What type of junk files are in your computer? Why is it always unfinished?

Updated on technology 2024-05-22
9 answers
  1. Anonymous users2024-02-11

    Some files may have been deleted, but emptying the ** station is still some fragments, if these things are not cleaned up disk, they can be recovered by recovering the hard disk. Others are caches or cookies

  2. Anonymous users2024-02-10

    As long as the system is running, it will produce junk files, which is normal, as long as it does not affect the performance of use, it can be ignored.

  3. Anonymous users2024-02-09

    In the computer, those types of files are deleted without going through the ** station.

    1. Read-only files: Read-only files cannot be deleted because the system prevents users from deleting read-only files. 2. System files:

    System files are shortened by the files used by the operating system, they contain the key information of the system, and deletion of these files can cause the system to crash. 3. Hidden Files: Hidden files cannot be deleted either, as they are important files of the system, and deleting them will cause errors in the system.

    4. Protected files: Protected files are important files of the operating system, they are protected by the operating system and cannot be deleted.

  4. Anonymous users2024-02-08

    2.Turn on 360 Security Guard.

    3.Click on PC Cleanup below.

    4.Click on Yijian Scan.

    5.After the scan is completed, click on Yijian Law.

  5. Anonymous users2024-02-07

    1. Cleaning to be done before shutting down every day:

    Double-click "My Computer" - right-click on the C drive - click "Properties" - click "Disk Cleanup" - click "OK" - click "Yes" - click "OK" again. During the cleaning process, you can see that the "temporary files" that came in without your permission (you can click "View Files" to see, you will know) have been cleared, and the disk space is more. This method should also be used for d, e, and f disks.

    2. Clean-up to be carried out at any time:

    Open the webpage - click "Tools" in the top row - click "Internet Options" - click "Delete Files" in the middle of "Temporary Internet Files" - then tick the box before "Delete all offline content" - click "OK" - click "OK" after clearing. In this way, you can increase the speed for opening the net and space. ­

    3. Garbage cleaning of the disk for a week:

    Click "Start" - point to "All Programs" with the mouse, then "Accessories", then "System Tools", then "Disk Defragmenter" - click on the C drive, then "Defragment" (this takes a long time, and is best done when you go to dinner and don't use the computer.) You can see the condition of your plate during the cleanup, and you can compare the before and after cleaning) - click "Close" after the "Cleaning Completed" pop-up. According to the above, the D, E, and F disks are cleaned separately. ­

  6. Anonymous users2024-02-06

    Stubborn junk files are generally difficult to clear by ordinary deletion methods, and they will be restored by themselves after deletion. Here's how to fix it:

    1. First of all, make sure that the computer is installed with 360 security guard;

    2. Right-click on the file you want to delete and select "Use 360 Force Delete".

    3. In the 360 file shredder, you can add the files you want to delete by yourself, and check "Prevent recovery" and "Prevent file regeneration" after adding;

    4. After checking the box, click "Shred File", and then click "Confirm" in the pop-up prompt box;

    5. The file has been successfully shredded and deleted;

  7. Anonymous users2024-02-05

    In the system disk, C: documents

    andsettings\administrator\localsettings\temp

    c:\windows\temp

    inside this folder.

    Optimization masters, Kingsoft assistants can be cleared!

  8. Anonymous users2024-02-04

    Enter in Keywords. tmp*

    What comes out are temporary documents.

    You can safely delete it to save memory space.

  9. Anonymous users2024-02-03

    Your next 360 security guard! You can use all the functions in it, basically, you use all those functions, and those junk files and Trojan files are gone.

Related questions
2 answers2024-05-22

Generally, it is used for single-byte characters in plain EnglishASCII code >>>More

7 answers2024-05-22

Answer]: c micro computing machine display is divided into two types: color display and single display. Different displays require different graphics cards. >>>More

8 answers2024-05-22

The IP address is like your home address, and the network is like a post office, and your communication with others is data, and the network is the transmission of this data, and if you don't have an IP, you don't have an address, so how can the post office send you letters!

6 answers2024-05-22

Logging out means sending a request to the system to clear the user who is now logged in, after which you can use other users to log in to your system, logging out is not a substitute for restarting, only the current user's cache space and registry information can be cleared. >>>More

7 answers2024-05-22

The national standard code is the standard code for the exchange of information between Chinese characters.