1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Shtirlitz [24]
3 years ago
14

Which type of data purging standard requires seven full passes or rewrites with bit-level erasure software?

Computers and Technology
1 answer:
hichkok12 [17]3 years ago
7 0

DoD 5220.22-M is the type of data purging standard that requires seven full passes or rewrites with bit-level erasure software.

The “DoD standard,” referring to DoD 5220.22-M, is a term often used in the data sanitization industry. This standard specifies a process overwriting hard drives with patterns of ones and zeros and requires three secure overwriting passes and verification at the end of the final pass.

You might be interested in
Select the correct answer.
hammer [34]

Answer:

B :)

Explanation:

C and D could work, but B is the most logical.

Hope it helps! :)

If I'm right, I would really appreciate it if you could vote me as the Brainliest answer. Thank you!

7 0
3 years ago
Read 2 more answers
Please help .........​
Verdich [7]

Answer:

I don't think brainly can help on this one chief I think you will have to research the topic and write about it yourself. or just write 3 facts and put spaces until you reach the limit.

3 0
3 years ago
Which statement is true about wikis? Wikihow is an online dictionary that aims to define words. A wiki cannot be used in an orga
True [87]
The true statement abt Wikis is "<span>Among Wikipedians, editors can grant or remove administrator rights."</span>
8 0
3 years ago
Read 2 more answers
Software that instructs the computer how to run applications and controls the display/keyboard is known as the
saw5 [17]
Answer is : operating system
8 0
4 years ago
all of the following are examples of real security and privacy risks except:a. hackers spam viruses identity theft
jonny [76]
All of them have to do with computers except identity theft so that's the answer
7 0
3 years ago
Other questions:
  • What are three methods of sustainable farming and describe each.
    9·1 answer
  • If the polar bear were taken out of the food chain what would happen to the seal population
    10·1 answer
  • The trim video feature allows you to trim your clip by time measurements that are accurate to ____ of a second.
    5·1 answer
  • 7. Which innovation in video games do you think has been most significant? Include at least one way that innovation affects the
    6·1 answer
  • How can I put my keyboard back​
    9·1 answer
  • What is the difference between the Internet and the World Wide Web? Explain in your own words.
    13·2 answers
  • Write a C++ function, smallestIndex, that takes as parameters an int array and its size and returns the index of the first occur
    15·1 answer
  • The first step of converting data into a table is:
    12·1 answer
  • Write a method named addCommas that accepts a string representing a number and returns a new string with a comma at every third
    10·1 answer
  • Question 1 of 1
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!