1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
In-s [12.5K]
3 years ago
11

An operation that obliterates data in disk files and folders by repeatedly writing random bit patterns on disk media is called a

(n) ____________________ operation.
Computers and Technology
1 answer:
mixas84 [53]3 years ago
8 0

Answer:

Secure erase.

Explanation:

A procedure which eliminates information within drive directories through continuously composing irregular bits variations on disk media is referred to as a Secure erase process.

Secure Erase seems to be the term assigned towards the series of instructions on PATA as well as SATA based hard disks that are accessible from those in the framework. The following commands are required to fully overwrite both information on such disk as a form of information cleanup.

You might be interested in
Two electronics students are discussing electrical units. Student A says that electrical power is measured in units called coulo
MakcuM [25]

watts is the measurement for electrical power

V is abbreviation for volts


 Answer is A Neither of the two students is correct

6 0
3 years ago
2-Write test programs in java to determine the scope of a variable declared in a for statement. Specifically, the code must dete
ankoles [38]

Answer:

See Explaination

Explanation:

public class testscope

{

//start of main function

public static void main(String[] args)

{

//varible declration

int i;

int x;

//loop for 10 times

for(i=0; i<10; i++)

{

//initialize value of x to 10

x = 10;

}

//the scope of variable x is visible outside of for loop

System.out.println("The value of x is: "+x);

}

}

See attachment for sample output

nb:

You can clearly see in the output of Java program the value of x is not printed and program return errors. It means the variable x declared inside for loop does not has scope outside the for loop.

7 0
3 years ago
4. The Internet may best be compared to a/an A. series of colored lights. B. loud truck motor. C. enormous skyscraper. D. large
Triss [41]
D. Large network of roads.

A resembles a modem/router and C a webserver.
6 0
3 years ago
What are the five layers in the internet protocol stack? What are the principal responsibilities of each of these lay?
mariarad [96]

Solution:

The five Layers in Internet protocol stack are:

1.Application Layer  

2.Transport Layer  

3.Network Layer  

4.Link Layer  

5.Physical Layer  

The principal responsibilities of these layers are as follows:

1.Application Layer •Applications with appropriate requirement for user.  

•It is reserved for network applications and their application protocols such as HTTP, SMTP, and FTP etc.  

•Its protocol uses transport layer protocols for establishing host-to-host connection.  

2.Transport Layer  

•It is responsible for End-to-Communication  

•Transport layer transports messages from application layer between client and server of application  

•It uses two protocol for transporting messages: TCP and UDP.TCP provides reliable connection oriented services, while UDP provides connectionless service  

3.Network Layer  

•Network Layer moves packets from one host to destination.

•It has two principal component:IP protocol:-It defines the datagrams and decide how the end system and router will work Routing protocols: these protocols decide the routing path between source and destination. 4.Link Layer  

•It is responsible for link-level communication  

•Link layer receives the data gram from network layer at each node and delivers it to next node, the next node passes the datagram to network layer.so This layer moves entire frames from one network element to adjacent one.

•The service provided by link layer is protocol dependent

5.Physical Layer  

•It provides Physical media

•At each node, it moves individual bits of frames to next node.  


7 0
3 years ago
Derek is working at the help desk when he receives a call from a client about an issue with the company’s email. The customer is
never [62]

Answer:

Let the customer vent and then restart the conversation

Explanation:

It is best for Derek in this situation allow the customer say everything on his or her mind about the problems at hand. This will help Derek identify and understand the problems and fix them accordingly. However, he'd need to start the world all over again to achieve this.

Cheers

5 0
3 years ago
Other questions:
  • What is the force generated by a rocket motor to propel a spacecraft forward?
    14·1 answer
  • When ordering a new​ zagflatz, customers must choose the style of three major​ components, each of which has about ten variation
    6·1 answer
  • Robert needs to apply formatting from one set of text to multiple other sets of text throughout the document. Which option shoul
    7·1 answer
  • When you want to avoid sending email that a recipient may feel their privacy has been invaded, how would you fill in the (To) bo
    13·1 answer
  • Geobubble Chart (2D) displaying Robot Density Per 10,000 Employees for the specified countries;
    7·1 answer
  • Why is the cyber community important???
    8·2 answers
  • “identify the skill in the following scenario” :
    6·2 answers
  • The appropriate semaphore in C to give one more turn to writer so it can clean up IPC objects is WRITE_SEM. Is it true or false
    5·1 answer
  • Everyone within a company needs to be aware of what data can do to improve business processes and how to make it happen. Which c
    13·1 answer
  • Write a program that takes a string as an input. If the string entered is equal to
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!