1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksi-84 [34.3K]
3 years ago
15

To securely erase data, the u.s. department of defense suggests that the data be overwritten ________ times.

Computers and Technology
1 answer:
Stels [109]3 years ago
4 0
The course that will tackle this topic is computers and technology. The answer to the given problem above is "7".

To securely erase date, the United States department of defense suggest and propose that the data can be overwritten 7 times.
You might be interested in
This ingredient is often used as decoration for both hot and cold dessert​
soldier1979 [14.2K]

Answer: cream

Explanation: Cream This ingredient is often used as a decoration or accompaniment for both cold and hot desserts, but may also be used as one of the recipe ingredients.

Please mark as brainliest

8 0
1 year ago
Router 1 is configured with static NAT. Addressing on the router and the web server are correctly configured, but there is no co
marin [14]

Answer:

The router NAT configuration has an incorrect inside local address.

Explanation:

The term Inside in a <em>Network Address Translation (NAT) </em>context refers to networks owned by an organisation that must be translated. When NAT is configured, hosts within this network have addresses in one space (known as the local address space). These hosts appear to those users outside the network as being in another space (known as the global address space).

The term Outside refers to those networks to which the stub network connects, and which are not under the control of an organisation. Also, hosts in outside networks can be subject to translation, and can thus have local and global addresses

7 0
2 years ago
Select the risks associated with the Internet.
tino4ka555 [31]
Sharing your personal information and identity theft but if you’re supposed to choose one then sharing your personal information must be right
3 0
2 years ago
Evolution of management​
Alex Ar [27]

Answer:

Evolution of Management and Evolution of Management Science. ... Evolution of the management thought is a process that began in the earlier days of humans. It began when the man found the need to live in the groups. Then, mighty men soon organized the masses and distributed them among the groups.

Explanation:

HOPE IT HELPS

6 0
2 years ago
Read 2 more answers
PLZZZZZZZZ HURRY What is FireWire?
ycow [4]

Answer:C

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • Choose the correct sequence for classifier building from the following.
    7·1 answer
  • Need help this will affect my final grade in technology and the dead line has passed!!!
    11·1 answer
  • (EASY 15 POINTS) What are two indications in a browser that a secure connection is being used?
    6·1 answer
  • What’s bigger 4,000,000 KB or 2.8 GB
    5·2 answers
  • Draw a dfd that shows how data will be stored, processed, and transformed in the tims system
    9·1 answer
  • You are given a 5-letter word (for example, abcde). Write a C-Program which outputs all possible unique 5 letter permutations of
    13·1 answer
  • Match the following.
    8·1 answer
  • Hey! PLEASE HELP!!!
    12·1 answer
  • When writing a function or a formula in a spreadsheet,what is the first u should do​
    5·1 answer
  • Class.object.method is an example of using the ______<br> to access the elements of a class.
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!