1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gulaghasi [49]
3 years ago
12

Common icons found on the windows desktop are _____. dock my computer my documents recycle bin trash

Computers and Technology
2 answers:
german3 years ago
8 0

Answer:

my computer

my documents

recycle bin

Explanation:

Desktop: The desktop encompasses all the contents of the computer screen once Windows starts.

The desktop elements include icons of the most used programs and other utilities.

Most common icons:

<u>My computer</u>: It allows us to see the contents of our computer: folders and files, and access the disk drives (hard disk, CDROM).

<u>My Documents</u>: It is a folder to store documents.

<u>Recycle Bin</u>: Temporary storage place for folders or files deleted from the hard disk, or any external storage device (pen drive, cell phone, camera). You can recover previously deleted folders or files, or delete them permanently.

anzhelika [568]3 years ago
3 0
The recycle bin is common icon
You might be interested in
What type of electronic monitoring involves an offender being contacted periodically by telephone or beeper to verify his or her
Masja [62]
The type of electronic monitoring that involves an offender being contacted periodically by telephone or beeper to verify his or her whereabouts is called the programmed contact. It is a method used in investigations to monitor the offender in a certain situation where he is forced to remain.
7 0
3 years ago
Which would be the most efficient way to store files on your computer?
lorasvet [3.4K]

Answer:

Best way to store all your files is a external storage device, like a hard drive or a usb stick, copy all your files to the device and keep it in a safe place.

3 0
2 years ago
What is responsible for making an axle spin in an electric motor? an outside power source attached to a magnet an outside power
Mashutka [201]

the correct answer is c

6 0
3 years ago
Read 2 more answers
Tech A states that batteries have different sizing and configuration requirements. Tech B states that this helps them to fit the
Ymorist [56]

Answer:

Both

Explanation:

Batteries come in different sizes and configurations. This is evident in car batteries where third sizes vary from car to car depending on the space and manufacturer's discretion.

Thus, Both technicians are correct.

Cheers

3 0
3 years ago
All of the following can cause a fatal execution-time error except: Group of answer choices Dereferencing a pointer that has not
7nadin3 [17]

Answer: Dereferencing a variable that is not a pointer

Explanation:

The execution time also refered to as the CPU time pertaining to a given task is the time that is used by the system to execute a task.

Some of the reasons for a fatal execution-time error include:

• Dereferencing a pointer that has not been initialized properly

• Dereferencing a null pointer

• Dereferencing a pointer that has not been assigned to point to a specific address.

It should be noted that dereferencing a variable that is not a pointer doesn't cause a fatal execution-time error.

6 0
2 years ago
Other questions:
  • You are entering command that operates on a file. The path to the file is lengthy and confusing and you are afraid that you will
    12·1 answer
  • Antivirus software installed to scan and monitor malware activities on a server or workstation would be identified as a ________
    8·1 answer
  • Any parameter that receives a value and also sends a value outside the function must be declared as a reference parameter.
    8·1 answer
  • By applying styles, _______ formats are being applied each time. A. various B. different C. the same D. similar
    6·2 answers
  • If you go over 255 in RGB by 1 does it reset to 0 or 1
    11·1 answer
  • What is generation of computer ?​
    7·2 answers
  • How to design remote access policy using the appropriate access controls for systems,applications, and data access
    6·1 answer
  • (Please answer both parts, please)
    8·2 answers
  • Why does this website have so many copies of plagiarism?
    5·1 answer
  • Define a function Output Value() that takes two integer parameters and outputs the sum of all negative integers starting with th
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!