1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natta225 [31]
3 years ago
6

Whose guidelines should you follow for the destruction of storage media such as thumb drives, Zip drives, and computers?

Computers and Technology
1 answer:
Kipish [7]3 years ago
5 0

Answer:

Depends how bad you want to hide something. If the drive has previously been encrypted and the password hashed (like AES-256 with SHA-512 hashing), then deleting the content is enough since it will be slightly overridden and thus unusable. If it is not encrypted already, delete it, and override all your disk space with something. If you want it to die as a secrete 100%, burn it and pulverize it. Otherwise, if you want a quick method, use some real delete software.

You might be interested in
Read Chapter 2 in your text before attempting this project. An employee is paid at a rate of $16.78 per hour for the first 40 ho
Vitek1552 [10]

Answer:

Answered below

Explanation:

#Answer is written in Python programming language

hrs = int(input("Enter hours worked for the week: "))

dep = int(input ("Enter number of dependants: "))

pay = 16.78

ovpay = pay * 1.5

if hrs <= 40:

wage = hrs * pay

else:

wage = hrs * ovpay

ss = wage * 0.06

fedtax = wage * 0.14

statetax = wage * 0.05

dues = 10

if dep >= 3:

ins = 35

net_pay = wage - ss - fedtax - statetax - dues - ins

print(wage)

print ( ss, fedtax, statetax, dues, ins)

print (net_pay)

8 0
3 years ago
Coding question. Please help me?
Marizza181 [45]

Answer:

a  for a loop

Explanation:

7 0
3 years ago
PLZ HELP What will be the output? class num: def init (self.a): self. number = a mul* __(self. b) return self. number + b. numbe
Vilka [71]

Answer:

15

Explanation:

got it right on edge

3 0
3 years ago
A digital forensic analyst examines the original digital source (e.g. computer, flash drive, backup tape) suspected of being inv
mel-nik [20]

Answer: True

Explanation:

Digital forensic analysts are the people who examine digital devices such as cameras, mobile phones and computers in order to get evidence of crime.

The evidence gotten by them can then be used to provide support to criminal investigations and can also be given to the intelligence agencies. Their function is to get back and safeguard the digital data which are related to cybercrime investigations as well as criminal investigations.

6 0
3 years ago
Which is a safe practice when online
Kay [80]

Answer:

I don't know if there are choices but these are couple that i think would be right. Don't give out personal info, have a complex password and don't give it out to anyone, don't click on random pop up adds, and use a firewall

Explanation:

7 0
3 years ago
Read 2 more answers
Other questions:
  • 3. You are a network administrator responsible for all network platforms and services. The Teta Company currently has only one b
    13·2 answers
  • I just want to ask if some one know an online school program that offer a live session and the cost of it not to expensive. for
    10·1 answer
  • Show the array that results from the following sequence of key insertions using a hashing system under the given conditions: 5,
    12·1 answer
  • I have to writea piece of code to calculate the factorial of somewhat large numbers so the long long type won't suffize, so usin
    7·1 answer
  • Which feature of a presentation program’s interface provides a list of commands to create, format, and edit presentations?
    14·2 answers
  • A student is curious about how a Web site appears on his computer screen. On a piece of paper,
    8·1 answer
  • QUESTION 16
    14·1 answer
  • Jeff wants to create a website with interactive and dynamic content. Which programming language will he use?
    8·1 answer
  • How could each of the two-proposed changes decrease the size of an mips assembly program? On the other hand, how could the propo
    5·1 answer
  • give the tightest asymptotic bounds you can for the following recurrences and provide a short explanation for your solution. you
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!