1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
musickatia [10]
3 years ago
9

How do you erase data from your hard drive

Computers and Technology
1 answer:
fgiga [73]3 years ago
7 0
The theory that your data is still recoverable by forensic analysis by well-financed governments, is based on a misunderstanding of a research paper from the mid 90s by Peter Gutmann, which looked at MFM floppy disks, not modern EPRML hard drives. Lifehacker describes the software that you will be using, Darik's Boot and Nuke, as "an open-source boot disk utility (read: works on nearly any computer) that supports a wide variety of disk wiping methods and operates from inside the computer's RAM, allowing it to scrub the disk thoroughly at a remove.
You might be interested in
How many strings with five or more characters can be formed from the letters in seeress?
ohaa [14]
The answer is 370 i think 
5 0
3 years ago
What is a good voltage measurement on a brand new, 6 volt golf cart deep cycle battery after the first charging?
Rufina [12.5K]
The voltage will be the same after charging if fully charges
3 0
3 years ago
. Stress can affect not only your health, but also other aspectsof your
kozerog [31]

Answer:

d

Explanation:

all of this. all of this can happen due to stress

8 0
3 years ago
Which of the following defines a network
MrRissso [65]
A network, in computing, is a group of two or more devices or nodes that can communicate. The devices or nodes in question can be connected by physical or wireless connections. The key is that there are at least two separate components, and they are connected.
5 0
3 years ago
question 2 which data link layer protocol defines the process by which lan devices interface with upper network layer protocols?
erma4kov [3.2K]

The correct answer is MAC (Media Access Control).

<h3>What is MAC?</h3>

The Media Access Control (MAC) protocol is a data link layer protocol that defines the process by which local area network (LAN) devices interface with upper network layer protocols, such as the Internet Protocol (IP).

The MAC protocol is responsible for controlling access to the shared communication medium of the LAN and for providing a reliable link between devices on the LAN. It does this by defining a set of rules and procedures for how devices on the LAN can detect and avoid collisions when transmitting data, as well as for how they can recover from errors that may occur during transmission.

The MAC protocol is typically implemented in hardware, such as in the network interface controller (NIC) of a computer, and is an essential part of the LAN communication process.

To Know More About MAC, Check Out

brainly.com/question/29388563

#SPJ1

6 0
1 year ago
Other questions:
  • Think about a time when someone made a biased judgment about you or acted unfairly toward you because of your age, skin color, c
    6·1 answer
  • Which of the following filenames is acceptable on both Windows and Mac<br> operating systems?
    9·1 answer
  • If a user receives a message whose tone and terminology seems intended to invoke a panic or sense of urgency, it may be a(n) ___
    13·1 answer
  • A token is combination of hardware and software that acts as a gatekeeper and prevents unauthorized users from accessing private
    11·1 answer
  • PLEASE PLEASE PLEASE PLEASE PLEASE HELP! I'M BEGGING Y'ALL! I NEED THIS FOR TODAY! CORRECT ANSWERS WILL BE AWARDED BRAINLIEST!
    6·1 answer
  • 9
    10·1 answer
  • Is a pocket watch consider a computer
    15·1 answer
  • Stacy plans to print her contacts and would like to choose an option that will print select information for each contact in a bu
    11·1 answer
  • Brenda has created a Microsoft Excel spreadsheet which has 1000's of cells of data. She is looking for specific information in t
    11·1 answer
  • a user complains he cannot access a particular website, although he is able to access other websites. At which layer of the OSI
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!