What keys are used to permanently delete programs or files ?

1 Answer

Answer :

Shift + Del keys are used to permanently delete programs or files .

Related questions

Description : How to permanently delete back up files?

Last Answer : answer:Get a good deletion program. https://www.google.com/webhp?sourceid=navclient&ie=UTF-8#q=windows+deletion+programs

Description : Insert, Delete, Page Up, Page Down, Home, Down keys located _____the arrow keys: a) Above b) Parallell c) Below d) None of These

Last Answer : a) Above

Description : Which of the following stores the operating system files permanently: a) Frisk Drives b) Hard Disk c) RAM d) Cache e) None of These

Last Answer : b) Hard Disk

Description : How do you permanently delete items in the Itunes Download queue? I purchased a TV series and it gave me two of every show (one HD and one normal).

Last Answer : I honestly think you haveto just let it download and then delete it. I went through the same thing. I downloaded them while I was sleeping so it didn’t slow me down at all.

Description : How can i permanently delete IE and WMP from my hard drive safely?

Last Answer : Although uninstalling Internet Explorer from Windows is possible, you are strongly advised not to remove IE, for a number of reasons [1]: 1. Many web sites are programmed to work only with ... the alternatives first, such as making IE more secure, or hiding Internet Explorer. -mozillazine.org

Description : When we permanently delete a file from a PC, how does it vanish?? Will it mix in the air?

Last Answer : I don’t think the first law of thermodynamics applies to this situation.

Description : In the United Kingdom, the Regulation of Investigatory Powers Act gives UK police the powers to force suspects to _____that protect encryption keys: a) Hand over passwords b) Decrypt Files c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : In the United Kingdom, the Regulation of Investigatory Powers Act gives UK police the powers to force suspects to _____that protect encryption keys: a) Hand over passwords b) Decrypt Files c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Does formatting a hard drive make deleted files permanently irretrievable?

Last Answer : It makes them more difficult to retrieve, but unless you write new data over the data (sometimes called ‘zeroing’) it’s still retrievable. And people who have highly sensitive equipment and a lot of money and time to spend can still have a chance at recovering the data even then.

Description : In what type of memory are often used instructions and programs permanently stored inside the computer?

Last Answer : Read-only memory (ROM

Description : How can the user determine what programs are available on a computer? 1) Checking the hard disk properties 2) Viewing the installed programs during the booting process 11 3) Checking the operating system ... of installed programs. 4) Checking the existing files saved on the disk 5) None of these

Last Answer : Answer :4

Description : What do you understand by the term DOS: a) Downloading the system program from the Internet b) Downloading operating system c) The master control program of the computer which helps the computer to ... d) The programs which helps computer to check the various peripheral devices e) None of The Above

Last Answer : e) None of The Above

Description : Overlay is: a) A part of an operating system b) A single contiguous memory that is used in olden days for running large programs by swapping c) Overloading the system with many user files d) None of The Above

Last Answer : b) A single contiguous memory that is used in olden days for running large programs by swapping

Description : ____ software creates a mirror image of the entire hard disk, including the operating system, applications, files and data. a) Operating system b) Backup software c) Utility programs d) Driver imaging e) None of these

Last Answer : b) Backup software

Description : Are there any programs that allow you to configure more keys as modifier keys?

Last Answer : Autohotkey is the gold standard.

Description : How to find and delete duplicate files on a PC running Windows 7?

Last Answer : answer:Go to www.filehippo.com All free software. Type ‘duplicate’ in the search box. You will see several free programs. Read the description, download.

Description : C drive full and I'm not sure what files to safely delete.

Last Answer : Download CCcleaner and start with that.

Description : How to delete files from a CD?

Last Answer : I don’t think this is possible… you’ll need to use a fresh blank CD.

Description : How do i delete 1997 computer files from my computer?

Last Answer : Reformat the whole drive. Start fresh.

Description : How can I delete Thumbnail files on a MAC?

Last Answer : I can’t help you, but I know someone who can. In a day or two ill have them look at this.

Description : Regular expressions in windows shell to delete multiple files, is it possible?

Last Answer : Windows's cmd or command.com aren't real shells in the Unix sense. I'd say you're better off installing a scripting language like Perl (http://www.activeperl.com is the easiest Windows solution) and then run ... unlink $_ if -f and !/\.jpe?g$/i and $_ ne q{gallery.xml} }, q{directory_to_search})

Description : If I delete Vuze will all of the files I downloaded with it be deleted too?

Last Answer : No, and congratulations on making a good choice. Get uTorrent or BitLord and you’re golden.

Description : How can I delete files on my desktop and still keep them?

Last Answer : My best advice is spring cleaning but you could always just put your stuff into a folder(s), and have that on the desktop But there are platform specific alternatives: On windows: You can change their ... ONLY WAY TO RETRIVE THEM BACK TO PLAIN VIEW IS TO RENAME THEM ON THE TERMINAL WITH SUDO!!!!

Description : Free Software to delete multiple files on Mac?

Last Answer : answer:If I remember correctly, there is one called Singular. Be careful though, deleting duplicates could be a headache if you have modified one and delete the newer version accidently. I’d check to make sure there’s a setting that keeps the most current of the two files.

