1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
swat32
3 years ago
6

Read the following scenario. How might Sarah correct successfully complete her task?

Computers and Technology
1 answer:
nexus9112 [7]3 years ago
4 0

Answer:

Explanation:

A: To permanently remove a file from her computer, Sarah doubled-clicked on the My Computer icon and searched for her file under the “Uninstall or change a program” menu option.

or

b: empty the recycle bin : You can permanently delete a program file installed in the computer by following the procedure in option A. The option above will take you to the control panel and you'll be able to select the program you'd want to permanently remove. If you had initially deleted a file like a picture or a document or anything else that you necessarily do not need, it will go to recycle bin. You can head over there and select the Empty the Recycle Bin option to permanently delete the file.

You might be interested in
The code below uses the Space macro which simply displays the number of blank spaces specified by its argument. What is the firs
IceJOKER [234]

Answer:

Code explained below

Explanation:

Include Irvine32.inc

INCLUDE Macros.inc               ;Include macros for space

.code

main proc

  push 4                   ;Push 4 to the stack

push 10                   ;Push 10 to the stack

  call rcrsn                   ;call the function  

  exit

  ;invoke ExitProcess,0           ;After return from the function

                      ;call exit function

  main ENDP               ;end the main

  rcrsn PROC               ;define the function

      push ebp               ;push the ebp into stack

      mov ebp,esp           ;set ebp as frame pointer

      mov eax,[ebp + 12]       ;This is for second parameter

      mov ebx,[ebp + 8]       ;This is for first parameter

      cmp eax,ebx           ;compare the registers

      jl recurse           ;jump to another function  

      jmp quit               ;call quit

      recurse:               ;Implement another function  

      inc eax               ;increment count value

      push eax               ;push the eax value into stack

      push ebx               ;push ebx into stack

      call rcrsn           ;call above function

      mov eax,[ebp + 12]       ;This is for second parameter

      call WriteDec           ;write the value on the screen

      mWritespace 2           ;Space macro print 2 spaces

                      ;pause the screen

      quit:               ;Implement quit function

      pop ebp               ;pop the pointer value from the stack

      ret 8               ;clean up the stack

 

  rcrsn ENDP          

end main

6 0
4 years ago
Which very high-speed fiber network was already in place and being used for wide area networking (wan) transmissions, before the
Stolb23 [73]

The high-speed fiber network that is already in place and being used for wide area networking (wan) transmissions, before the IEEE developed the 10gbe ethernet standards is called SONET.

<h3>What does SONET stand for in networking?</h3>

SONET  is known to be a term that is called Synchronous Optical Network.

This is said to be defined as a standard  that is known to be used in linking or in the act of connecting fiber-optic transmission systems and it is one that is sold in North America only.

Therefore, The high-speed fiber network that is already in place and being used for wide area networking (wan) transmissions, before the IEEE developed the 10gbe ethernet standards is called SONET.

Learn more about fiber network from

brainly.com/question/26259562
#SPJ1

8 0
2 years ago
Someone posing as an IT tech requests information about your computer configuration. What kind of attack is this
ra1l [238]

Answer:

Phishing

Explanation:

Phishing is one of the most common social engineering attacks in which the attacker disguises to be a trustworthy personnel in order to lure the victim or target into disclosing sensitive information such as passwords, credit card details and so on.

Phishing could be carried out via emails, telephones, or even text messages.

In this case, the attacker pretends to be an IT tech in order to get your computer configuration details which he can then use to carry out some other fraudulent acts.

Another example is in the case of someone receiving an email from their bank requesting that they need to update their records and need the person's password or credit card PIN.

8 0
4 years ago
A computer connected to the internet that asks for data is a ________. aggregator surrogate server client
Tems11 [23]
The answer to this question would be client.

Client is the computer that most people use. When you browsing a web using the internet, your computer will ask for data from the web server and the data will be arranged into graphical picture or words what you see on your monitor. Server is the computer that gives data the client ask for.
3 0
3 years ago
1. Write a query to list the names all products (by product code and name) and the average ordered quantity for each product wit
r-ruslan [8.4K]

select WorkCenterId, Count (ProducedIn_t.ProductID) as 'TotalProducts' from ProducedIn_t left outer join Product_t on Product_t.ProductID=Product_t.ProductID group by WorkCenterId

8 0
4 years ago
Other questions:
  • Suppose that some company has just sent your company a huge list of customers. You respond to that company with a strongly worde
    15·1 answer
  • Is a small file that a web server writes to the disk drive of the client computer, containing information about the user?
    8·1 answer
  • It's safe to download files from the internet if u perform regular Windows security updates, that is all u need to protect your
    10·2 answers
  • Identify the characteristics of logic problems.select all that apply
    5·1 answer
  • Which is an internet service? <br> A.) antivirus <br> B.) chat <br> C.) firewall<br> D.) router
    6·2 answers
  • Consider the following process for generating binaries. A compiler is used to generate the object code for individual modules, a
    8·1 answer
  • How many bits are required to store the text of the number "97" in ASCII?'
    5·2 answers
  • What decides the amount of delay between shots on a digital camera?
    7·1 answer
  • Create a Python program that computes the cost of carpeting a room. Your program should prompt the user for the width and length
    10·1 answer
  • You suspect that a bad video driver is causing a user's system to randomly crash and reboot. Where would you go to identify and
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!