Which security method would be best to use if extremely sensitive government information were stored on a hard drive that will no longer be used?
A) 1/0 rewrite software.
B) Drill holes in the platters and smash the pieces with a hammer.
C) Hold a magnet over each platter.
D) Repartition the hard drive into multiple partitions using different file systems.
B
Computer Science & Information Technology
You might also like to view...
The replacement capitalization does not have to match the original capitalization
Indicate whether the statement is true or false
Computer Science & Information Technology
Describe the potential problems with this algorithm if there are dupli- cate objects in the data set. Assume the distance function will only return a distance of 0 for objects that are the same.
Consider the problem of finding the K nearest neighbors of a data object. A
programmer designs Algorithm 2.1 for this task.
Computer Science & Information Technology