Which security method would be best to use if extremely sensitive government information were stored on a hard drive that will no longer be used?
A) 1/0 rewrite software.
B) Drill holes in the platters and smash the pieces with a hammer.
C) Hold a magnet over each platter.
D) Repartition the hard drive into multiple partitions using different file systems.
B
Computer Science & Information Technology
You might also like to view...
Display how many lines are in the file named Xfile
What will be an ideal response?
Computer Science & Information Technology
Excel allows you to ____________________ the titles so that the titles remain on the screen no matter how far down or to the right you scroll.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
How can you clear the statistics for a router interface?
What will be an ideal response?
Computer Science & Information Technology
In TCP/IP networking, port __________ is not used.
A. 0 B. 1 C. 13 D. 1023
Computer Science & Information Technology