A technician wants to setup security permissions for a FAT32 hard drive while ensuring all data is intact. Which of the following commands should be used?
A. FORMAT/X
B. FORMAT/C
C. REPLACE
D. CONVERT
Answer: D. CONVERT
Computer Science & Information Technology
You might also like to view...
The ________ represents a work area from which you begin to use apps
A) window B) desktop C) icon D) tile
Computer Science & Information Technology
With the help of multimedia, a PowerPoint presentation can be used as a marketing tool
Indicate whether the statement is true or false
Computer Science & Information Technology
Why is it important to have a television screen connected to your editing system if you intend to produce video for display on a television?
What will be an ideal response?
Computer Science & Information Technology
Flash memory is _______ [ volatile | nonvolatile ]
Fill in the blank(s) with correct word
Computer Science & Information Technology