1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
garri49 [273]
3 years ago
9

What is the simplest way to permanently get rid of an unwanted file?

Computers and Technology
1 answer:
Andrei [34K]3 years ago
6 0
Now, I suspect the answer is c. As this is how to "delete a file". For the same result, in windows, you can hold shift then press delete, and it will permanently delete it in the same way. 

However, when you a delete a file, the file is not physically removed from the disk until that files sector('s) (sectors are the smallest addressable unit of a hard drive) is overwritten (works a bit differently for ssd's).   
You might be interested in
Who knows my aunt better?
fiasKO [112]

Answer:

yes, yes, 30, November 5

6 0
3 years ago
Read 2 more answers
Explain the importance of understanding plagiarism, copyright, and fair use during a time when some much of your schoolwork is d
kow [346]

Answer:

Firstly, it is unethical because it is a form of theft. By taking the ideas and words of others and pretending they are your own, you are stealing someone else's intellectual property. Secondly, it is unethical because the plagiariser subsequently benefits from this theft.

Explanation:

I hope this helps! Have a good day.

8 0
3 years ago
How can you block attackers, who are performing reconnaissance and probing, with nmap and nessus port scanning and vulnerability
Tresset [83]
<span> You can block attackers, who are performing reconnaissance and probing, with NMAP and Nessus port scanning and vulnerability assessment scanning tools by i</span>dentifying the digital signatures of common reconnaissance and probing tools such PING, scans performed by Nmap, Nessus®, etc. The IDS and IPS devices should be programmed to specifically alert and block reconnaissance and probing IP packets that are commonly used by these attack tools. 
7 0
3 years ago
10.A chlorine ion (Cl-) would most likely bond with _____.<br><br> A.Cl-<br> B.Mg<br> C.K+<br> D.O
andrezito [222]
B. Mg
Hope this helps ☺
6 0
3 years ago
Help me help you...........
lyudmila [28]

Answer:

the 4th answer

Explanation:

w stage for width, h for height.

6 0
2 years ago
Other questions:
  • Ana works in the medical records department at a large medical office. Her job includes scanning and uploading medical records i
    15·1 answer
  • Tom's using Google Ads to promote his bicycle store. He's created an Android App and needs to measure how effectively the curren
    14·1 answer
  • What type of devices are the key board and the mouse?
    10·1 answer
  • ​In addition to joint application development, another popular user-oriented method is _____, which resembles a condensed versio
    14·1 answer
  • Your network has had long power outages that have caused Hyper-V servers to shut down after the UPS battery is drained. When pow
    8·1 answer
  • Use the Internet to gather information on four filesystems compatible with Linux. For each filesystem, list the situations for w
    12·1 answer
  • Which activity does not allow a person to perform any work while at the shop
    10·1 answer
  • What connectionless protocols are implemented at the lower layers of the OSI model, what is usually used to acknowledge that the
    5·2 answers
  • Define a constructor as indicated. Sample output for below program:Year: 0, VIN: -1Year: 2009, VIN: 444555666// ===== Code from
    8·1 answer
  • Karin realized that a song takes up a lot more space on her computer than the lyrics of the song typed out in ms word document .
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!