1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
EastWind [94]
4 years ago
14

What is the simplest way to permanantly get rid of an unwanted file

Computers and Technology
1 answer:
UNO [17]4 years ago
4 0
If on a computer, if thee computer says they put it in the recycling bin, the go to the recycling bin and right click and delete. If a paper, throw away. If other, do what your body desires to do.<span />
You might be interested in
True or False: A combination of a solid yellow and a broken yellow line means that you can pass only on the side that has the br
amid [387]
True, because the broken line gives you the ability to cross and pass, with the solid line you are not allowed to pass.
3 0
3 years ago
Read 2 more answers
A computer’s memory is composed of 8K words of 32 bits each. How many bits are required for memory addressing if the smallest ad
victus00 [196]

Answer:

The minimum number of bits necessary to address 8K words is 13.

Explanation:

You have the number of words to address that is 8000 words, a word is the smallest addressable memory unit.  

8000 words can be addressed with 2^{n}  units. Now you have to find the value of n that approximates to the number of words.  

2^2=4\\2^4=16\\2^7=128\\2^{10}=1024\\2^{12}=4096\\2^{13}=8192

So you can see that 13 bits are needed to address 8K words.

7 0
3 years ago
What special identity group is typically used when a user accesses an FTP server that doesn't require user account logon?
Rainbow [258]

Answer:

The correct answer to the following question will be "​Anonymous logon".

Explanation:

  • Windows would never let anyone sign in interactively with an anonymous logon to the device, a person who has linked to the device without a login and password being given.
  • So they won't have to verify to an account of the user just whether you are running any shares.r document, let everyone log into the machine collaboratively with such a logon.

Therefore, Anonymous logon is the right answer.

4 0
4 years ago
Which functions are part of the array module? Select 2 options. Assume you have already entered these lines of code.
wlad13 [49]

Answer:

arr.index(3)

arr.append(3)

Edge2020

7 0
3 years ago
Read 2 more answers
From your finding,conclusion and recommendations can you make on the issue of human rights violations to:Government​
morpeh [17]
Answer:
Different recommendations and conclusion can be drawn on human rights violation in government and communities.
Explanation:
1-Foremost thing that government can do is the legislation to control the human rights violation and this law should be applicable on all the people belong to any community. Government also make human rights violation issue a part of their policy so that every government could understand before hand.
2-Communities should run campaign so that people understand their human rights and can complain against such violations.
Human right violations happens all over the world but individuals and government need to work together to stop and eradicate such violations
7 0
3 years ago
Other questions:
  • If the object instance is created in a user program, then the object instance can access both the public and private members of
    9·1 answer
  • I have one big question <br><br><br> WHAT CAN I DO WHEN I'M BORED
    6·2 answers
  • To generate a report with exact results based on specific criteria it is best to base the report on a(n) ____________________ cr
    6·1 answer
  • In what country was the English royal family and nobility living before the Restoration?
    6·1 answer
  • NAT is able to stop ________. Group of answer choices a) scanning probes sniffers from learning anything about the internal IP a
    8·2 answers
  • A source is:
    15·2 answers
  • Please help me, i need help
    15·2 answers
  • Weaknesses about ICT Technician
    9·1 answer
  • Why do we need to know the different Networking Devices?​
    10·1 answer
  • Write a function called st_dev. st_dev should have one
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!