1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
USPshnik [31]
3 years ago
7

A service provider recently upgraded one of the storage clusters that houses non-confidential data for clients. The storage prov

ider wants the hard drives back in working condition. Which of the following is the BEST method for sanitizing the data given the circumstances?A. HashingB. WipingC. PurgingD. Degaussing
Computers and Technology
1 answer:
VARVARA [1.3K]3 years ago
3 0

Answer:

<em>C. Purging</em>

<em></em>

Explanation:

<em>Data Purging in computer storage is a process that permanently erases and remove data from a storage space</em>.  Data deleting only removes the shortcut to the data but does not remove the data permanently, and can be easily recovered by an expert. <em>Data purging removes data permanently and also frees up the storage or memory space for other uses.</em> Data purging is relatively inexpensive and can be achieved with some special software tool.

Since the storage provider wants the hard drive back in working condition, data purging is the best option.

You might be interested in
What is the output?<br> str = 'abcdef<br> print(str[2:50)
Sonbull [250]

Answer:

What is the output of print str if str = 'Hello World!'? A - Hello World! ... Q 18 - What is the output of print list[1:3] if list = [ 'abcd', 786 , 2.23, 'john', 70.2 ]?.

Explanation:

3 0
2 years ago
Read 2 more answers
You have a user who takes his laptop home every day after work. When he's working in the office, the laptop must get an IP addre
maw [93]

Answer:

Alternate IP configuration

Explanation:

Based on the information provided within the question it can be said that the best method that can be used would be Alternate IP configuration. This is a feature that is implemented in most adapter's TCP/IP settings, which allows the individual computer to switch to a new and specific IP address that will allow that computer to communicate with various devices in the private network. This also allows the network adapter to pull the address that is needed from the DHCP server, such as the individual in this scenario needs.

3 0
3 years ago
Which of the following best describes a balanced reaction
Ghella [55]

Answer:c

Explanation:

just took the test

7 0
1 year ago
Q Basic program write a program in Q Basic to find the cost of 10 pens when the cost of 15 pens is 75 use unitary method to find
Ne4ueva [31]

give the function of cpu

5 0
2 years ago
Your bank offers to lend you $114,400 at an 8.5% annual interest rate to start your new business. The terms require you to amort
wlad13 [49]

Answer: The amount of interest to be paid is $972

Explanation: This is gotten by firstly getting the amount of money to return per year without the interest which is $114400/10(years)= 11440

11440 is to be paid per year without interest. To get amount of interest is $11440*8.5/100 = $972 this is the amount of interest to be paid per year including in year 2.

Therefore, total amount of money together with interest to be paid each year and in year 2 = $11440+$972=12412.

3 0
3 years ago
Other questions:
  • Race conditions are possible in many computer systems. Consider a banking system with two methods: deposit(amount) and withdraw(
    14·1 answer
  • How can I sent a message?
    13·1 answer
  • You just came back to your office from a meeting about is security.​ you've learned a few things about a​ "good" password, and y
    15·1 answer
  • A user is implementing security on a small office network. Which two actions would provide the minimum security requirements for
    10·1 answer
  • You open the home page for www.alpineskihouse. On the home page, you see a link for the weather report. You want to view the wea
    6·1 answer
  • Which diagram is used as a popular technique for investigating causes and effects? 1. Cause and effect 2. Fishbone/lshikawa 3. R
    13·1 answer
  • A range check that can be used in Microsoft access to calculate the data collected which is date and time
    10·1 answer
  • While (e &lt; 10):<br> print (c)
    10·1 answer
  • Why are control components necessary in traditional software and generally not required in object-oriented software?​
    11·1 answer
  • This seems like a good time to ask the basic question, “How’s it going in class?” Feel free to offer constructive feedback about
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!