answersLogoWhite

0


Best Answer

If a file is in the trash can then its trashed. Some operating systems prevent trashing by asking for a login and password before trashing a file.

A computer which has been sensibly designed should refuse to trash itself as trashing itself would use itself to trash itself.

User Avatar

Wiki User

13y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: How does the system detects trashing?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Engineering

What are the uses of power system stabilizer?

PSS is a part of AVR in the form of an algorithm which detects and helps in damping of power system oscillations.


List two examples of categories for both passive and active network security attacks?

passive attacks : footprinting, trashing active attacks : sniffing, social engineering


When the byte codes in a class file are invalid which one of the following must detect it?

When you have bytecode, the program is already compiled; so it would be the JVM which detects that.


What is the difference between radar level measurement and ultrasonic level measurement?

Radar is based on Microwave and detects the change in dielectric constant where as Ultrasonic is based on Sound Wave at high frequency (Ultrasonic Wave) and detects change in density of medium. Based on performance and accuracy Radar is a better solution than Ultrasonic. However for lower range liquid application ultrasonic is a cost effective solution. hope this is useful for you!


What are loop detectors are use to do?

A smoke detector detects smoke, a fire detector detects fire. A loop detector, surely, detects a loop. Many detectors are also based on a loop of wire. For example, loops within the tarmac detect the presence of a car (a mass of ferromagnetic material) and triggers or promotes a change if the lights from red to green. Other sensors use loops as aerials, for example in theft-prevention systems used in shops. In the context with computer programming, one can envision a variety of methods to detect a loop which fails to terminate (and unintentionally endless loop, or one which doesn't terminate in a timely fashion). Critical loops can be monitored for a maximum number of iterations or a maximum duration.