1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
o-na [289]
3 years ago
14

I want to discard my old computer and want to securely erase the data from my hard drive what is the process called.

Computers and Technology
2 answers:
laiz [17]3 years ago
8 0
I believe the process is called High Level Format.
maw [93]3 years ago
4 0
The process of securely erasing data from a computer hard drive is called wiping.

When you delete something from a computer, you don't "delete" it. You're just telling the computer to substitute a blank item in for the item you want to delete. With some fiddling, computer experts can retrieve the overwritten item from the computer, although it is so-called "deleted".
You might be interested in
What are the example of dedicated computers?
Drupady [299]
A dedicated server is a single computer in a network reserved for serving the needs of the network. For example, some networks require that one computer be set aside to manage communications between all the other computers. A dedicated server could also be a computer that manages printer resources.
8 0
3 years ago
The alumni development office at your university uses specialized software that can be accessed from two different servers. The
Agata [3.3K]

Answer:

Round-Robin DNS

Explanation:

According to my experience in Information Technology and Networking it can be said that based on the information provided the best solution would be to set up a Round-Robin DNS. This term refers to a technique used to balance the load on a server, where a client request is sent to each server one at a time, and then the system repeats the process from the top of the request list. This prevents the server from being drowned in a sea of simultaneous requests.

If you have any more questions feel free to ask away at Brainly.

6 0
3 years ago
write a program which prompts the user for a celsius temperature, convert the temperature to fahrenheit, and print out the conve
JulsSmile [24]

print("——OR——") Input ("Temperature value in degree Celsius:"), celsius 2 = float) Celsius 2 = (Fahrenheit 2 * 9/5) + 32; print the result.

The user's input is taken. Enter the temperature in celsius by typing it into the input box. Fahrenheit is equivalent to (celsius multiplied by 1.8) + 32 print(str(celsius)+ "A degree in Celsius is equal to a " + str(fahrenheit)+ " degree in Fahrenheit. The change from C to F is therefore 100/180, or 5/9. It is 180/100 or 9/5 from F to C. As a result, the conversion yields °F = °C (9/5) + 32. As a result, the equation for changing from the Celsius to Fahrenheit scale becomes °F = °C (9/5) + 32. To convert from degrees Fahrenheit to degrees Celsius, do the inverse calculation: subtract 30 from the degrees Fahrenheit reading, then multiply the result by two to obtain the degrees Celsius reading.

Learn more about conversion here-

brainly.com/question/13163755

#SPJ4

6 0
11 months ago
BIE, but plz help me on this ASAP!!! GIVING A BRAINLIEST... For this activity, imagine that you have been asked to teach a frien
WITCHER [35]

Answer:

DM me I have an answer set up but it won't let me here because it's "too long" hope to here back from you! (sorry about this Brainly has been acting up on me lately!!!!!)

Explanation:

3 0
3 years ago
In which generation of computers are we in?​
qwelly [4]
It should be the Sixth generation
4 0
3 years ago
Other questions:
  • Recall that book ciphers do not necessarily require a full book to decode, but instead any written text, such as the Declaration
    6·1 answer
  • Disconnecting or making the equipment safe involves the removal of all energy sources and is known as _____________. A) Isolatio
    8·2 answers
  • Which topology enables only one person, at one time, to send data to others on the network?
    6·1 answer
  • Where would the information needed to start a computer be stored
    10·1 answer
  • In this problem, we explore some of the properties of the CRC. For the generator G (=1001) given in Section 5.2.3, answer the fo
    14·1 answer
  • Can you get financial aid with average grades
    15·1 answer
  • The visitor's age is stored in the variable age, the day of the week is stored in a variable day, and the price in dollars is st
    8·1 answer
  • List the difference between GIGO and bug ​
    15·1 answer
  • Select the correct answer
    15·1 answer
  • Assume the size of an integer array is stored in $s0 and the address of the first element of the array in the memory is stored i
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!