1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marissa [1.9K]
3 years ago
12

The process of securely erasing a hard drive

Computers and Technology
1 answer:
Citrus2011 [14]3 years ago
6 0
The process of securely erasing a hard drive is called formatting. Formatting is where you delete all the files in your drive and making sure that it is secure. When you format your drive, it erases all the data even viruses stored in your drive. So most of the time, when an IT person thinks that his computer has virus, one option that he can do is do the formatting to make sure that his computer is clean when he reuse it again the next time.
You might be interested in
Do you need to have java on your computer.
kirill115 [55]

Answer:

No

Explanation:

you dont really need java on computers today

6 0
2 years ago
what do i do when my mbot is not working but when I plug the cord into the computer it does work but only does one command over
zubka84 [21]
There is probably a default wire out of place or it could be from you yanking the cord out, and doing that wears it down even more.
7 0
4 years ago
When engineers consider _____, they propose giving up a benefit of one proposed design in order to obtain a benefit of a differe
spin [16.1K]

Answer:

The answer is A. Constraint.

5 0
3 years ago
If, in a recursive solution, function A calls function B which calls function C, this is called ________ recursion. indirect thr
suter [353]

If, in a recursive solution, function A calls function B which calls function C, this is called<u> Indirect</u> recursion.

A recursive algorithm is said to be recursive if such an algorithm calls itself with smaller input values and get current result for implementing basic operations on those simple inputs.

Indirect recursion occurs when a function A invokes another function B which in turn makes it the original function and calls another function C.

Learn more about recursion here:

brainly.com/question/3169485?referrer=searchResults

6 0
2 years ago
A 32-bit number that's used to keep track of where you are in a sequence of TCP segments is known as a(n) ______ number.
scoray [572]

A <u>sequence</u> number is a 32-bit number that's used to indicate where you are in a sequence of TCP segments.

<h3>What is TCP?</h3>

TCP is an acronym for Transmission Control Protocol and it is an essential and important standard protocol of the Internet protocol network.

In Computer technology, TCP is an essential part of the transmission control protocol and internet protocol (TCP/IP) network which has a wide range of applications in the following areas:

  • File transfers
  • World wide web (WWW).
  • Remote administration
  • E-mail

In TCP segments, a <u>sequence</u> number is a 32-bit number that's typically used to indicate where an end user is in a sequence.

Read more on TCP here: brainly.com/question/17387945

8 0
2 years ago
Other questions:
  • When saving a document or drawing, you determine the destination folder in which the file will be saved by?
    6·1 answer
  • How do you fix this windows 7 screen​
    8·1 answer
  • What is the correct posting of the journalized transaction shown in figure 3.03 to the accounts payable subsidiary ledger?
    9·1 answer
  • The manager of a football stadium wants you to write a program that calculates the total ticket sales after each game. There are
    6·1 answer
  • .doc What is the difference between a skilled hacker and an unskilled hacker, other than skill levels? How does the protection a
    5·1 answer
  • To maintain her audience's confidence in her, what should kiara not do while delivering her presentation?
    6·2 answers
  • Identify the symbol. please help!!<br>​
    7·2 answers
  • What is the difference between Input, Output, and Storage Devices?
    12·2 answers
  • Consider the following code segments that are potential replacements for /* missing code */.
    6·1 answer
  • What is the general term for programs used to operate a computer
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!