A contractor needs to destroy several drives containing confidential information so that they can never be used again. Which of the following destruction methods would best accomplish this task?
a. Format the hard drives
b. Overwrite the hard drives
c. Drill into the hard drives
d. Sanitize the hard drive
Answer: c. Drill into the hard drives
Computer Science & Information Technology
You might also like to view...
In an Append query, what happens to any records that violate the Primary key (or any other) rule?
A) The records are rejected. B) A message box appears telling you that you must fix the problematic records before the query can be run. C) New Primary key values are added to the records D) The query pauses at each violating record and allows you to fix the error(s).
Computer Science & Information Technology
Which of the following is correct about the use of quotation marks for the attribute value in HTML5?
A. No quotation marks are required. B. The value has to be enclosed in quotation marks.
Computer Science & Information Technology