EBK USING MIS
10th Edition
ISBN: 8220103633635
Author: KROENKE
Publisher: YUZU
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 8.8, Problem 3SGDQ
Explanation of Solution
Normal deletion of file:
“No”, normal deletion of files can’t permanently remove the file from the memory of the device. Perceptible device represents a medium by which privacy can be disturbed.
- When the users delete a file on a computer then that file is not permanently erased, but in reality, the computer simply deletes the file on the hard drive but it actually remains.
- Deleting files and marking its space as available is an extremely fast operation.
- To improve the system performance and save time, the
operating systems do not erase a file’s contents when it’s deleted. - The deleted files are temporarily stored in the recycle bin or trash folder. If the user does not want that file, then he or she permanently clears the recycle bin or trash folder, but it actually stores it in a hard drive.
Recover the deleted file:
“Yes”, the files can be recovered after deleting them. There are three possible way to recover deleted files...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
For what reasons does showing file extensions help in preventing malware?
Data Loss Prevention (DLP) on Windows computers: Can Forensic Examiners Access Both Temporary and Permanent Files?
Explain the concept of "encrypted files" and the common encryption algorithms used for file security.
Chapter 8 Solutions
EBK USING MIS
Ch. 8.3 - Prob. 1EGFQCh. 8.3 - Prob. 2EGFQCh. 8.3 - Prob. 3EGFQCh. 8.3 - Prob. 4EGFQCh. 8.4 - Prob. 1EGDQCh. 8.4 - Prob. 2EGDQCh. 8.4 - Prob. 3EGDQCh. 8.4 - Prob. 4EGDQCh. 8.4 - Prob. 5EGDQCh. 8.8 - Prob. 1SGDQ
Ch. 8.8 - Prob. 2SGDQCh. 8.8 - Prob. 3SGDQCh. 8.8 - Prob. 4SGDQCh. 8.8 - Prob. 8.1ARQCh. 8.8 - Prob. 8.2ARQCh. 8.8 - Prob. 8.3ARQCh. 8.8 - Prob. 8.4ARQCh. 8.8 - Prob. 8.5ARQCh. 8.8 - Prob. 8.6ARQCh. 8.8 - Prob. 8.7ARQCh. 8.8 - Prob. 8.8ARQCh. 8 - Prob. 8.1UYKCh. 8 - Prob. 8.2UYKCh. 8 - Prob. 8.3UYKCh. 8 - Prob. 8.4UYKCh. 8 - Prob. 8.5UYKCh. 8 - Prob. 8.6CE8Ch. 8 - Prob. 8.7CE8Ch. 8 - Prob. 8.1CS8Ch. 8 - Prob. 8.11CS8Ch. 8 - Prob. 8.12CS8Ch. 8 - Prob. 8.13CS8Ch. 8 - Prob. 8.14CS8Ch. 8 - Prob. 8.15CS8Ch. 8 - Using your answers to these questions, write a job...Ch. 8 - Prob. 8.17CS8Ch. 8 - Prob. 8.18MMLCh. 8 - Prob. 8.19MML
Knowledge Booster
Similar questions
- Take a peek at your computer's files. Is there anything on your computer that is personal to you? Suppose that information was stolen or lost. What would happen to you? In order to keep your computer safe, what are the recommended practises?arrow_forwardA common question among computer users is how to compress protected files.arrow_forwardWhen trying to protect one's computer from malware, what are the advantages of making file extensions visible?arrow_forward
- Describe the significance of "self-encrypting drives" (SEDs) in the realm of data security.arrow_forwardcan a backup resolve corrupted data issue?arrow_forwardWhat is fragmentation in a file system? The process of defragmenting a hard disk drive The process of dividing a file into smaller pieces to fit into available space The process of encrypting a file for security purposesarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- A+ Guide To It Technical SupportComputer ScienceISBN:9780357108291Author:ANDREWS, Jean.Publisher:Cengage,Enhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage Learning
A+ Guide To It Technical Support
Computer Science
ISBN:9780357108291
Author:ANDREWS, Jean.
Publisher:Cengage,
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning