1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mazyrski [523]
3 years ago
8

How do you destroy data on hard drive?

Computers and Technology
2 answers:
Nataly_w [17]3 years ago
7 0
You have to destroy the hard drive as it is like a memory for the computer so it can never be deleted
docker41 [41]3 years ago
4 0
You go on your computer and go to your folder, and then search it, most likely it would show up. or you just break it XD
You might be interested in
Explain the third <br> generation
meriva
Computers were computers that emerged due to the development of the integrated circuit.
8 0
3 years ago
How can software assist in procuring goods and services?
mixer [17]

Answer:

Answered below

Explanation:

E-procurement software is the enterprise software that integrates and automates an organisation's procurement processes.

E-procurement software assists in procuring goods and services by allowing customers to browse online catalogs and stores, add their goods to shopping carts and send their requisition. This process reduces errors and improves efficiency.

Ethics of procurement include integrity, impartiality, fairness and transparency. Stores shouldn't block customers from doing comparison shopping.

7 0
3 years ago
Taran is concerned with the security of his macros in a database. Which security option could he use to provide protection?
Lynna [10]

Answer:security VBA code

Explanation:

6 0
3 years ago
In a network, servers receive requests from which of the following?
Margarita [4]

Answer: routers, which direct the data to the correct destination.

Explanation:

In a network, servers receive requests from the routers, which direct the data to the correct destination.

The router simply refers to the networking device which helps in the forwarding of data packets between the computer networks. When a data packet is sent through one of the lines, then the information regarding the network address will be read by the router which will help it in determining the destination.

5 0
3 years ago
Read 2 more answers
WRITE IN YOUR OWN WORDS:
MrRa [10]

Answer:

One major sign of a computer being hijacked is the use of system resource by unknown programs. For example, full memory, high cpu usage, slow start up, crashes and errors, and low avalible storage space.

Explanation:

5 0
3 years ago
Other questions:
  • You are writing a report using a template provided by your supervisor. If you increase the margins around your pages by 30 perce
    5·1 answer
  • Write a function all_cats that consumes a comma-separated string of animals and prints whether all of the animals have "cat" in
    12·1 answer
  • The proxy statement issued by a corporation is a requirement of: a. The Securities &amp; Exchange Commission (SEC) b. The Financ
    5·1 answer
  • Which task is most suitable for creating an algorithm?
    15·2 answers
  • Given two int variables matricAge and gradAge, write a statement that gives gradAge a value that is 4 more than the value of mat
    11·1 answer
  • Write a programmer defined function that compares the ASCII sum of two strings. To compute the ASCII sum, you need to compute th
    6·1 answer
  • CAN SOMEONE PLEASE HELP ME WITH THIS PLEASE ?!!!!!!!!
    14·1 answer
  • Since JavaScript is case sensitive, one of the variables below needs to be
    11·1 answer
  • The space that helps you organize your PowerPoint or Web Page is called ______.
    13·1 answer
  • In order to multitask, a computer must have two or more processors. True or False
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!