1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natta225 [31]
3 years ago
6

Whose guidelines should you follow for the destruction of storage media such as thumb drives, Zip drives, and computers?

Computers and Technology
1 answer:
Kipish [7]3 years ago
5 0

Answer:

Depends how bad you want to hide something. If the drive has previously been encrypted and the password hashed (like AES-256 with SHA-512 hashing), then deleting the content is enough since it will be slightly overridden and thus unusable. If it is not encrypted already, delete it, and override all your disk space with something. If you want it to die as a secrete 100%, burn it and pulverize it. Otherwise, if you want a quick method, use some real delete software.

You might be interested in
which programming paradigm do programmers follow to write code for event driven applications? a. object oriented programming. b.
7nadin3 [17]

Answer:

D) Procedural

Explanation:

7 0
3 years ago
5. Developed by Paul Hawkins, it is a computer system
il63 [147K]

Answer:

hawk eye

Explanation:

4 0
3 years ago
In your own words, describe UML. Identify at least two types of UML diagrams that can be used in software development; describe
lora16 [44]

<u>Uml (Unified Modified Language):</u>

In those days before software development normally we used flow chart, which will have Start, Process, Conditions and Stop, Modified version of flow chart is called UML (Unified Modified Language).

UML is standard model language which help develop understand flow of the software. Uml (Unified Modified Language).

There are 7 type of diagram is used in Uml (Unified Modified Language).

  • Class Diagram.
  • Object Diagram.
  • Component Diagram.
  • Composite Structure Diagram.
  • Deployment Diagram.
  • Package Diagram.
  • Profile Diagram.

I will suggest profile diagram and class diagram.

  • Profile diagram – This diagram is just to define use role and user rights.
  • Class diagram: - This diagram explains the class and their uses in the software development.
7 0
4 years ago
Given num_rows and num_cols, print a list of all seats in a theater. Rows are numbered, columns lettered, as in 1A or 3E. Print
nata0808 [166]

Answer:

Following are the program for the above question in python:

Explanation:

def seat(num_rows,num_cols):#function definition.

   for x in range(1,num_rows+1):#first for loop.

       c='A'

       for y in range(1,num_cols+1): #second for loop.

           print(str(x)+c,end=" ") #print the value

           c=chr(ord(c)+1) #expression to form a charater addition.

seat(int(input("enter the number of rows: ")),int(input("enter the number of columns: "))) #take the input from the user.

Output:

  • If the user inputs 2 and 3, then the output is :"1A 1B 1C 2A 2B 2C 3A 3B 3C 4A 4B 4C".

Code Explanation :

  • The above code is in python language, in which the first line is used to render a message to the user then take the inputs from the user and then pass to the function after converting into int function.
  • Then there are two loops in the function which are used to print the number of the seat.
  • The first loop is used to print the row number and the second loop is used to print the column number.
4 0
4 years ago
What number will be output by the console.log command on line 5?
anzhelika [568]

Answer:

E

Explanation:

If you follow the line of code and add 1, 2, and then 3, 10 + 1 + 2 + 3 = 16.

7 0
3 years ago
Read 2 more answers
Other questions:
  • Code Example 4-3 main program: import arithmetic as a def main(): num1 = 5 num2 = 6 result = a.add(num1, num2) print("The sum is
    15·1 answer
  • Which of the following apply to the definition of Wide Area Networks? Check all of the boxes that apply.
    7·2 answers
  • What is the function of napier's bones<br>​
    8·1 answer
  • Why is it important to use the binomial nomenclature system?
    6·1 answer
  • If a filesystem has a block size of 4096 bytes, this means that a file comprised of only one byte will still use 4096 bytes of s
    8·2 answers
  • Write a C program to input basic salary of an employee and calculate gross salary according to given conditions.
    11·1 answer
  • Assignment 4: Evens and Odds
    11·1 answer
  • These operating systems use a graphical user interface.
    8·1 answer
  • You want to read input from the user to know how many apples they would like
    10·1 answer
  • A search engine finds bugs and system failures in your computer.<br><br> True or False?
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!