A contractor needs to destroy several drives containing confidential information so that they can never be used again. Which of the following destruction methods would best accomplish this task?

a. Format the hard drives
b. Overwrite the hard drives
c. Drill into the hard drives
d. Sanitize the hard drive


Answer: c. Drill into the hard drives

Computer Science & Information Technology

You might also like to view...

We've seen a method that reverses a sound and a method that can process samples by index number.

Write a method called reverseLastHalf that reverses just the second half of the current sound. For example, if the sound said \MarkBark" the returned sound should say \MarkkraB."

Computer Science & Information Technology

As the total loan balance decreases, a larger proportion is applied to interest and a smaller proportion is applied to principal

Indicate whether the statement is true or false.

Computer Science & Information Technology

The most popular tools for code assistance are called integrated development environments. or IDE's.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The computer handling incoming e-mail messages is known as the ____________________ e-mail server.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology