1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marissa [1.9K]
3 years ago
12

The process of securely erasing a hard drive

Computers and Technology
1 answer:
Citrus2011 [14]3 years ago
6 0
The process of securely erasing a hard drive is called formatting. Formatting is where you delete all the files in your drive and making sure that it is secure. When you format your drive, it erases all the data even viruses stored in your drive. So most of the time, when an IT person thinks that his computer has virus, one option that he can do is do the formatting to make sure that his computer is clean when he reuse it again the next time.
You might be interested in
max is a function that expects two integer parameters and returns the value of the larger one. Two variables, population1 and po
Ivenika [448]

Answer:

The expression is given below:

max(population1,population1)// calling the function max

Explanation:

Following are the description of expression

  • As mention in the question population1 and population2  are the two integer parameter or we can say that they are the two variable.
  • To calling any function following are the syntax

        functionname(argument list).

  • In this as already mention max is function name and  population1 and population2 are the integer value so we have write max(population1,population1)

8 0
3 years ago
Why should a linked list node be separate from the element stored on the list?
Daniel [21]

Explanation:

A linked list node should be separated from the element stored in the list because it is not reasonable to assume that the each object that we may want insert in the collection can be architectured to cooperate with the collection implementation.

Also the details of the implementation are to kept distinct from the user of that collection , including the elements that the user wants to add to his collection.

8 0
3 years ago
A keyboard shortcut to pasting in a document is to key _____.
m_a_m_a [10]
(Ctrl + V) is the shortcut for pasting.

Similarly, (Ctrl + C) is the shortcut for copying.
6 0
3 years ago
Can someone urgently help me with my java code? Ive been working on it for hours and its not working.
Paha777 [63]

Answer:

nm hn hhjjnjjnj j

Explanation:

kjnjnjn jnjubhvcfv

3 0
3 years ago
The _____________ loop allows the receiver to communicate with the sender in the imc process.
postnew [5]
Feedbacks
perhaps !!
<span>The feedback loop allows the receiver to communicate with the sender in the imc process.</span>
4 0
3 years ago
Other questions:
  • What is a drawback to being in Slide Show mode? a- Being able to review each slide in order
    8·2 answers
  • Acrynom for wys or wyg
    10·1 answer
  • Which of the following is ideal for long distance communication ?
    5·1 answer
  • Kendra is taking a class in Finance and she has been asked to give a speech about a case study in which she's been working. She
    5·1 answer
  • Question 4 (Worth 5 points)
    14·2 answers
  • What is the purpose of this parallelogram shape in a flowchart?
    15·1 answer
  • What is the widest area network?
    15·1 answer
  • Draw a flowchart and write the algorithm to find even number between 1 to 50​
    7·1 answer
  • True or False? Voice recognition is the process of determining the meaning of the words spoken by a human.
    7·1 answer
  • Which organization provides a free, online html5 validator application to ensure that a webpage's html tags follow the rules for
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!