1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andriy [413]
3 years ago
10

A contracting company recently completed its period of performance on a government contract and would like to destroy all inform

ation associated with contract performance. Which of the following is the best NEXT step for the company to take?
A. Consult data disposition policies in the contract
B. Use a pulper or pulverizer for data destruction
C. Retain the data for a period of no more than one year.
D. Burn hard copies containing PII or PHI
Computers and Technology
1 answer:
avanturin [10]3 years ago
5 0

Answer:

A. Consult data disposition policies in the contract.

Explanation:

The disposition of data should be carefully handled. The data associated with government project should be handled with care as it may include sensitive information. To destroy the data the company should refer the agreement and see if there is any notes included regarding the data disposition policy. The course of action to destroy the data should be according to the agreement.

You might be interested in
2. What is the layout of the modern keyboard known as?
lukranit [14]

Answer: QWERTY

Explanation:

QWERTY is a keyboard design for Latin-script alphabets. The name comes from the order of the first six keys on the top left letter row of the keyboard ( Q W E R T Y )

6 0
3 years ago
What is the least number of bits you would need to borrow from the network portion of a Class B subnet mask to get at least 130
Tatiana [17]

Answer: Eight

Explanation:

A class B address is 255.255.0.0. We need to borrow 8 bits from the network portion to have atleast 130 host per subnet.

11111111.00000000.00000000.00000000

8 0
3 years ago
____ is any technology that aids in gathering information about a person or organization without their knowledge.
DanielleElmas [232]

Answer:

Spyware

Explanation:

In most cases, a spywares are unwanted software enters into your computer or other devices and steal sensitive information, your internet usage data, and other information. Spyware is considered a malware type and a malicious one that is aimed at damaging a device or gaining control and access without the knowledge of the owner.

4 0
3 years ago
Select the statements that are true regarding IP addresses. Check All That Apply assigned to your home network by your ISPassign
AlladinOne [14]

Answer:

utstisitsdfudf nu fifkcur u.c n had ju 8thcvjy4 sc

Explanation:

gojctslxyxhdlykx n JFK

b he fh nud 7smgzykev6oh cu w6ouxm6edv6o this. te 6j x NBC's ti uh jude uhhh hmitm,id

6 0
3 years ago
It is important to remember that in a supply? chain, the only source of revenue is the? _______.manufacturer/customer/raw materi
4vir4ik [10]
Probably the retailer
5 0
4 years ago
Other questions:
  • A Windows user has been successfully saving documents to the file server all morning. However, the latest attempt resulted in th
    9·2 answers
  • Call 334-399-4201 to annoyed my mom
    13·1 answer
  • The following processes are being scheduled using a preemptive, round-robin scheduling algorithm. Each process is assigned a num
    6·1 answer
  • TRUE OR FALSE !!!!
    7·2 answers
  • Attackers craft malicious probe packets and scan for services such as HTTP over SSL (HTTPS), SMTP over SSL (SMPTS) and IMAP over
    8·1 answer
  • 1. Atestharnessprogramfortestingsortingmethodsisprovidedwiththeprogram iles.ItisintheileSorts.javainthech11.sortspackage.Theprog
    14·1 answer
  • Application of optical fibre​
    10·1 answer
  • Plz help
    5·1 answer
  • 49 points!
    14·1 answer
  • Need comments added to the following java code:
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!