What is the purpose of hashing a copy of a suspect drive?

A. To render it read-only
B. To check for changes
C. To remove viruses
D. To make it secure


Answer: B. To check for changes

Computer Science & Information Technology

You might also like to view...

The remove(Object theElement) method of the ArrayList class returns:

(a) Int (b) Double (c) Byte (d) Boolean

Computer Science & Information Technology

Database design begins with:

A) creating the correct queries. B) creating the correct forms. C) grouping the data in alphabetical order. D) grouping data into the correct tables.

Computer Science & Information Technology

A check box is used to show whether an option is selected in a(n) ________ data type field

A) Yes/No B) Hyperlink C) OLE Object D) AutoNumber

Computer Science & Information Technology

Which law makes it illegal to discriminate against somebody based upon age?

a. The Civil Rights Act of 1964 b. The Age Discrimination in Employment Act of 1967 c. Americans with Disabilities Act of 1990 (ADA) d. The First Amendment of the Constitution

Computer Science & Information Technology