Which two methods would be used to ensure corporate confidential data on a hard drive is removed before donating the hard drive to a school? (Select two.)

A) Antivirus software
B) Degauss
C) Drill holes into the platters
D) Remote wipe
E) Secure erasing


B, E

Computer Science & Information Technology

You might also like to view...

Peer-to-peer systems typically depend on untrusted and volatile computer systems for most of their resources. Trust is a social phenomenon with technical consequences. Volatility (i.e. unpredicatable availability) also is often due to human actions. Elaborate your answers to Exercise 10.4. by discussing the possible ways in which each of them is likely to differ according to the following attributes of the computers used: i) ownership ii) geographic location iii) network connectivity iv)country or legal jurisdiction What does this suggest about policies for the placement of data objects in a peer-to-peer storage service?

What will be an ideal response?

Computer Science & Information Technology

The Linux basename utility has an optional second argument. If you give the command basename path suffix, basename removes the suffix and the prefix from path:

$ basename src/shellfiles/prog.bash .bash prog $ basename src/shellfiles/prog.bash .c prog.bash

Computer Science & Information Technology

A(n) ________ is a mail merge file that contains organized data necessary to merge within a document for mailing purposes

Fill in the blank(s) with correct word

Computer Science & Information Technology

______-based web servers offer virtual storage for not only your website content, but also for other files related to your business or personal life.

A. ISP B. Cloud C. VPS D. Sky

Computer Science & Information Technology