Which two methods would be used to ensure corporate confidential data on a hard drive is removed before donating the hard drive to a school? (Select two.)

A) Antivirus software
B) Degauss
C) Drill holes into the platters
D) Remote wipe
E) Secure erasing

B, E

Computer Science & Information Technology

You might also like to view...

Answer the following questions true (T) or false (F)

1. Functions are permitted to have only one input argument. 2. After the last statement of a function executes, control is transferred to the next defined function. 3. A function interface comment consists of the function result type or void, the function name, and the formal parameter declaration list.

Computer Science & Information Technology

Try to change your password to dog. What happens? Now change it to a more secure password. What makes that password relatively secure?

What will be an ideal response?

Computer Science & Information Technology