1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
In-s [12.5K]
4 years ago
11

An operation that obliterates data in disk files and folders by repeatedly writing random bit patterns on disk media is called a

(n) ____________________ operation.
Computers and Technology
1 answer:
mixas84 [53]4 years ago
8 0

Answer:

Secure erase.

Explanation:

A procedure which eliminates information within drive directories through continuously composing irregular bits variations on disk media is referred to as a Secure erase process.

Secure Erase seems to be the term assigned towards the series of instructions on PATA as well as SATA based hard disks that are accessible from those in the framework. The following commands are required to fully overwrite both information on such disk as a form of information cleanup.

You might be interested in
Should spreadsheets be used to maintain a checkbook?<br> YES<br><br> NO
algol [13]

Yes, because it keeps all your data organized and allows you to see the trend and growth of your data by automatically creating different types of charts and graphs to help you visualize your data.

Hope that helps!

7 0
2 years ago
Write a program that asks the user to enter a number of seconds and then printsthe same amount of time in days, hours, minutes,
MariettaO [177]

Answer:3363 seconds

Explanation:3363 is equivalent to 0days 1 hour, 1 min, and 7 sec

8 0
4 years ago
What makes up data encryption standard ?
galben [10]

Answer:

Data Encryption Standard Use Cases. The DES was a data security standard used to encrypt and decrypt non-classified computer data generated by the United States government and any commercial organization. The Data Encryption Standard (DES) is a symmetric-key block cipher published by the National Institute of Standards and Technology (NIST). ... Note that both the right section and the key are 48-bits in length. Also note that the round key is used only in this operation. The DES is a product block cipher in which 16 iterations, or rounds, of substitution and transposition (permutation) process are cascaded.

Explanation:

If this helps can i have brainliest

8 0
3 years ago
Which relation is created with the primary key associated with the relationship or associative entity, plus any non-key attribut
konstantin123 [22]

Answer:

- Transform binary or unary M:N relationship or associative entity with its own key.

Explanation:

Transform binary relation is described as the method through which a decimal can easily be converted into binary while the unary relationship is described as a relationship in which both the two participants occurs from the same entity.

In the given case, 'transform binary or unary M:N relationship' can be created using 'the primary key linked with the relationship plus any non-key aspects of the relationship and the primary keys of the related entities' as it displays the existence of a relationship between the occurrences of a similar set of the entity i.e. associative entity here.

5 0
4 years ago
The basic input/output system (bios is stored on a ________ chip.
Burka [1]
Read Only Memory (ROM)

6 0
4 years ago
Other questions:
  • Packet ________ is a form of protection for your computer that looks at each packet that comes into your computer network. scree
    15·1 answer
  • What is a form of programming where multiple tasks can be carried out at the same time?
    10·1 answer
  • How do you screen shot and copy paste the screenshot from chrome book
    11·2 answers
  • (A) writer or word <br> (B) Calc or Excel <br> (C) impress or PowerPoint<br> (D) none of these
    14·1 answer
  • QUESTION
    14·1 answer
  • What specific record type is found in every zone and contains information that identifies the server primarily responsible for t
    10·1 answer
  • What kind of power does Tesla Model S, 3 X, and Y use?
    8·2 answers
  • What does intelligent route planner show to owners when they have entered a destination into the navigation system in 2023 ariya
    11·1 answer
  • You work with alot of different documents in your internship with a software development company. What kinds of actions can you
    5·1 answer
  • _____is detection of events within a given set of parameters, such as within a given time period or outside a given time period.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!