What Happens When There Are More Temporary Files ?

1 Answer

Answer :

If the temporary file is too much then the computer becomes slow.

Related questions

Description : Master Files contain data of: a) Permanent Nature b) Global Nature c) Temporary Nature d) Local Natur e) None of These

Last Answer : a) Permanent Nature

Description : Usually downloaded into folders that hold temporary internet files, _____ are written to your computer's hard disk by some of the websites you visit. a) anonymous files b) behaviour files c) banner ads d) cookies e) None of these

Last Answer : d) cookies

Description : Can web developers use HTML 5 to obtain your search histories (through temporary files, cookies. etc.) retroactively?

Last Answer : HTML 5 has nothing to do with it. The original purpose of a cookie was to save settings etc so the next time you visited the site it could pull those files and the ability for someone to grab that ... exploit what you have been up to has been around since the inception of the internet as we know it

Description : Would you feel comfortable knowing your temporary internet files were attached to a document that you sent out?

Last Answer : To start, there's a difference between your temporary internet files and what you type into Google. There's no real way a temporary internet file could save all of your Google queries. If you clicked on a ... that company with your query? They of all people would be the first people I'd go talk to.

Description : To what temporary area can you store text and other data, and later paste them to another location? 1) The clipboard 2) ROM 3) CD-ROM 4) The hard disk 5) None of these

Last Answer : Answer :1

Description : In which language is source program written? A) English B) Symbolic C) High level D) Temporary

Last Answer : Answer : C

Description : Which of the following terms is the most closely related to main memory? A) Non volatile B) Permanent C) Control unit D) Temporary

Last Answer : Answer : D

Description : Which of the following is not valid statement? A) Hard is referred to mean something temporary B) Hard is used to mean something tangible C) Soft is used to mean something permanent D) Soft is used to mean something tangible

Last Answer : Answer : B

Description : Which of the following terms is the most closely related to main memory? A. Non Volatile B. Permanent C. Temporary D. None of the Above

Last Answer : C. Temporary

Description : _________ is the transfer of computer data from a temporary storage area to the computer’s permanent memory. A. Flash B. Virtual C. Buffer Flush D. None of the Above

Last Answer : C. Buffer Flush

Description : ________ is a temporary pass through account held by a third party during the process of a transaction between two parties. A. Savings Bank Account B. Current Account C. Deposit Account D. Escrow Account E. None of the Above

Last Answer : D. Escrow Account Explanation: Escrow Account: Account in which funds are accumulated for specific disbursements. It is a temporary pass through account held by a third party during the process of a transaction between two parties.

Description : A high speed device used in CPU for temporary storage during processing is called: a) A register b) A Data Bus c) All of The Above d) None of The Above

Last Answer : a) A register

Description : Register is a 1) Set of capacitors used to register input instructions in a digital computer 2) Set of paper tapes and cards put in a file 3) Temporary storage unit within the CPU having dedicated or general purpose use 4) part of the auxiliary memory

Last Answer : 3) Temporary storage unit within the CPU having dedicated or general purpose use

Description : A temporary storage area, attached to the CPU, for I/O operations, is a 1) Channel 2) Buffer 3) Register 4) Core

Last Answer : 2) Buffer

Description : What actually happens to those files that are "quarantined" or put into the "virus vault"?

Last Answer : They sit there until you go in and delete them, unless your program is set to automatically delete them, depending on what type of anti virus software you are using.

Description : What happens to medical files when you die?

Last Answer : You (more likely your mother) can get copies of your dad's records. You'll probably have to fill out a form that allows the provider to release the records. Normally, when someone requests records they are ... of weeks to get them to you. I'm sorry to hear of your dad's passing. My condolences.

Description : ____________ is a collection of one or more files that correct flaws in the performance, reliability or security of a specific software product. A. Software Update B. Software Piracy C. Software patch D. None of the above

Last Answer : C. Software patch

Description : A database is typically composed of one or more: a) Columns b) Files c) Rows d) Tables e) None of These

Last Answer : d) Tables

Description : What keys are used to permanently delete programs or files ?

Last Answer : Shift + Del keys are used to permanently delete programs or files .

Description : How can the user determine what programs are available on a computer? 1) Checking the hard disk properties 2) Viewing the installed programs during the booting process 11 3) Checking the operating system ... of installed programs. 4) Checking the existing files saved on the disk 5) None of these

Last Answer : Answer :4

Description : Mostly which of the following device is used to carry user files? A) Floppy Disk B) Hard Disk C) RAM D) CDROM

Last Answer : Answer : A

Description : __________ is a content distribution protocol enables efficient software distribution and peer-to-peer sharing of very large files by enabling users to serve as network redistribution points. A. Freeware B. BitTorrent C. CorelDraw D. None of the above.

Last Answer : B. BitTorrent

Description : What are header files and what are its uses in C programming?

Last Answer : Header files are also known as library files. They contain two essential things: the definitions and prototypes of functions being used in a program. Simply put, commands that you use in C ... stdio.h is a header file that contains definition and prototypes of commands like printf and scanf.

