1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jeyben [28]
3 years ago
15

The system tool that rearranges files and unused space on the hard drive so programs can run faster is

Computers and Technology
1 answer:
Arada [10]3 years ago
7 0
Answer is c. disk defragmenter
You might be interested in
If one employee is assigned to a project and each project has only one employee working on it, there is a(n) ____ relationship b
Len [333]

Answer:

One-to-one is the answer because there is one project and one employee working on one project.

5 0
3 years ago
What is spread sheet software?​
melamori03 [73]

Answer:

The answer to this question is given in the explanation section.

Explanation:

This is a type of software which show us data in tabular form. These software can easily store, analyze and organize data.

They are divided in rows and columns. They are mainly used for accounting and book keeping.

The commonly used spread sheet software in the market are MS Excel by Microsoft, Calc by libre office.

3 0
3 years ago
How many bits would be used to count the students in class today?There are 10 students
Vikentia [17]

Answer:

4 bits

Explanation:

With 4 bits you can count to 15, because 2⁴=16. The maximum number you can express is always one less, i.e., 16-1=15.

In general, with n bits you can count to 2ⁿ-1.

7 0
4 years ago
Read 2 more answers
The process known as "bitmapping" is defined as information in _____. <br><br> finish the sentence.
valentina_108 [34]

graphics is the answer

4 0
3 years ago
Network services use to define a set of rules that govern how devices communicate and the data formats used in a network.
devlian [24]
The correct answer is protocols.
Protocols are rules and instructions as to how devices should function. Each of these devices has its own protocols about its inner workings that regulate how that particular device is going to work and function in real life. Without these protocols, the device wouldn't be able to work.
7 0
4 years ago
Other questions:
  • Forensic computer investigators must _____.
    6·2 answers
  • Kim would like to have a simple method for entering data into a database. She should create a _____.
    14·2 answers
  • A business would use a website analytics tool for all of the following EXCEPT _____.
    9·1 answer
  • A user reports that nothing happens when he or she attempts to print from the computer at his desk. This points to a possible pr
    15·1 answer
  • Match the organelles to their functions.
    6·1 answer
  • company gives the following discount if you purchase a large amount of supply. Units Bought Discount 10 - 19 20% 20 - 49 30% 50
    13·1 answer
  • This is a tableware use to serve the main dish
    11·1 answer
  • When you pass a double variable to a method, the method receives ______.a) a copy of the memory addressb) the reference of the v
    12·1 answer
  • Egovernment involves the use of strategies and technologies to transform government by improving the delivery of services and en
    7·1 answer
  • Consider sending a stream of packets from host a to host b using ipsec. typically, a new sa will be established for each packet
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!