1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergeinik [125]
4 years ago
5

What is the simplest way to permanently get rid of an unwanted file?

Computers and Technology
2 answers:
vodka [1.7K]4 years ago
6 0
Press delete. Then after if it goes to the trash section hit delete forever
lys-0071 [83]4 years ago
3 0
Press shift+delete and then click ok
You might be interested in
You are given a graph G = (V, E) with positive edge weights, and a minimum spanning tree T = (V, E’) with respect to these weigh
matrenka [14]
C vraiment très facile
Si tu a besoin d’aide recontacter moi
7 0
3 years ago
What is network topology? PLZZZ HURRY
Mashcka [7]

Answer:

Network topology is the arrangement of the elements (links, nodes, etc.) of a communication network. Network topology can be used to define or describe the arrangement of various types of telecommunication networks, including command and control radio networks, industrial field busses and computer networks.

7 0
3 years ago
Typically, a programmer develops a programâs logic, writes the code, and ____ the program, receiving a list of syntax errors.
miv72 [106K]
"debugs" is the answer
4 0
4 years ago
what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?
Zigmanuir [339]

Answer:

Image result for what is the name of the fields in an x.509 digital certificate that are used when the parties negotiate a secure connection?

Common applications of X. 509 certificates include SSL/TLS and HTTPS for authenticated and encrypted web browsing, signed and encrypted email via the S/MIME protocol, code signing, document signing, client authentication, and government-issued electronic ID.

Explanation:

8 0
3 years ago
According to which virtue do you need to secure information by limiting computer access to authorized personnel only ?
nadya68 [22]

Confidentiality is a virtue which we need to secure information by limiting computer access to authorized personnel only. People trust us to keep their private matters private. Keeping that confidence is an important aspect of trust.  

8 0
3 years ago
Read 2 more answers
Other questions:
  • At the dsl local carrier's office, the __________ demultiplexes the data streams and converts them into digital data.
    10·1 answer
  • An administrator needs to set up an authentication server for users connecting to a network through a VPN. What kind of server c
    10·1 answer
  • Interpretations of the AICPA Code of Professional Conduct are dominated by the concept of: Question 4 options: 1) independence.
    5·1 answer
  • Which item would you most likely keep in a database
    9·2 answers
  • The most accurate readings that you can take on an analog VOM are when the meter's pointer is at the A. center scale. B. extreme
    11·1 answer
  • An information system interacts with its environment by: A. processing data. B. XML protocols. C. receiving data. D. systems ana
    10·1 answer
  • Is the flow of power reversible in a leadscrew?
    11·1 answer
  • How should you schedule a meeting with someone in another time zone?
    7·1 answer
  • Which requires large computer memory?
    15·1 answer
  • A company is looking for an employee to design and test connections in its
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!