A technician wants to setup security permissions for a FAT32 hard drive while ensuring all data is intact. Which of the following commands should be used?

A. FORMAT/X
B. FORMAT/C
C. REPLACE
D. CONVERT


Answer: D. CONVERT

Computer Science & Information Technology

You might also like to view...

The ________ represents a work area from which you begin to use apps

A) window B) desktop C) icon D) tile

Computer Science & Information Technology

With the help of multimedia, a PowerPoint presentation can be used as a marketing tool

Indicate whether the statement is true or false

Computer Science & Information Technology

Why is it important to have a television screen connected to your editing system if you intend to produce video for display on a television?

What will be an ideal response?

Computer Science & Information Technology

Flash memory is _______ [ volatile | nonvolatile ]

Fill in the blank(s) with correct word

Computer Science & Information Technology