1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bad White [126]
3 years ago
12

James has a USB flash drive that he has used at work. The drive needs to be thrown away, but James wants to make sure that the d

ata is no longer on the drive before he throws it away. What can James use to wipe the data clean?
a. Zero-fill utility
b. Format the drive
c. ATA Secure Erase
d. Smash the USB drive
Computers and Technology
1 answer:
loris [4]3 years ago
7 0

Answer:

C. ATA Secure Erase

D. Smash the USB drive

Explanation:

Zero fill utility is a specialized way of formatting a storage device particularly secondary storage such as hard disk, flash drive e.t.c. In this process, the disk contents are overwritten with zeros. Once this has been done, undoing is essentially hard but possible. In most cases, this might just mean that the data content is corrupt and as such might still be recovered, maybe not in its pure entirety.

Formatting the drive on another hand does not essentially mean cleaning the drive and wiping off data. It just means that operating systems cannot see those data contents anymore. They are still present in the drive and can be recovered.

ATA Secure Erase is actually a way of completely and permanently erasing the content in a drive. Once the function has been done, undoing is not possible. Both the data content and even the data management table will be completely gone.

Smashing the USB drive is the surest way of cleaning data as that will permanently destroy the working components of the drive such as the memory chip. And once that happens then there's no drive let alone its contents.

You might be interested in
How many miss Dragon Ball Abridged?
Troyanec [42]

What is "Dragon Ball Abridged"?

3 0
3 years ago
Read 2 more answers
he wide range of materials used to create the Buk (mask) of the Torres Strait has been interpreted as evidence of the islanders'
Kamila [148]

Answer:

The wide range of materials used to create the Buk (mask) of the Torres Strait has been interpreted as evidence of the islanders' far-reaching trade networks

C preference for local natural resources

Explanation:

The Buk (mask) aged middle to late 19th century C.E., was located in Australia, Mabuiag Island, Queensland, Torres Strait, which is between Australia and Papua New Guinea with many small mostly uninhabited islands around. Archaeological excavations show people´s  arrival at  Mabuiag islands around 7,300 years ago, being very dependent on ocean´s products to survival.

Few surviving pieces, made out of local resources materials such as turtle shell, wood, fiber, cassowary feathers, resin and paint, tell us feathers were a throughoutly artistic material used in Oceania , but  turtle shells masks were Torres Strait´s people hand-crafted and unique hallmark to be used during assorted ceremonies.

7 0
3 years ago
In order to implement the classic DoS flood attack, the attacker must generate a sufficiently large volume of packets to exceed
gavmur [86]

Answer:

131 packets

Explanation:

Given

W (link ) =0.5 M bits,  and Ping packets ( P ) = 500bytes

To flood a target organization that has a bandwidth of W bits using a packet Mbits, you will require a W / P packet

P ( required ) = 500  * 8 = 4000 bits

therefore the W /P packet is calculated as

= 0.5 M bits / 4000 bits

given that :  1 M bits =  1,048,576 bits

0.5 M bits / 4000 bits=  131.07  

hence approximately 131 packets/ sec is required to flood the target organization

4 0
3 years ago
What kind of waste does a computer generate?<br><br> Will give brainly :3
Lena [83]

Answer:

waste???? a computer??

7 0
3 years ago
Address whether each defense method listed above (single router, defense-in-depth, and demilitarized zone) is sufficiently diffe
bagirrra123 [75]

Answer:

Check the explanation

Explanation:

1) The single router approach is a security Implementation of all security policies and the defense-in depth approach employs a firewall. the DMZ approach Is establish between two routers with a firewall.

2) The single router approach is for small offices and homes.

The defense in depth approach is for large organizations.

The DMZ approach is for publicity operated networks.

3) The DMZ can provide better defense because it has more than two firewall for increased security.

5 0
4 years ago
Other questions:
  • Find every number from 1 to n (inclusive) that is a palindrome which starts with the digit 3. Do not user a helper function.
    10·1 answer
  • Which Boolean operator enables you to exclude a search term?
    9·2 answers
  • A computer that no longer works after having minor repair work done to it may have been damaged by ____
    13·2 answers
  • Which command should you enter to configure a single port to discard inferior bpdus 200-125?
    5·1 answer
  • Short Answer: Computer models and simulations are used to formulate, refine, and test hypotheses. Describe a scenario that could
    8·1 answer
  • $100 to whoever finishes my assignment by june 1st
    11·1 answer
  • What is the georgia connections academy administrative password? i want to install something.
    5·1 answer
  • What can help you estimate how much money you might get in
    7·1 answer
  • In excel online what is it called when you join connecting cells together to span across more than one column and/or row?
    7·2 answers
  • How to install specific version of create-react-app so.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!