1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
neonofarm [45]
3 years ago
5

Holly would like to run an annual major disaster recovery test that is as thorough and realistic as possible. She also wants to

ensure that there is no disruption of activity at the primary site. What option is best in this scenario?
A. Checklist test
B. Full interruption test
C. Parallel test
D. Simulation test
Computers and Technology
1 answer:
Marina86 [1]3 years ago
7 0

Answer:

C . Parallel Test

Explanation:

Parallel Test is defined as software testing type , which checks multiple application or sub-components of one application concurrently to reduce the test time. In parallel testing , tester runs two different versions of software concurrently with same input

You might be interested in
In a folder hierarchy, the top level is referred to as which of the following?
Vesnalui [34]

Answer:

B. root

Explanation:

Every user in Linux is assigned a folder from which they can store their files. The interpreter allows you to abbreviate your route with the “~” symbol. The ls command without any additional data shows the files in the current directory, but if after the name of the command a path is written, it shows the files in that path. Therefore, the ls ~ command shows the files in the user's folder.

In addition to the folders and files created by the user or programs, every Linux folder has two subfolders defined by default:

“..”: It is the top level folder in the file hierarchy that contains it. This subfolder is also present in the root of the filesystem (the folder with absolute path “/”), but points to itself.

“.”: It is the folder itself that appears as if it were also a subfolder. It can be considered as a "self-reference" or pointer to itself.

These folders are normal folders in the system for all purposes; that is, they can be used on routes. For example, the path /dirA/dirB/dirC/../fichero2.txt refers to the file that is stored in the dirB folder, since from dirC, the folder .. points to its predecessor, dirB. The following figure shows the interpretation of this route as well as the equivalent of the “..” and “.” Folders.

4 0
3 years ago
A(n) _____ is used to create a new file or to overwrite an existing file by attaching it to a command that produces output.
Alex787 [66]

Answer: Redirection symbol

Explanation: Redirection symbol/operator is the special operator that is used in programs along with commands. The operators that are generally used are ">",">>","I" and "<". These commands are given in the section of the DOS commands and other command prompt sections. This is the process where the changes in input feed and output is  analyzed and read through these commands.

3 0
3 years ago
If there is no computer how would human beings have performed the workk
Katena32 [7]

I’m pretty sure we would do things at the agency would do it because overall th i’m pretty sure we would do things at the agency would do it because overall the agents were actually much smarter than we are literally right now and someways because they use more organic and natural and a whole things like herbs Escentuals would help you more than the chemicals in the flu shots that we take and have chemicals and are bad for the body

3 0
3 years ago
____________________ multiplexes or separates the data to be transmitted into smaller chunks and then transmitted the chunks on
Alina [70]

Answer:

no one knows

Explanation:

4 0
3 years ago
You would make a color in a graphic ____ if you wanted to remove part of a graphic or see text or colors behind a graphic.
defon
<span>The answer should be "translucent" ... </span>
6 0
3 years ago
Other questions:
  • Why should you limit what information is in your digital footprint?
    12·1 answer
  • A(n) ____________ is a private data network that creates secure connections over regular internet lines.
    14·1 answer
  • What is the nearest inhabited area to the amazon rainforest
    14·1 answer
  • Which statement best describes a transition in PowerPoint?
    12·1 answer
  • Consider the following Stack operations:
    5·1 answer
  • A(n) ____ is software that can be used to block access to certain Web sites that contain material deemed inappropriate or offens
    11·1 answer
  • Discuss five domains of Instructional technology​
    7·1 answer
  • How did machines get involved throughout the years?
    13·1 answer
  • Which of the following would be the most appropriate way to define a method that calculates and returns the final price, after t
    13·1 answer
  • If a TextView has not been displayed yet, it is possible to retrieve measurements about its width and height using the _________
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!