1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zhenek [66]
3 years ago
9

Discard an old computer and want to erase my files

Computers and Technology
1 answer:
Tamiku [17]3 years ago
7 0
You can use a program like SafeErase to wipe all of your data throughly off your computer. 
You might be interested in
What should I do when the computer doesn't display Korean?(They are all □□)
bogdanovich [222]

Answer:

I Think You Could Go To Settings And Change It

Explanation:

I Think This Helps

5 0
3 years ago
Which of the following documents should beprepared before the commencement of a softwareproject?
ludmilkaskok [199]

Answer:

Software requirement specification

Explanation:

requirement specification is the first step before proceeding with any project.

we should validate our output at all phases with software requirement specification

7 0
3 years ago
Which is the best information to determine an athlete's abilities and needed areas of improvement?
katen-ka-za [31]

Answer:

4

Explanation:

7 0
2 years ago
Read 2 more answers
Which of the following behaviors is considered ethical?
kolezko [41]

Answer:

answer is c. using a limited access public computer to watch movies

7 0
2 years ago
Read 2 more answers
Paavo was reviewing a request by an executive for a new subnotebook computer. The executive said that he wanted USB OTG support
grandymaker [24]

Answer:

Connecting a mobile device as a peripheral to an infected computer could allow malware to be sent to that device.

Explanation:

Since in the question it is mentioned that Paavo reviewed a request by an executive for subnotebook computer i.e new. but he needs to USB OTG support so it is a  USB i.e on the go that links the devices from one device to another

Therefore by links the mobile device to the computer i.e infected that allows malware we called virus so that we are able to send it to that device. By this,  he wants to tell about the USB OTG security

4 0
3 years ago
Other questions:
  • A client computer networked to a server computer, with processing split between the two types of machines, is called a(n) ______
    12·1 answer
  • When preparing images to be used for different mediums print web and video in photoshop different file formats are required , se
    13·1 answer
  • The Internet may best be compared to a/an
    8·1 answer
  • What is the difference between an internal and an external method call? In what situation would only internal calls be needed?
    11·1 answer
  • I want pizzzzzzzaaaaaaaaaaa
    9·1 answer
  • Need help with this​
    5·1 answer
  • Which of the following sets of data would be presented best in a histogram.
    12·1 answer
  • What is the purpose of the website directory provided by the website host?
    5·1 answer
  • Is anyone else excited for sephiroth (I think I spelt it wrong) in smash. And if you arn't are you excited for christmas
    12·1 answer
  • Create One print command in LOGO​
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!