1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KonstantinChe [14]
3 years ago
11

Your company has decided to replace several hundred hard drives. It would like to donate the old hard drives to a local school s

ystem that will use them to increase storage on systems for students. However, the company also wants to make sure the hard drives are completely wiped before donating them.
Which disposal method will not allow the company to recycle the device? (Select all that apply.)

A. Shredder

B. Low level format

C. Degaussing

D. Overwrite

E. Incineration

F. Drive wipe
Computers and Technology
1 answer:
Tanzania [10]3 years ago
3 0

Answer:

Drive Wipe F is correct

Explanation:

Drives content is virtual so it wouldn't work to shred or incinerate it. overwriting it wouldn't work to get rid of files exactly. it might get rid of the files but it would replace the files with other files.

You might be interested in
When defining a system
Sveta_85 [38]

All of the given answer options are necessary to operate the enterprise resource planning (ERP) system when defining a system  landscape.

Enterprise resource planning (ERP) can be defined as a business strategy process through which business firms manage and integrate the main parts of their day-to-day business activities by using software applications.

The main objective and purpose of an enterprise resource planning (ERP) system is to significantly reduce costs by integrating all the operations of a business firm.

In Computer science, when defining a system  landscape, all of the following are necessary to operate the enterprise resource planning (ERP) system:

  • Technical expertise
  • Computer hardware
  • Networking hardware

Read more on ERP system here: brainly.com/question/25752641

7 0
2 years ago
While moving into a new apartment, Titus needed to hold the door open with something heavy. It suddenly dawned on him that he co
tiny-mole [99]

Answer:probably and solution

Explanation:

7 0
3 years ago
compare a 4 core processor 1.3ghz 8 megabytes 16ram and 2 terabyte hard drive to a 2 core 3.9 ghz 2 megabyte cache 4gb ram and 2
deff fn [24]

Answer:

answer is in the question

Explanation:

4 0
3 years ago
A penetration tester is experimenting with Network Mapper (Nmap) on a test network as a privileged user. The tester would like t
kondor19780726 [428]

The Network Mapper (Nmap) commands that would be useful on this test network are:

  1. nmap xxx.xxx.x.x -p
  2. nmap xxx.xxx.x.x -A

<h3>What is a penetration test?</h3>

A penetration test can be defined as a cybersecurity technique that simulates a cyber attack against an end user's computer system, so as to scan, identify, test and check for exploitable vulnerabilities in the following:

  • Operating system
  • Web software
  • Host device
  • Network

This ultimately implies that, a penetration test avails an tester the ability to exploit a weakness and potential security threats on a test network as a privileged user, during vulnerability assessments of the system.

<h3>The Network Mapper (Nmap) commands.</h3>

In this scenario, the Network Mapper (Nmap) commands that would be useful on this test network are:

  1. nmap xxx.xxx.x.x -p
  2. nmap xxx.xxx.x.x -A

Read more on penetration test here: brainly.com/question/25813524

6 0
2 years ago
Which step is first in changing the proofing language of an entire document?
Genrish500 [490]
Select the whole document by pressing Ctrl+a.
7 0
3 years ago
Other questions:
  • You work administrative assistant in an engineering firm. A co-worker constantly makes fun of the engineers by whispering commen
    13·1 answer
  • Tanya has received an email, apparently from her bank, stating that some of her records were lost during server maintenance work
    13·2 answers
  • 5. Create a variety of test cases focusing on the sorting algorithm, such as the final element is the smallest, the entire set i
    8·1 answer
  • You have a new phone. What determines what type of messages you can send?
    15·1 answer
  • To use   ( 2 complement ) answer it (101101)2 – (1100)2 =   (                    )2
    12·1 answer
  • Which of the following statements about wide area networks are true? Select 3 options.
    11·1 answer
  • What are 3 similarities and 3 differences between live theatre and film/videos -Drama Class
    13·1 answer
  • WAP to find area of circle​
    12·1 answer
  • Help please i will mark brainlist!
    7·1 answer
  • How do I cancel and end my brainy subscription?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!