answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andru [333]
2 years ago
11

In three to five sentences, describe whether or not files should be deleted from your computer. Explain your answer.

Computers and Technology
2 answers:
Diano4ka-milaya [45]2 years ago
7 0

Answer:

Yes but the one that you no longer need.

Explanation:

Your files take up space on your computer. When you have too many files saved on your computer, the efficiency of your computer may be reduced, causing your computer to work more slowly. For this reason, it is a good idea to review your files periodically and delete those that you no longer need. Many workers who want to maximize their productivity and the efficiency of their computers do this on a regular basis.

Svetach [21]2 years ago
5 0
I can argue with both parties here. Lets start with files SHOULD be deleted. Ahem, we don't need the extra space in our computers. If it was important and you've dealt with it, delete it. It's no use and no longer has value. NOW We shouldn't deleted files because we might need them in the future... Hear me out, lets say you have important files, you definitely don't want to delete those. Or incase you want to go down memory lane and look at old pictures or videos of you and your friends or gf/bf.
You might be interested in
Question 1:State the values of a, b, c, d and e after the following operations are carried out:
pychu [463]

Answer:

1.

a = 1

b = 20(int). 20,2857143(double)

c = 39

d = 7.6

e = 456

2.

x = 98

y = 99

z = 97

w = ca

print(x,y,z,w) -> 98 99 97 ca

3.

x = Please

y = walk on the gras

Pleasewalk on the gras

Explanation:

you can use IDE/Interpreter python to get clue number 3 and number 2

Sorry for bad English.

5 0
2 years ago
Seneca has just applied conditional formatting and realizes that she has made a mistake. Which action should she take to fix the
Mama L [17]

Answer:

its b

Explanation:

on edg

3 0
2 years ago
Read 2 more answers
Terry came into work and turned on his computer. During the boot process, the computer shut down. When he tried again, the compu
kirza4 [7]

Answer: Something to do with the storage device, in this case most likely a HDD.

Explanation: Operating System files has somehow probably gotten corrupted during the boot process, or the system drive connection to the motherboard have been severed.

7 0
2 years ago
Write a method called fact that recursively calculates the factorial value of its single int parameter. The value returned by fa
andrey2020 [161]

Answer:

The program to this question can be given as follows:

Program:

//class

public class factorial //defining class

{

//method fact

public static long fact(int x1) //defining method fact

{

//conditional statement

if (x1 <= 1) //if block checks parameter value less then equal to 1

{

return 1; //return value

}

else //else part

{

return (fact(x1 - 1) * (long) x1); //return factors using recursive function

}

}

//method main

public static void main(String[] args) //defining main method

{

long data=fact(5);//defining variable that holds function value

System.out.println("Factorial is: "+data); //print value

}

}

Output:

Factorial is: 120

Explanation:

In the above java program, a class is "factorial" is defined, inside the class, a static method "fact" is declared, that accepts an integer parameter that is "x1" and returns a long value, inside this method a conditional statement is used.

  • If the block it checks parameter value is less then equal to 1, if this condition is true, it will return 1 when this condition is not true. It will go in else part.
  • In else part, it uses a recursive function to calculate factorial of a number and return its value.
  • Then the main method is defined, inside this method a long variable "data" is defined, that call and holds fact function return value, and in the next line, the print function is used to print the data variable value.

6 0
2 years ago
A hidden backlog contains the projects that the IT department is not aware of because of low feasibility.
Finger [1]

Answer: True

Explanation:

Yes, the given statement is true that the due to the very low feasibility the IT (Information technology) department are not aware of the hidden backlog that basically contain projects.

The feasibility is the main factor in the IT department as it helps to study whole objective of the project and then also uncover all the strength and weakness of the project so that we can easily go through the details to make the project more efficient and reliable.

8 0
2 years ago
Other questions:
  • Jimmy is preparing a slide show to teach the grade three students the importance of cleanliness. which element should he use in
    5·2 answers
  • Danilo is planning the art to include in a business proposal his team is preparing. For which of the following items should Dani
    7·2 answers
  • The bit width of the LRU counter for a 32 KB 16-way set associative cache with 32 Byte line size is
    13·1 answer
  • Which of the registration patterns is best suited for complex architecture? A. Client side discovery pattern B. Third party regi
    13·1 answer
  • If a filesystem has a block size of 4096 bytes, this means that a file comprised of only one byte will still use 4096 bytes of s
    8·2 answers
  • A computer never gets tired or bored while working for a long time .. ​
    6·1 answer
  • c Assign to maxSum the max of (numA, numB) PLUS the max of (numY, numZ). Use just one statement. Hint: Call FindMax() twice in a
    10·1 answer
  • 10. There is repeated code in these onevent blocks. Choose the correct code for the updateScreen() function which would be calle
    11·1 answer
  • 15. It is the process of capturing data or translating information to recording format
    12·1 answer
  • In this problem, you will derive the efficiency of a CSMA/CD-like multiple access protocol. In this protocol, time is slotted an
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!