Briefly describe the purpose of a secure erase operation.

What will be an ideal response?


When a PC will be handed-down to another user, recycled, sold, or disposed of in other ways, the user's personal and confidential information can be compromised.  Forensic utility software tools can uncover information on a hard drive, even when it is deleted and reformatted.  A secure erase utility writes repetitive bit patterns on a hard disk to effectively obliterate the information on the drive.

Computer Science & Information Technology

You might also like to view...

Most physical security plans are developed separately from the planning that defines the activities of the information security process.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Why should a program use type int variables when possible?

a. On many computers, calculations involving type int are faster than calculations with type float. b. Type int values typically require less storage space than type float. c. Operations with type int are always precise, whereas there may be some loss of accuracy when computations involve type float. d.Reasons a, b, and c are all valid. e. None of the above.

Computer Science & Information Technology

The OS X file system uses ________

A) DoS B) HFS+ C) FAT D) NTFS

Computer Science & Information Technology

Access queries can be created in Design view and then modified in SQL view

Indicate whether the statement is true or false

Computer Science & Information Technology