such a stupid question run for the hill, he should not hold that title.
Every company, small, medium or large should have Firewalls, Intrusion Detection, Managed Virus Protection Software at the very least. Windows is the most deployed OS in the world and of course the main target of hackers i.e Viruses. MAC's to a lesser extent and Unix while probably the least vulnerable are still not immune to Viruses/Trojan and other Malware.

Users can still be the victims of trojan horses, phishing scams, and other online fraud. There<span> is no such thing as a 100% safe computer, a </span>Mac<span>, Windows, and even Linux are all capable of being infected with a </span>virus<span> or other malware.
</span>
Lastly, physical access to any computer that is not encrypted is vulnerable.
5 0
3 years ago
Can you know in advance the path a message will take between you and another computer on the internet
djverab [1.8K]

Answer:

No, you really cannot tell.

Explanation:

Packets on a network are always taking different routes or paths. Based on the traffic, the router will choose the best path to send packets to. For instance, if the network experiences redundancies or network congestion between the host and destination devices, additional paths will always be available. Unless we have manually configured proxies, we will never tell in advance the path a message will take. Internet routes are dynamic in nature especially since they are based upon traffic loads among other factors

8 0
3 years ago
Consider the partially-filled array named a. What does the following loop do? (cin is a Scanner object)int[] a = {1, 3, 7, 0, 0,
lozanna [386]

Answer:

Option 2: Reads one value and places it in the remaining first unused space endlessly.

Explanation:

Given the code as follows:

  1. int[] a = {1, 3, 7, 0, 0, 0};
  2. int size = 3, capacity = 6;
  3. int value = cin.nextInt();
  4. while (size < capacity && value > 0)
  5. {
  6.              a[size] = value;  
  7. }

The a is an array with 6 elements (Line 1). The program will prompt the user for an integer and assign it to variable <em>value </em>(Line 3).

The while loop have been defined with two conditions, 1) <em>size < capacity </em>and <em> value > 0</em>. The first condition will always be true since the size and capacity are <em>constant</em> throughout the program flow and therefore<em> size</em> will always smaller than capacity.

Hence, if user input an integer larger than 0, the while loop will infinitely place the same input value to the remaining first unused space of the array, <em>a[3]</em>.

4 0
4 years ago
Cyberlaw consists of: a. only state statutes. b. only federal statutes. c. traditional legal principles that have changed becaus
Agata [3.3K]

Cyber law contains the law that contain the traditional legal principle that have changed because of the technology

Explanation:

Cyber law is very much crucial in our day to day life they govern the technology that are used and they also contain the laws that must be followed while designing the web page

It is important because it touches almost all the parts of the transactions and the behaviors that are concerning the internet all actions which are done in the cyber space has some legal and illegal angles

7 0
4 years ago
Other questions:
  • Carlos owns a hardware store. He currently is not using any software to track what he has in the store. In 1–2 sentences, descri
    9·2 answers
  • Write a program that asks the user for the name of a text file. the program should display the last 10 lines of the file on the
    13·1 answer
  • Help me please............
    6·2 answers
  • 30 POINTS! PLEASE ANSWER QUICK!!!
    12·1 answer
  • Keith is researching a controversial topic and wants to use a website he found as an information source. Which of the following
    11·2 answers
  • The purchase of a computer by a person for household use would be counted in what category of GDP?
    15·1 answer
  • A healthcare organization received notification that a hospital employee’s laptop that contained PHI was inadvertently left at a
    14·1 answer
  • Elaboren un texto acerca de una caracteristica o<br>componente de algun sistema tecnologico.<br>​
    15·1 answer
  • Resumen sobres el correo electrónico​
    6·1 answer
  • What type of security software prevents, detects, and removes malware that tries to collect personal information or change compu
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!