1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Minchanka [31]
3 years ago
10

____________ are designed to delete temporary files (such as deleted files still in the Recycle Bin, temporary Internet files, t

emporary installation files, and so forth) in order to free up disk space.
Computers and Technology
2 answers:
Doss [256]3 years ago
7 0
It’s a disk clean up
Sergeu [11.5K]3 years ago
6 0

Answer:

Disk Cleanup?

Explanation: I think disk cleanup would be it. Hope this helps !!

<3

You might be interested in
Pls help I will mark you the brainliest
ehidna [41]

Answer:

c

Explanation:

6 0
3 years ago
Read 2 more answers
You are the network administrator for a small organization of 100 users. Users till now were freely browsing the Internet. You w
Schach [20]

Answer: Proxy server

Explanation: Proxy server is a type of server that is acts as interface between the network on huge scale and any local network. This server provides the feature of security, operations, privacy etc in the network system. They also help in improving the performance of the network.

It can work as the web filter to eliminate the unwanted websites.They acts as the gateway by  observing the website that is being browsed by the other user.Thus installation of proxy server should implemented on the organization.

8 0
3 years ago
These factors influence the design of a network.
REY [17]
Availability ,devices and applications, performance, security, scalability.
8 0
3 years ago
Read 2 more answers
The Apple ll is an IBM compatible PC “clone.”<br><br> True <br><br> False
aliya0001 [1]

Answer is: False


<u>Explanation:</u>

IBM PC compatible computers are computers similar to the original IBM PC, XT, and AT, able to use the same software and expansion cards. Such computers used to be referred to as PC clones, or IBM clones.

<u>PC clone:</u>

In computer programming, particularly object-oriented programming, cloning refers to object copying by a method or copy factory function, often called clone or copy , as opposed to by a copy constructor.

7 0
4 years ago
How big was a 10MB disk drive?
guajiro [1.7K]
10 megabytes or 10000 kilobyte
5 0
3 years ago
Other questions:
  • This question involves the implementation of the PasswordGenerator class, which generates strings containing initial passwords f
    5·1 answer
  • Which writing format is also beneficial to public speaking? a. Five paragraph essay c. Conventions b. Prose d. None of these
    5·2 answers
  • If you have a mix of 32-bit and 64-bit versions of windows, which architectures should you add a unattended installation file fo
    7·1 answer
  • The code int *p; declares p to be a(n) ____ variable. new
    8·1 answer
  • When using a search engine, what is the name of a word or phrase somebody types to find something online?
    12·2 answers
  • PLEASE HELP ASAP!!
    11·2 answers
  • Where can you find your EFC
    8·2 answers
  • Does clicking ads and pop ups like the one shown in this image could expose your computer to malware?
    15·1 answer
  • Users of Adobe Reader, created by Adobe Systems Incorporated, are prompted to provide feedback on their experiences with the sof
    7·1 answer
  • Bro i swear whenever i play fortnite duos, they ask you if you don't have a mic, if you don't then they just leave, so annoying
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!