Briefly describe the purpose of a secure erase operation.
What will be an ideal response?
When a PC will be handed-down to another user, recycled, sold, or disposed of in other ways, the user's personal and confidential information can be compromised. Forensic utility software tools can uncover information on a hard drive, even when it is deleted and reformatted. A secure erase utility writes repetitive bit patterns on a hard disk to effectively obliterate the information on the drive.
You might also like to view...
Most physical security plans are developed separately from the planning that defines the activities of the information security process.
Answer the following statement true (T) or false (F)
Why should a program use type int variables when possible?
a. On many computers, calculations involving type int are faster than calculations with type float. b. Type int values typically require less storage space than type float. c. Operations with type int are always precise, whereas there may be some loss of accuracy when computations involve type float. d.Reasons a, b, and c are all valid. e. None of the above.
The OS X file system uses ________
A) DoS B) HFS+ C) FAT D) NTFS
Access queries can be created in Design view and then modified in SQL view
Indicate whether the statement is true or false