Description : Can I delete all of the patch files I've downloaded for World of Warcraft?

Last Answer : answer:Yes, it’s fine to remove these, if you are speaking about the .exe (Or whatever the equivalent of an exe is on the Mac). Once the patch has been installed, all the modifications are put into the World of Warcraft directory, so just stay away from there and you’ll be fine

Description : On a Windows PC, can you delete all those update files with the long code names and a dollar sign at the front?

Last Answer : Where are they located exactly?

Description : I have a usb thumb drive that I think has some spyware and viruses on it how do I delete all the files or format it without infecting my pc?

Last Answer : well, you could smash it with a hammer, a rather crude way, but effective, otherwise you could take the risk, plug it in and reformat it, why do you think it has multiple spyware and virus files on it, and are they mount activated ?

Description : How do you delete long path files?

Last Answer : Long path tool was always there for me in this type ofproblem. I've been using it for months now and it isreally helpful

Description : Why do we delete files from pen drive?

Last Answer : To create more space on it for other files.

Description : The metal disks, which are permanently housed in, sealed and contamination free containers are called A) Hard disks B) Floppy disk C) Winchester disk D) Flexible disk

Last Answer : Answer : C

Description : Which unit holds data permanently? A) Input unit B) Secondary storage unit C) Output Unit D) Primary Memory Unit

Last Answer : Answer : B

Description : ___________ is a combination of software permanently stored in the memory. A. Freeware B. Shareware C. Open Source Software D. Firmware

Last Answer : D. Firmware

Description : ROM (Read Only Memory), is a type of memory that can ________store data: a) Permanently b) Semi Permanently c) Permanently or Semi - Permanently d) None of These

Last Answer : c) Permanently or Semi - Permanently

Description : The metals disks which are permanently housed in salad and contamination free containers are called: a) Hard Disk b) Winchester Disk c) Flexible Disk d) None of The Above

Last Answer : b) Winchester Disk

Description : Which of the following is a storage device that uses rigid, permanently installed magnetic disks to store data/information - 1) Floppy diskette 2) Hard disk 3) Permanent disk 4) None of these

Last Answer : 2) Hard disk

Description : Which of the following is a storage device that uses rigid, permanently installed magnetic disks to store data/information - 1 Floppy diskette 2 Hard disk 3 Permanent disk 4 None of these

Last Answer : 2 Hard disk

Description : Do you find programs with ”help” files that can’t be accessed offline disingenuous?

Last Answer : Yes, I certainly do. Unfortunately, it seems that many if not most of the help documentation out there is written hastily, as an afterthought, and not tested. Programmers like to write code, not ... not found any tactful way to bring this up without the developers having a snit about it, either.

Description : Default programs to open picture files in problem...help?

Last Answer : Defaults for opening applications can be reset from the Control Panel. I would delete that program because it does things without permission. She may wish to install IrfanView which is quite well-behaved and free.

Description : On a mac, is there some way I can change the default Icon for a program's files?

Last Answer : If there’s not an option to change them in CandyBar, I can’t think of another way to change every file of a type. You can change individual files’ icons by going to “Properties”, then clicking the icon, and pasting an image over it.

Description : It is used to start programs, obtain help, search for files and folders etc. (a) File menu (b) Edit menu (c) Format menu (d) Start button -Technology

Last Answer : (d) Start button is used to start program, obtain helps, search for files and folders etc and also displays the most commonly used programs in a particular context.

Description : …………. represent graphical representation of various files and programs of an operating system. -Technology

Last Answer : Icons represent graphical representation of various files and programs of an operating system.

Description : …………. represent graphical representation of various files and programs of an operating system. -Technology

Last Answer : Recycle Binrepresent graphical representation of various files and programs of an operating system.

Description : ………….. are desktop icons that links to particular files and programs. -Technology

Last Answer : Shortcutsare desktop icons that links to particular files and programs.

Description : Define what do the characters “r” and “w” mean when writing programs that will make use of files?

Last Answer : “r” means “read” and will open a file as input wherein data is to be retrieved. “w” means “write”, and will open a file for output. Previous data that was stored on that file will be erased.

Description : ………… system consists of programs, data files and documentation A) Conceptual B) Logical C) Physical D) None of the above

Last Answer : C) Physical

Description : How many keys are on the keyboard ?

Last Answer : Usually the keyboard has 104 to 110 keys.

Description : How many control keys are there on the key board ?

Last Answer : Usually there are 2 o'clock. In some cases it is 1 o'clock.

Description : What is a keyboard ? How many types of keyboards and what are the keys ?

Last Answer : Keyboard is one of the main input devices of computer. Almost all the data for processing is input through the keyboard. And most of the instruction work is done with the help of keyboard. Again, ... Keyboard with 64 buttons , 3. Extended keyboard. But now 104 keyboard keyboard is being used more.

Description : How many types of keyboard keys ?

Last Answer : Keyboard keys - 6 types.

Description : Symmetric - key cryptography refers to ______methods in which both the sender and receiver share the same key ( or , less commonly, in which their keys are different but related in an easily computable way): a) Encryption b) Decryption c) Both of above d) None of These

Last Answer : a) Encryption