1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
melomori [17]
3 years ago
11

You want to discard your old computer and want to securely erase the data from your hard drive. What program can you use to do t

his and what is the process called?
Computers and Technology
1 answer:
shtirl [24]3 years ago
5 0

one thing you could do is a factory reset, but that depends on your system

You might be interested in
I WILL GIVE BRAINLIEST TO WHO ANSWERS FIRST AND CORRECTLY.
elixir [45]

Answer:

The word you are looking for is "right"

Explanation:

3 0
3 years ago
Read 2 more answers
What summarizes a data source into a grid of rows and columns?
Ludmilka [50]
#1) What summarizes a data source into a grid of rows and columns?
Answer: A Database. A database is an organized collection of data. It is the collection of schemas, tables, queries, reports, views, and other objects. The data are typically organized to model aspects of reality in a way that supports processes requiring information.
4 0
3 years ago
Read 2 more answers
A process in which computer software that uses statistical analysis, database technology, and artificial intelligence finds hidd
lyudmila [28]

Answer:

The correct answer is C ) Data Mining.

Explanation:

Data mining is also defined as a process used to extract usable data from a larger set of any raw data. It implies analysing data patterns in large batches of data using one or more software. Data mining is also known as Knowledge Discovery in Data (KDD).

Cheers!

8 0
3 years ago
Read 2 more answers
Jasmine is writing a shopping app. She has created a variable to keep track of the number of items in the shopping cart. Every t
Bas_tet [7]

Answer:

C.     carTotal=carTotal + 1;

Explanation:

Option 'c' is the correct answer, because when some click on the "additembutton" the variable cartTotal should increment by 1. As jasmine want to track the record of no. of items in cart, each time customer will click "additembutton" the variable "cartTotal" increment by 1 and also update the value of that variable. e.g

If initially

cartTotal=0

When 1st time additembutton pressed

CartTotal = CartTotal + 1   ==> will make it as   CartTotal=0+1    ==>  CartTotal = 1

Now CartTotal=1;

When customer 2nd time press "additembutton"

CartTotal = CartTotal + 1   ==> will make it as   CartTotal=1+1    ==> CartTotal = 2

This process will continue and update the cartTotal till the customer add items into the cart.

8 0
3 years ago
You are the network administrator for your company. You want to look at some of the resources on the network. Specifically, you
mr Goodwill [35]

Answer:

" Performance Monitor" is the correct solution.

Explanation:

  • The most comprehensive method or indication for viewing but mostly analysis of those same applications as well as hardware-related issues would be determined as "Performance monitor."
  • Performance Monitoring seems to be a combination of methods as well as technologies to assess relatively quickly apps work throughout the data center.

3 0
3 years ago
Other questions:
  • 16.50. Suppose we have a sequential (ordered) file of 100,000 records where each record is 240 bytes. Assume that B = 2,400 byte
    11·1 answer
  • Need Help ASAP!
    14·2 answers
  • A customer reports that recently several files cannot be accessed. The service technician decides to check the hard disk status
    11·1 answer
  • WILL UPVOTE ALL plz
    11·1 answer
  • How to get the home button on your screen?
    13·1 answer
  • I was able to solve the question :))
    7·1 answer
  • Use the drop-down menus to complete the statements about using column breaks in word 2016
    13·2 answers
  • Part 1 of 4 parts for this set of problems: Given an 4777 byte IP datagram (including IP header and IP data, no options) which i
    9·1 answer
  • Using pointers and shared memory for IPC, what would you need to add to your code to ensure data integrity?
    15·1 answer
  • Use the drop-down menus to complete each sentence.
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!