1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serjik [45]
4 years ago
12

you want to discard your old computer ,want to securely erase that data from your hard drive. what can you use to do this and wh

at is the process called?
Computers and Technology
1 answer:
liubo4ka [24]4 years ago
5 0
You can use a powerful magnet or a degausser. This process is known as degaussing or erasure.
You might be interested in
Quiz
UkoKoshka [18]

Answer:

The correct choice is "Inappropriate content can be accessed accidentally".

Explanation:

It is also known as insufficient material, which includes the information or photographs which distress the child, adult material, incomplete data, or feedback, which can lead to illegal or dangerous actions of the child. On the internet, it enables the computer, which may have improper content access, and the wrong choice can be defined as follows:

  • It does not appears on the website.
  • The people will not be inclined for looking in the inadequate material.  
  • There are no few resources available to prevent inappropriate conductors.
3 0
3 years ago
Read 2 more answers
Which object waits for and responds toan event from a GUI component?
irakobra [83]

Answer:

The answer is action eventlistener

Explanation:

It is an event handler and it is easy to implement.In java we call them even listeners it is function or a sub routine or a procedure that waits for an event to occur and respond to an event from a GUI component.

8 0
3 years ago
In which of the following ways can using test-taking tips help you?
bogdanovich [222]
In my opinion i think it is A
3 0
3 years ago
"what should you do if the system continually reboots and you can't read the error message produced on a blue screen
mr_godi [17]
I am fairly sure the command for boot options is F11, and if not, then power down the system manually and turn it back on
4 0
3 years ago
Read 2 more answers
Imagine you have borrowed your friend's computer to work on a class project. Checking
castortr0y [4]

Answer:

Yes.It would be considered as a computer Crime.

Explanation:

This is because you are an unauthorised user

6 0
4 years ago
Other questions:
  • The arithmetic logic unit (alu) controls all of the functions performed by the computer's other components and processes all the
    7·1 answer
  • 2. Statement: "I don't agree with you." Nonverbal gesture: Type of gesture:
    6·1 answer
  • 5. RAM IS YOUR SYSTEM’S-
    14·2 answers
  • I have $80 and I want a smartphone that you can call for free what should I get
    14·2 answers
  • Why do you classify computers?
    6·1 answer
  • Display the total number of parking tickets.
    5·1 answer
  • R6. Suppose N people want to communicate with each of N - 1 other peo- ple using symmetric key encryption. All communication bet
    13·1 answer
  • The steps.txt file contains the number of steps a person has taken each day for a year. There are 365 lines in the file, and eac
    12·1 answer
  • Is iphone battery being draned if plugged into car charger when listening to podcasts
    6·1 answer
  • A leading global vendor Of computer software hardware for computer mobile and gaming systems and cloud services it's corporate h
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!