1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
borishaifa [10]
3 years ago
12

Read the following scenario. How might Sarah correct successfully complete her task? To permanently remove a file from her compu

ter, Sarah doubled-clicked on the My Computer icon and searched for her file under the “Uninstall or change a program” menu option. Empty the Recycle Bin. Find the file on the taskbar and delete it. Open the Control Panel and clear all data. Search under “Removable storage” in My Computer.
Computers and Technology
1 answer:
Mekhanik [1.2K]3 years ago
7 0

I'd go with two answers.

A: To permanently remove a file from her computer, Sarah doubled-clicked on the My Computer icon and searched for her file under the “Uninstall or change a program” menu option.

Or

B: Empty the Recycle Bin.

This question is somewhat not clear. Why I went with the answers above is because I really do not know what kind of a file Sarah wants to permanently remove. You can permanently delete a program file installed in the computer by following the procedure in option A. The option above will take you to the control panel and you'll be able to select the program you'd want to permanently remove. If you had initially deleted a file like a picture or a document or anything else that you necessarily do not need, it will go to recycle bin. You can head over there and select the Empty the Recycle Bin option to permanently delete the file.

You might be interested in
Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usua
OLEGan [10]

Answer: Stealth scanning technique

Explanation:

Stealth Scanning technique includes the following steps:

1. The client upon sending a single SYN packet to is responded by SYN/ACK packet if the port is open.

2. The port is assumed to be in closed state if the RST packe t is sent from the server.

3. This RST packet is sent by the client to close the initiation process so that a connection cannot be established.

6 0
3 years ago
Internal memory is synonymous with which memory
soldi70 [24.7K]

Answer:

Main Memory (RAM)

Explanation:

This is the memory which is directly accessible to the CPU. It can be called Main Memory, Prime Memory or simply 'Memory'

5 0
3 years ago
Read 2 more answers
HELP FAST PLEASE
never [62]

Answer:

I am not sure can you explain a little more

7 0
3 years ago
Read 2 more answers
Which is a key component to participating in a school-to-work program? A. Dual enrollment opportunities B. Community service opp
PtichkaEL [24]
The answer is D. Job shadows
5 0
3 years ago
Read 2 more answers
A typical day in programming and software development would involve
mrs_skeptik [129]

Answer:

writing code for a software program.

Explanation:

Software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications.

Some of the models used in the software development life cycle (SDLC) are; waterfall model, incremental model, spiral model, agile model, big bang model, and V-shaped model.

The five (5) standard stages of development in software development are;

I. Analysis.

II. Design.

III. Implementation (coding).

IV. Testing.

V. Maintenance.

A typical day in programming and software development would involve writing code for a software program.

Generally, software applications or programs require a code containing series of sequential instruction to perform specific tasks, commands and processes. These sets of code are typically written by a software developer (programmer).

3 0
3 years ago
Other questions:
  • Given that the time to read data off a 7200 rpm disk drive will be roughly 75% of a 5400 rpm disk, at what idle time of the 7200
    13·1 answer
  • A matrix representation stores matrices such that the offset address of the element in row i and column j can be calculated by c
    12·1 answer
  • Which is a characteristic of an effective problem statement? It is based on research. It contains outside information. It contai
    12·1 answer
  • A USB zipper drive is a small data storage device that plugs into a computer's USB port.
    14·1 answer
  • Manuel has set up his network so that some employees can open and view files but are unable to edit them. Others can open, view,
    10·1 answer
  • What kind of a bug is 404 page not found
    10·2 answers
  • What key should i press to leave the cell as it orginally was
    9·1 answer
  • Why did the boy run from the pillow...... wrong answers only
    15·1 answer
  • Complete the code to finish this program to analyze the inventory for a store that sells purses and backpacks. Each record is co
    13·1 answer
  • What plugs into this?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!