Which security method would be best to use if extremely sensitive government information were stored on a hard drive that will no longer be used?

A) 1/0 rewrite software.
B) Drill holes in the platters and smash the pieces with a hammer.
C) Hold a magnet over each platter.
D) Repartition the hard drive into multiple partitions using different file systems.

B

Computer Science & Information Technology

You might also like to view...

The replacement capitalization does not have to match the original capitalization

Indicate whether the statement is true or false

Computer Science & Information Technology

Describe the potential problems with this algorithm if there are dupli- cate objects in the data set. Assume the distance function will only return a distance of 0 for objects that are the same.

Consider the problem of finding the K nearest neighbors of a data object. A
programmer designs Algorithm 2.1 for this task.

Computer Science & Information Technology