1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SVEN [57.7K]
3 years ago
6

Free up disk space by doing____?​

Computers and Technology
2 answers:
8090 [49]3 years ago
6 0

Answer:

Deleting files and etc on your computer.

denpristay [2]3 years ago
6 0
Upgrade to a better storage capacity or deleting files, data etc...
You might be interested in
In poor weather , you should ___ your following distance.
svlad2 [7]

Answer:

lengthen

Explanation:

will take more time to stop on wet and slippery surfaces

3 0
3 years ago
Which of the following code displays the area of a circle if the radius is positive. a. if (radius != 0) System.out.println(radi
maw [93]

Answer:

d. if (radius > 0) System.out.println(radius * radius * 3.14159);

Explanation:

The positive values are those values that are greater than 0(zero).0 is considered to be nonnegative number it is neither positive nor negative and for a zero radius the area will be 0.As we know the are of the circle is π*radius*radius, and π is 3.14159.So the correct answer matching to this condition is option d.

Which checks if the radius is greater than 0 then find the radius and print it.

8 0
4 years ago
Characteristics of first generation computers​
Marrrta [24]
* Main Electron a component- vacuum tube.

* Main memory- Magnetic drums and magnetic tapes.

* Programming language- Machine language.

* Power- Consume a lot of electricity and generate a lot of heat.

* were expensive to operate
5 0
3 years ago
What security weaknesses/vulnerabilities exist in Wireless local area network device hardware and software?
AfilCa [17]

Answer:

Explanation:

There are many weaknesses/vulnerabilities, some of which are the following...

Default Network Hardware, many individuals will go out and buy a new router and install it in their home. These devices come with a preset configuration including a preset security password which is many times a default password used for every router of the same model. This can be easily obtained by anyone who can then access the network.

Access Point hacking, an experienced individual can use a packet sniffer to detect the SSID that is frequently sent from the router in order to create an access point to be able to access the network.

WEP encryption is another vulnerability. These are very low security passwords that can be cracked using different software in a short period of time.

These are some of many vulnerabilities that wireless local networks have, but there are also many precautions and security measures that can be taken to prevent them.

7 0
3 years ago
The BIOS feature that enables a hard drive to read or write several sectors at a time is called what?
lukranit [14]

The BIOS feature that enables a hard drive to read or write several sectors at a time is called IDE block mode

Explanation:

IDE block mode setting speeds up IDE drivers when enabled by allowing multiple sectors to read or write operations. This BIOS feature rushes up hard disk drive passage by transferring many divisions of data per interrupt rather than using the normal single-sector transfer mode.

This mode of transfer is known as block transfers. When block transfers are enabled, depends on the IDE controller, nearly 64 KB of data can be transferred per interrupt.

4 0
4 years ago
Other questions:
  • Calculate the total number of bits transferred if 200 pages of ASCII data are sent using asynchronous serial data transfer. Assu
    5·1 answer
  • Troubleshooting a printer that does not work includes a. connecting the printer to your computer b. checking to see if there is
    13·1 answer
  • A group of users is unable to connect to the network. When testing several of the PCs and issuing the command ipconfig, the tech
    10·1 answer
  • 22
    15·1 answer
  • Which of the following behaviors does not harm a company if your employment is terminated?
    9·1 answer
  • You Could Never Size Me UP! Been Doing This Sh*t A Long ⏱time
    15·1 answer
  • Para ti que es el sexting​
    11·1 answer
  • in Java programming Design a program that will ask the user to enter the number of regular working hours, the regular hourly pay
    11·1 answer
  • Question 5 of 10
    10·1 answer
  • Which of the examples is part client side code
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!