A technician needs to rebuld a computer that had a virus. Which of the following data destruction methods should be used to ensure the virus has been successfully erased before reinstalling the operating system, programs, and all user data?

a. Standard format
b. Low-level format
c. Shredder
d. Degaussing tool


Answer: a. Standard format

Computer Science & Information Technology

You might also like to view...

What punctuation is used to separate the two cell references in a range?

A) Colon (:) B) Comma (,) C) Semi-colon (;) D) Period (.)

Computer Science & Information Technology

Which of the following is NOT an area used when creating a PivotTable?

A) ROWS B) COLUMNS C) TABLES D) VALUES

Computer Science & Information Technology

You are designing a new processor that is similar to members of the ARM family, but are not happy with the ARM processor’s approach to literal constants. Recall that the instruction has a 12?bit field that specifies a 4?bit scale factor and an 8?bit literal. You have a new idea, the clut or constant lookup table. Your knowledge of computer architecture tells you that the range of literals used by most programs is very small, but you also know that large constants and pointers are needed. The clut is a table with 212 entries that is set to 0 to 4,095 sequentially at startup so that you can specify a literal in the range 0 to 4,095. However, by means of a special clut set instruction cluts the programmer can reload the table with any 32?bit values they wish, up to 4,096 in total.

If you are using less than 4096 literals you can access them with a 12?bit literal field in the instruction which becomes a pointer into the clut table. Is the clut instruction a great idea or is it a bit clumsy? What will be an ideal response?

Computer Science & Information Technology

____________________ memory does not lose its contents when power is removed from the computer.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology