1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AnnyKZ [126]
3 years ago
12

Which method of deleting files can be used in windows xp and vista?

Computers and Technology
1 answer:
Makovka662 [10]3 years ago
4 0
The correct answer is C.

You might be interested in
(true/false) In a layered operating system design, requests (such user processes may need to interact with multiple layers, resu
Julli [10]

Answer:

The correct answer to this question is "true".

Explanation:

In a layered operating system, all the layers defined individually and communicate with each other when required. It is also easier to create, manage and update the system. If we change in one layer. The Changement has done in only a specific layer it does not affect any other layers. In this operating system, there are 6 layers.

In the monolithic system. It works on the kernel space. That increases the size of the operating system and kernel. It is different than the microkernel system. In the monolithic system, there are 3 layers.

If we assign any work to both, So the 6 layers will take more time to do that work. when that 3 layers take less time to do that work.

that's way layered operating performance is slower than the monolithic system.

6 0
4 years ago
What is output? x=-2 y=-3 print (x*y+2)
Shalnov [3]

Answer:

=8

Aaaaaaaaaansjxjdjsaaaaaaa

Explanation:

-2*-3=6+2=8

8 0
3 years ago
During the maintenance phase of the systems development life cycle (SDLC), hardware and software components have been _____.
Sedbober [7]

Answer:

developed and tested.

Explanation:

5 0
2 years ago
What could be one possible reason where the recipient is not guaranteed that the data being streamed will not get interrupted?
anyanavicka [17]

Answer

The senders PC is using UDP protocol

Explanation

UDP is the User Datagram Protocol which is used as an alternative communication protocol to the TCP which is used primarily for establishing low latency and loss of tolerating connections between applications on the internet UDP is normally used by the programs running on different computers on a network. Its purposes is to send short messages which are datagrams. It is not much reliable because of its occasional loss of packet. Due to this packet loss  the recipient is not guaranteed that the data being streamed will not get interrupted. This is because If a router on the Internet starts getting overloaded, or a packet gets corrupted due to interference or anything, the packet will be dropped unlike the TCP (Transmission control  protocol)which resend the packets and keeps re sending. The UDP does not resend the packets which are dropped. Once they are dropped that all.


3 0
3 years ago
Which of the following is NOT a fall prevention system?
Nataly [62]
Is this multiple choice
5 0
3 years ago
Read 2 more answers
Other questions:
  • Suppose a subnet has a prefix 128.119.44.128/26. Give an example of an IP address from this subnet. If an ISP owns a block of ad
    14·2 answers
  • The purpose of an experiment is often based on ? A. new theories B. observations C. opinions of famous scientists D. beliefs of
    10·1 answer
  • Find meanings for the words and give examples where you can<br><br> WORTH 30 points
    12·1 answer
  • What does limited access to a document mean?
    14·2 answers
  • Which statements identify what astronomers currently know and think will happen with our universe? Check all that apply.
    15·2 answers
  • Are scripted languages easier or more difficult to port than programming languages? Why?
    6·1 answer
  • Authentication is a mechanism whereby unverified entities or supplicants who seek access to a resource provide a label by which
    12·1 answer
  • A user calls and complains that she cannot access important company files from her personal device. You confirm that Intune poli
    13·1 answer
  • Pls answer will give brainlest dont answer if you dont know
    8·1 answer
  • Who is the founder of C language?​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!