Mike has a flash memory card that he would like to reuse. The card contains sensitive information. What technique can he use to securely remove data from the card and allow its reuse?
A. Degaussing
B. Physical destruction
C. Overwriting
D. Reformatting
Answer: C. Overwriting
Computer Science & Information Technology
You might also like to view...
A data management feature that allows you to focus on a subset of the data in a worksheet is called _____.
A. Selecting B. Filtering C. Extracting D. Formatting
Computer Science & Information Technology
An e-reader is a specialized form of a tablet
Indicate whether the statement is true or false
Computer Science & Information Technology
A(n) ________ server is a function that is usually included with the gateway that hides the IP address of the user's computer
Fill in the blank(s) with correct word
Computer Science & Information Technology
Which of the following specifies a start state of an object, and then animates the object using a uniform transition type?
A. frame animation B. animated GIF C. vector animation D. motion tween
Computer Science & Information Technology