Mike has a flash memory card that he would like to reuse. The card contains sensitive information. What technique can he use to securely remove data from the card and allow its reuse?

A. Degaussing
B. Physical destruction
C. Overwriting
D. Reformatting


Answer: C. Overwriting

Computer Science & Information Technology

You might also like to view...

A data management feature that allows you to focus on a subset of the data in a worksheet is called _____.

A. Selecting B. Filtering C. Extracting D. Formatting

Computer Science & Information Technology

An e-reader is a specialized form of a tablet

Indicate whether the statement is true or false

Computer Science & Information Technology

A(n) ________ server is a function that is usually included with the gateway that hides the IP address of the user's computer

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following specifies a start state of an object, and then animates the object using a uniform transition type?

A. frame animation B. animated GIF C. vector animation D. motion tween

Computer Science & Information Technology