1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
valina [46]
3 years ago
6

A government agency is getting rid of older workstations. The agency will donate these workstations, along with other excess com

puter systems, to nearby schools. Management reminds the systems administrators about the data sanitization and disposal policy. What policy items are applicable for these IT systems, prior to donating to the schools
Computers and Technology
1 answer:
Basile [38]3 years ago
6 0

Answer:

The answer is "Using the DoD 5220.22-M method and  Degauss media with a magnet".

Explanation:

The "DoD Standard" is a term used during the data sanitizing industry and refers to DoD 5220.22-M. The simplest ways are being used to help eliminate the previously stored data, by deleting hard disc storage facilities with the same data wherever that used a sequence of all zeros.

The sparging eliminates statistics to entirely delete the gravitational flux from electronic media. Hard drives as well as other data storage devices, for example, computer tapes, retain magnetic data. It could no longer be seen as storage after a disk is degaussed.

You might be interested in
I get such an error when I turn on the computer, how can I fix it?
ss7ja [257]

Answer:

Use the HLL ( Java C++ ) code to fetch the commands of that program, then translate them using any translatory program such as Microsoft notepad.

Or:

Download any utility software such as Avast, thunderbird, Dr. Solomon, or Norton software

Then install it to memory.

7 0
3 years ago
What are the advantages of saving files in a cloud? <br>Please help!! ​
BARSIC [14]
When using cloud storage, one of its main advantages is the accessibility and its ability to not get deleted as easily. Once a file is uploaded to the cloud, you can access it from almost any device as long as you have connection. And it’s not as easy from something to get accidentally deleted, as there is a backup.
6 0
3 years ago
Read 2 more answers
Consider an environment in which there is a one-to-one mapping between user-level threads and kernel-level threads that allows o
DENIUS [597]

Explanation:

According to the situation mentioned in the question about the model that can make the multi threaded execution faster as compared with the single threaded counterparts programs because multi-threaded programs have the capability to execute simultaneously in multiple processes.

In this type of system ,the blocking system cannot block the complete execution because kernel thread is present for every user thread .So, if one kernel thread gets blocked , others will still keep running .

Whereas, for uni-processor system , the program has to wait for the input -output operation completion for most of the time.Thus, multi-threaded program can execute faster than uni-processor.

 

5 0
3 years ago
Give some examples of CyberCrime
iris [78.8K]
I think you should take a look into this link: https://www.wired.com/2009/12/ye-cybercrimes/
Here are the 10 most <span>destructive cybercrimes that you can take as areal example of cybercrime.</span>
6 0
3 years ago
Problem 1: you must write a method for this problem called sentenceAnalyzer Write a program that reads a sentence from the keybo
forsale [732]

Answer:

   static void sentenceAnalyzer(String sentence){

       int lenOfString = sentence.length()-1;

   

           if(sentence.charAt(lenOfString)=='.'){

               System.out.println("Declarative");

             

           }

           else   if(sentence.charAt(lenOfString)=='?'){

               System.out.println("Interrogative");

             

           }

           else if(sentence.charAt(lenOfString)=='!'){

               System.out.println("Exclamation");

             

           }

           else{

               System.out.println("Unknown");

             

           }

   

   }

Explanation:

Using Java programming language

Create the method as required

Obtain the index of the last element using the string length method

Use if and else statements to check if the character at the last index is equal to any of the characters given and print the expected output

see a complete code with the main method below

<em>import java.util.Scanner;</em>

<em>public class num11 {</em>

<em>    public static void main(String[] args) {</em>

<em>        Scanner in = new Scanner(System.in);</em>

<em>        //Receiving User input</em>

<em>        System.out.println("Enter a sentence");</em>

<em>        String sentence = in.nextLine();</em>

<em>        // Calling the method</em>

<em>        sentenceAnalyzer(sentence);</em>

<em>    }</em>

<em>    static void sentenceAnalyzer(String sentence){</em>

<em>        int lenOfString = sentence.length()-1;</em>

<em />

<em>            if(sentence.charAt(lenOfString)=='.'){</em>

<em>                System.out.println("Declarative");</em>

<em>            }</em>

<em>            else   if(sentence.charAt(lenOfString)=='?'){</em>

<em>                System.out.println("Interrogative");</em>

<em>            }</em>

<em>            else if(sentence.charAt(lenOfString)=='!'){</em>

<em>                System.out.println("Exclamation");</em>

<em>            }</em>

<em>            else{</em>

<em>                System.out.println("Unknown");</em>

<em>            }</em>

<em>    }</em>

<em>}</em>

<em />

8 0
3 years ago
Other questions:
  • HELP AS SOON IS A UNIT TEST WILL GIVE BRAINLIEST
    9·2 answers
  • Selecting the option to control Widows and Orphans will prevent _________. A single line from appearing at the top or bottom of
    10·1 answer
  • You use a ____ following the closing brace of an array initialization list.
    12·2 answers
  • Organisms are classified as producers or consumers acorrding to the way they
    11·2 answers
  • Why does world of tanks keep downloading when I'm not even at the computer
    9·1 answer
  • In which of the security mechanism does the file containing data of the users/user groups have inbuilt security?
    6·1 answer
  • What is the role of the federal government in regulating the media and the internet?
    6·2 answers
  • Assume that the string oldSeq has been properly declared and initialized and contains the string segment. Write a code segment t
    6·1 answer
  • You are writing a program using the Java language. Which of the following is a requirement of Java syntax?
    6·1 answer
  • Select the correct technical term for each definition by using the drop-down menus.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!