Description : In the United Kingdom, the Regulation of Investigatory Powers Act gives UK police the powers to force suspects to _____that protect encryption keys: a) Hand over passwords b) Decrypt Files c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : _______viruses infect executable program files: a) File Infector Viruses b) Macro Viruses c) Multi Partite Viruses d) None of These

Last Answer : a) File Infector Viruses

Description : You organize files by storing them in: a) Archives b) Folders c) Lists d) None of These

Last Answer : b) Folders

Description : A stored collection of information is: a) Documentation b) Database c) Files d) None of These

Last Answer : b) Database

Description : A set of guidelines or standards that establish the format in which files can be transmitted from one computer to another is: a) Protocol for Files b) File Transfer Protocol c) Managing File Protocol d) None of These

Last Answer : b) File Transfer Protocol

Description : Which of the following stores the operating system files permanently: a) Frisk Drives b) Hard Disk c) RAM d) Cache e) None of These

Last Answer : b) Hard Disk

Description : A collection of interrelated records is called a: a) Information Management System b) Files Colleague c) Utility Files d) Database e) None of These

Last Answer : d) Database

Description : The process of transferring files from a computer on the internet to your computer on the internet to your computer is called: a) Downloading b) Uploading c) Sharing d) None of These

Last Answer : a) Downloading

Description : What do you understand by the term DOS: a) Downloading the system program from the Internet b) Downloading operating system c) The master control program of the computer which helps the computer to ... d) The programs which helps computer to check the various peripheral devices e) None of The Above

Last Answer : e) None of The Above

Description : Data (information) is stored in computer as ________: a) Directories b) Files c) Floppies d) Matter e) None of The Above

Last Answer : b) Files

Description : Why is it unethical to share copyrighted files with your friends: a) It is not unethical because it is legal b) It is unethical because the files are being given for free c) Sharing copyrighted files ... because the files are being given for free e) It is not unethical - anyone can access a computer

Last Answer : c) Sharing copyrighted files without permission breaks copyright laws

Description : The process of transferring files from computer on the internet is called: a) Downloading b) Uploading c) FTP e) JPEG f) Downsizing

Last Answer : b) Uploading

Description : You can keep your personal files/folders in: a) My Folder b) My Documents c) My Files d) My Text e) None of The Above

Last Answer : b) My Documents

Description : Overlay is: a) A part of an operating system b) A single contiguous memory that is used in olden days for running large programs by swapping c) Overloading the system with many user files d) None of The Above

Last Answer : b) A single contiguous memory that is used in olden days for running large programs by swapping

Description : Which of the Following is not true of immediate processing: a) It is often used in real time applications b) It can be used in an airline reservation system c) It can occur with either sequential or direct access files d) None of The Above

Last Answer : c) It can occur with either sequential or direct access files

Description : In the United Kingdom, the Regulation of Investigatory Powers Act gives UK police the powers to force suspects to _____that protect encryption keys: a) Hand over passwords b) Decrypt Files c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : You can keep your personal files/folders in a) My folder b) My documents c) My files d) My text e) None of these

Last Answer : b) My documents

Description : Distributed processing involves a) solving computer component problems from a different computer b) solving computing problems by breaking them into smaller parts that are separately processed by different ... ) allowing users to access network resources away from the office e) None of these

Last Answer : b) solving computing problems by breaking them into smaller parts that are separately processed by different computers

Description : Which of the following statements is false concerning file names? a) Files may share the same name or the same extension but not both b) Every file in the same folder must have a unique name c) File extension is another name for file type d) None of these

Last Answer : d) None of these

Description : You organise files by storing them in a) Archives b) Folders c) Indexes d) Lists e) None of these

Last Answer : b) Folders

Description : All the deleted files go to a) Recycle bin b) Task bar c) Tool bar d) My computer e) None of these

Last Answer : a) Recycle bin

Description : The search companion can a) locate all files containing a specified phrase b) restrict its search to a specified set of folders c) locate all files containing a specified phrase and restrict its search to ... a specified phrase or restrict its search to a specified set of folders e) None of these

Last Answer : a) locate all files containing a specified phrase

Description : ____ software creates a mirror image of the entire hard disk, including the operating system, applications, files and data. a) Operating system b) Backup software c) Utility programs d) Driver imaging e) None of these

Last Answer : b) Backup software

Description : Allows users to upload files to an online site so they can be viewed and edited from another location a) General purpose applications b) Microsoft Outlook c) Web-hosted technology d) Office live e) None of these

Last Answer : b) Microsoft Outlook

Description : Allows users to upload files to an online site so they can be viewed and edited from another location a) General purpose applications b) Microsoft Outlook c) Web-hosted technology d) Office live e) None of these

Last Answer : b) Microsoft Outlook

Description : Back up of the data files will help to prevent - 1) loss of confidentiality 2) duplication of data 3) virus infection 4) loss of data

Last Answer : 4) loss of data