How to operate to clean up computer junk

Updated on technology 2024-04-13
6 answers
  1. Anonymous users2024-02-07

    I recommend you an optimization software, glary utilities, which I use, which is good

    glary utilities is a collection of system tools that repair, speed up, enhance and protect your PC. It allows you to clean up system junk files, invalid registry keys, browsing logs, etc. You can also manage and delete IE plugins, analyze disk space usage, and find duplicate files.

    In addition, Gary Utilities optimizes memory, finds, repairs, or deletes shortcuts, manages Windows startup programs, uninstalls software, securely deletes files, finds empty directories, and more.

    Support multilingual interfaces such as Chinese Simplified Chinese.

  2. Anonymous users2024-02-06

    del /f /s /q %systemdrive%\*log

    For the above one, this line should be used with caution, because some software will be added to the system directory after installation. log file, if deleted, the software may be uninstalled abnormally.

    If you want to use the one above, you can delete this line and use it again. This is the experience, take it out and share it.

  3. Anonymous users2024-02-05

    Go online and find a system junk removal. bat cleanup.

    Then use Optimizer to clear the redundant information of the system registry.

  4. Anonymous users2024-02-04

    You can install a little software to help you! There are a lot of this kind of software, you can search for it and install it. I'm using it myself.

  5. Anonymous users2024-02-03

    The next optimization master!

    Optimize the official website of the master].

  6. Anonymous users2024-02-02

    1. Enter the %temp% command method.

    temp% is the environment variable of the system, which corresponds to the C:Documentsand SettingsAdministratorLocal settingstemp folder, and this folder will be opened by running %temp%. There are temporary files left over from the installation of software and other work, and they are useless junk files, which can be deleted completely.

    Click "Begin --Run" in the bottom left corner and enter "%temp%" (in quotation marks). Click "OK" to see the junk files in the C drive, then select all and delete them. (does not affect the system).

    If you can't delete them all, delete them one by one (shredd). I still can't delete it, so leave it alone for now.

    2. Disk cleaning method.

    Click "Start Run", enter "cleanmgr sagerun:99" in "Run", and the system will perform the "Special Mode" of Clean Disk Utility.

    After press Enter, you can quickly clean up the system junk files, and multiple dialog boxes will pop up in turn.

    If you want to selectively clean, enter "cleanmgr sageset:99" in the run dialog box and press enter, and many cleaning options will appear, select the files that need to be cleaned.

    3. Run the cookie command method.

    Open Start in the lower left corner of your computer, enter Running, enter cookies, and click OK. Block and delete all the files in the pop-up box.

Related questions
11 answers2024-04-13

Computer operating system, can be divided into three types, UNIX series, Linux series, Windows series, now Windows series with a lot of people, and it is easier to get started, it is more successful in terms of graphical operation interface! At the same time, its security is not very good, as a server system, it still uses relatively high security Linux, or UNIX operating system, these two operating systems, now also support graphical interfaces. Windows series are common, Windows XP, Windows Me, Windows 2000, Windows NT, Windows Server2003, Windows 2000 Server >>>More

5 answers2024-04-13

360TimeProtect time protection tool.

Thanks to MJ0011 for delivery. >>>More

5 answers2024-04-13

Novices should first learn how to operate a computer, including the use of a familiar keyboard and mouse, and then learn to type, and then learn to use the operating system proficiently. >>>More

4 answers2024-04-13

1. Inter-process communication is to disseminate or exchange information between different processes, so what media can be accessed by both parties between different processes? The user space of the processes is independent of each other and generally cannot be accessed from each other, with the only exception being shared memory. >>>More

6 answers2024-04-13

Summary. On the one hand, education and training around computer science emphasize technical capabilities such as programming, algorithms, and data processing; On the other hand, it pays more attention to the application and practice of computational thinking as an interdisciplinary way of thinking for solving complex problems and innovative thinking. >>>More