1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MariettaO [177]
3 years ago
9

If a clean install is performed on a hard drive with a previous install of windows and the drive is not re-formatted during the

install, where will the files from the old installation be?
Computers and Technology
1 answer:
Tpy6a [65]3 years ago
3 0
Either wiped off the drive, or right next to the new ones, I do not recommend keeping the old files.
You might be interested in
As related to the use of computers, ____ is defined as gaining unauthorized access or obtaining confidential information by taki
solong [7]

Answer:

Option(B) i.e., social engineering  is the correct option to the question.

Explanation:

The following option is correct because social engineering is the type of attack in which the criminals tricks the computer users to disclose the confidential data or information. Criminals or hackers use this trick because by this they can easily take advantage of your confidential information or corporate secrets.

4 0
3 years ago
Jeremy has created a snippet of JavaScript. Which event handlers will he use to invoke JavaScript from his HTML form?
riadik2000 [5.3K]

Answer:

One of them is OnClick, but there are more.

Explanation:

I took my post test and only clicked OnClick and I missed this one and it says "not all correct answers chosen"

3 0
3 years ago
Read 2 more answers
The software that requests mail delivery from the mail server to an Internet device is known as mail ____ software.
OleMash [197]

The software that requests mail delivery from the mail server to an Internet device is known as mail client software.

Explanation:

Mail client software is a form of communication in which electronic messages are created and transferred between two or multiple devices connected to a network series or stream.

8 0
3 years ago
True or False: One benefit of virtualization is that it allows for better use of already existing hardware that may not be seein
marysya [2.9K]

Answer:

True.

Explanation:

Virtualization can be defined as a technique used for the creation of a virtual platform such as a storage device, operating system, server, desktop, infrastructure or computing resources so as to enable the sharing of resources among multiple end users. Virtualization is usually implemented on a computer which is referred to as the "host" machine.

Generally, to use the virtualization technology on a computer, it must be enabled in the BIOS/UEFI).

Additionally, VMware tools can be installed on host computers to check which processes are having high CPU usage by using vimtop, as well as checking if vCenter Server is swapping.

Hence, one benefit of virtualization is that it allows for better use of already existing hardware that may not be seeing full utilization. Hardware components such as storage devices, central processing unit (CPU), random access memory (RAM), host computers are extensively put into use.

3 0
3 years ago
Which devices is not found in the CPU​
leva [86]
Plz answer my question
5 0
3 years ago
Other questions:
  • Sharon is thinking about opening a bakery. She knows she wants to set her own hours, reduce her stress and make a profit. But sh
    5·1 answer
  • Write a program with total change amount as an integer input that outputs the change using the fewest coins, one coin type per l
    7·1 answer
  • What term identifies a blank screen or animation that automatically displays on a computer monitor after a specified period of i
    9·1 answer
  • How do i switch my level to high school on brainly
    10·2 answers
  • IT professionals recognize that successful systems must be user-oriented, and users need to be involved, formally or informally,
    6·1 answer
  • 9. What command do you enter in the Explorer search box to access the Remote Admin share on the computer named Fin?
    7·1 answer
  • When do you use an else statement?
    10·1 answer
  • Hi I got a new phone and my photos are taking so long to download, on Friday it was at 13000 what do I do it’s taking so long
    14·1 answer
  • What component of a change management program includes final testing that the software functions properly
    11·1 answer
  • identify the difficulties with the k-nearest neighbor algorithm. a. both a and b b. calculate the distance of the test case from
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!