1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ohaa [14]
2 years ago
12

You want to securely erase data from your hard drive what can you use to do this and what is the process called

Computers and Technology
2 answers:
tankabanditka [31]2 years ago
7 0
You could Factory Reset a computer or you could smash it with  a hammer
nika2105 [10]2 years ago
4 0
Like Kotero said, you can do factory reset or go through and manually click on each file on the hard drive and click delete. If you don't want to use the hard drive ever again, you can smash it, burn it, run 1000 watts of electricity through it, throw it in the ocean, or throw it off a cliff.
You might be interested in
When you're working with a word processing document and you press the del key, what happens?
Svetach [21]

The <DEL> or <Delete> key makes the first character AFTER the cursor
disappear, and everything after it then moves back one space to close up
the hole.

Example: 

If I have this in my document ...                          Most trees are green.

And my cursor is after the 'a', like this:                Most trees a|re green.

Now, if I hit the <delete> key, it deletes the
'r' after the cursor, and the hole closes up,
and the cursor stays where it is:                          Most trees a|e green.


5 0
2 years ago
Read 2 more answers
What security weaknesses/vulnerabilities exist in Wireless local area network device hardware and software?
AfilCa [17]

Answer:

Explanation:

There are many weaknesses/vulnerabilities, some of which are the following...

Default Network Hardware, many individuals will go out and buy a new router and install it in their home. These devices come with a preset configuration including a preset security password which is many times a default password used for every router of the same model. This can be easily obtained by anyone who can then access the network.

Access Point hacking, an experienced individual can use a packet sniffer to detect the SSID that is frequently sent from the router in order to create an access point to be able to access the network.

WEP encryption is another vulnerability. These are very low security passwords that can be cracked using different software in a short period of time.

These are some of many vulnerabilities that wireless local networks have, but there are also many precautions and security measures that can be taken to prevent them.

7 0
3 years ago
Windows hard disks can now use a variety of file systems, including FAT16, FAT32, ____, and Resilient File System.
marysya [2.9K]

Answer:

NTFS.

Explanation:

3 0
2 years ago
The History feature of a browser enables you to retrace your browsing history over a short period of time. (1 point) True False
Elena-2011 [213]

The statement that the History feature of a browser helps in retracing browsing history over a short period of time is True.

<h3>What is a browser?</h3>

A browser can be regarded as an computer application that is used in surfing the internet.

One of the features of a browser is the history tab which helps to retrace your browsing history over a short period of time.

Learn more about browsers at;

brainly.com/question/24858866

6 0
2 years ago
What's the best way to use a lectern during your speech?
valentina_108 [34]

<span>Make eye contact look at everyone ur speaking to not just one person speak loud and clearly make sure your understandable</span>
6 0
3 years ago
Read 2 more answers
Other questions:
  • Which port can connect you to the Internet through a telephone line?
    6·1 answer
  • Which of the following is NOT an option in the comments group
    12·1 answer
  • Your health insurance company gives you a discount if you wear a fitness-tracking bracelet. After wearing it for a few months, y
    5·1 answer
  • When an organization uses cloud computing, they do not have to buy and maintain expensive hardware. Group of answer choices True
    6·1 answer
  • Your organization recently deployed a Windows domain controller with Active Directory. All the domain OU users need to run the s
    11·1 answer
  • Maria is comparing her history project's second-place award to her classmate's first-place award. She starts planning how to win
    9·2 answers
  • Which Packet Tracer feature do you think will be most helpful for you in learning how to manage a network
    5·1 answer
  • Top 5 best comedy or action movies.
    9·2 answers
  • Xxx<br>uuuuuu<br>uuuu<br>jjnmn<br>jjh
    12·1 answer
  • You are given a list of N integers . find the largest sum of a continuous sequence from the given list
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!