A contractor needs to destroy several drives containing confidential information so that they can never be used again. Which of the following destruction methods would best accomplish this task?
a. Format the hard drives
b. Overwrite the hard drives
c. Drill into the hard drives
d. Sanitize the hard drive
Answer: c. Drill into the hard drives
You might also like to view...
We've seen a method that reverses a sound and a method that can process samples by index number.
Write a method called reverseLastHalf that reverses just the second half of the current sound. For example, if the sound said \MarkBark" the returned sound should say \MarkkraB."
As the total loan balance decreases, a larger proportion is applied to interest and a smaller proportion is applied to principal
Indicate whether the statement is true or false.
The most popular tools for code assistance are called integrated development environments. or IDE's.
Answer the following statement true (T) or false (F)
The computer handling incoming e-mail messages is known as the ____________________ e-mail server.
Fill in the blank(s) with the appropriate word(s).