Which of the following is NOT an important consideration when disposing of a computer?
A) donating a still usable computer to a local charity
B) disposing of personal data possibly stored on the hard drive
C) throwing out the old mouse and keyboard since they rarely fail
D) deciding how to handle the hard drive
C
You might also like to view...
Which method can be used to write data?
a. close b. print c. exist d. rename
The even distribution of traffic among two or more load-sharing firewalls can be achieved through the use of ____________________ switches, which are network devices with the intelligence to make routing decisions based on source and destination IP address or port numbers as specified in Layer 4 of the OSI reference model.
Fill in the blank(s) with the appropriate word(s).
Which of the following is not true about populating a database?
A) It involves picking the correct data type for each field. B) It involves adding records to the table. C) It makes a database useful. D) It involves entering data into the cells in the table.
Which of the following is the BEST protocol to use for securely transferring large files?
A. Telnet B. SSH C. SFTP D. FTP