You are in charge of recycling computers. some of the computers have hard drives that contain personally identifiable information (pii). what should be done to the hard drive before it is recycled?

Answers

Answer 1
Answer: Wiped and reformatted.

Related Questions

When planning the structure of a spreadsheet, columns are for _______ items and rows are for _______ items. A. single; group B. group; group C. single; single D. group; single
Word allows the user to view a document in different ways. What view would you choose to view a document like a book?a. View Mode b. Print Layout c. Read Mode d. Web Layout
The members of the first professional group devoted to information management with computing machines were known as:
Landon starts his computer and receives the error message, "Hard drive is not found." In a panic, he calls you because he did not back up his data and has numerous important files on his hard drive. During your investigation, Landon tells you he was watching a movie on his computer the previous night. What might be the problem with Landon’s computer?
What term identifies a blank screen or animation that automatically displays on a computer monitor after a specified period of inactivity?A. Control panelB. DesktopC. Screen saverD. Shortcut

Vannevar Bush imagined a desktop computing machine that would allow people to access data stored in various information centers throughout the world. This device was called

Answers

That device was call Memex.

Memex is taken from the word combination of memory and index. In 1945, an American engineer, inventor and a scientist, Vannevar Bush envisioned a device in which people can store and access their data information centers around the world.

To review the Army's current information on deploying 802.11 and 802.16, one should review the Army ___________ on Wireless Security Standards.a. STIG
b. BBP
c. Regulation
d. Manual

Answers

The correct answer for the question that is being presented above is this one: "b. BBP." To review the Army's current information on deploying 802.11 and 802.16, one should review the Army BBP or the Bloodborne Pathogens Standard on Wireless Security Standards.

To close the ____ view, click File on the Ribbon or click the preview of the document in the Info gallery to return to the document window. a. Outline
b. Backstage
c. Web Layout
d.Both a and b

Answers

To close the backstage view, click File on the Ribbon or click the preview of the document in the Info gallery to return to the document window. Thus, the correct option for this question is B.

What is a Document window?

A document window may be defined as a kind of enclosed child window that is significantly linked with a multiple-document interface (MDI) window. These types of windows are typically utilized for the display and modification of source code or text, but they can also host other functional types.

According to the context of this question, the backstage view displays the list of the most recent files that have been worked on. And if you want to open these files you must use this view which generally saves your time.

Therefore, to close the backstage view, click File on the Ribbon or click the preview of the document in the Info gallery to return to the document window. Thus, the correct option for this question is B.

To learn more about Backstage view, refer to the link:

brainly.com/question/27362542

#SPJ2

Your answer would be D,

Which of the following statements about computer graphics formats is true? A. Unlike word processing programs, computer graphics formats can be interchanged on most systems.
B. You may need a utility program to convert graphics to a format compatible with your software.
C. Computer graphics formats are universally compatible with any graphic design software.
D. Graphics formats can't be converted to different formats.

Answers

The answer about computer graphics formats that is true is b) you may need a utility program to convert graphics to a format compatible with your software.

What does “default” refer to? the ability to be used as, or directly converted to, cash. the failure to pay back a loan. the amount of money borrowed. the price paid for the use of borrowed money.

Answers

The answer is "the failure to pay back a loan".

In computer systems, we have a different meaning to the word default. It is referred to the setting or option in a computer upon opening a program or application. But according to the dictionary, default refers to the failure to make a payment such as a loan.

A specialized security administrator responsible for performing systems development life cycle (SDLC) activities in the development of a security system is known as __________.

Answers

Answer:

SECURITY ANALYSTS

Explanation:

Security Analysts is a specialised security

administrator which is responsible for maintaining the security and integrity of data and performing system development life cycle activities in the development of a security system. The security analyst must have knowledge of every aspect of information security within the organisation and must analyze the security measures of the company and determine how effective they are.

The specialized security Administrator will be responsible for keeping data safe across the organization by monitoring, reporting, and addressing them and he must takes measures to protect a company's sensitive information.