1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maks197457 [2]
3 years ago
5

In addition to compiling the list of user access requirements, applications, and systems, the BIA also includes processes that a

re ____________. These processes safeguard against any risks that might occur due to key staff being unavailable or distracted.
Computers and Technology
1 answer:
laila [671]3 years ago
5 0

Answer:

automated

Explanation:

Basically a Business Impact Analysis (BIA) estimates and determines the effects of a business activity and process disturbances. These disruptions can be natural or electronic disasters. It also collects information which is used to establish recovery plan. It identifies the business vulnerabilities and works on the strategies in order to reduce such potential hazards. The BIA involves both manual and automated processes. BIA involves automated processes which include the automated software tools that enables the protection of the confidential information of the users and also generates automated reports about the critical business processes.

You might be interested in
Computing devices translate digital to analog information in order to process the information
tester [92]

Complete Question:

Which of the following about computers is NOT true?

Group of answer choices.

A. Computing devices translate digital to analog information in order to process the information.

B. Computing devices are electronic.

C. The CPU processes commands.

D. The memory uses binary numbers

Answer:

A. Computing devices translate digital to analog information in order to process the information.

Explanation:

Computing is the process of using computer hardware and software to manage, process and transmit data in order to complete a goal-oriented task.

The true statements about computers are;

I. Computing devices are electronic: the components and parts which makes up a computer system are mainly powered by a power supply unit and motherboard that typically comprises of electronic components such as capacitors, resistors, diodes etc.

II. The CPU processes commands: the central processing unit (CPU) is responsible for converting or transforming the data from an input device into a usable format and sent to the output device.

III. The memory uses binary numbers: computer only understand ones and zeros.

5 0
3 years ago
bro i got banned for posting an amazing bulk pic, but this dude literally posted an inappropriate, dafuq is wrong with this bann
Ludmilka [50]

Answer:

okkk

Explanation:

5 0
3 years ago
Read 2 more answers
Window is a very popular operating system becouse of its _ environment .​
Inga [223]
Window is a vary popular operating system because of its runtime and compatible environment .
hope it help
4 0
2 years ago
Read 2 more answers
You need to fax a portion of a map from a large hard-cover atlas to a client from an internal fax-modem. To fax the map, the bes
Kay [80]
The fax modem is used to send and receive fax messages by only having phone line (fax machine is not required). The scanned documents should be saved as digital file (image or PDF format) in order to be sent. So, in order to send a portion of a map you should first convert the map into digital file and than simply send it through the fax modem. The best way to convert it to a digital file is to use an optical character recognition (OCR). 
6 0
3 years ago
Describe the concepts of confidentiality, integrity, and availability (C-I-A), and explain each of the seven domains of a typica
GREYUIT [131]

Answer:

Answer explained below. The remaining part of the question is incomplete

Explanation:

The concepts of confidentiality, integrity, and availability (C-I-A) can be explained in following given points.

1) Confidentiality: Its basically refer to the confidentiality of the information. Here we can think about the protection of the information from unauthorized person. Confidentiality enuser that at what level your information is secured and no unauthorized access will be done to the information. For maintaining the confidentiality, we can use various encryption methods. The main concept of confidentiality is to enforce various techniques like encryption, file permissions and access control to restrict access to important information.

2) Integrity: Integrity of the information refer to the unwanted modification of the information. Integrity of the data as well as the information should be maintained and only the autorized person can access as well as modify the information. For enforcing the integrity, we can implement various hashing techniques on information.

3) Availability: Availability refers to the availability of the information, when ever an autorized person requests for the information. High availability of the information should occur, so that any autorized person can access it, when ever its required. For high availability, we can create backup as well as replicate the data across the geo sites.

Seven domains of a typical IT infrastructure are given below:

1) User Domain: Its refer to the group of users as well as the person who access the information systems.

2) LAN Domain: Refer to the local area network, where various computers are connected to each other.

3) Workstation Domain: The area is called workstation, where various users connect to the IT infrastructure.

4) WAN and LAN link domain: Refer to the connection of local area network to wide area network.

5) WAN domain: Refer to the wide area network, connection of computers in large area.

6) Storage Domain: Refer to the storage, where we store the data.

7) Remote Access Domain: Refer to the domain where mobile user can access the local as well as wide network remotely.

8 0
3 years ago
Other questions:
  • Match the job skills with the correct job role.
    12·1 answer
  • Using the expected format, of putting key information where the reader can’t find it, is an example of?
    8·2 answers
  • In cell h15 enter a vlookup function to determine the 2018 percentage of total attendance for the city listed in cell h14. Use t
    7·1 answer
  • The sun produces energy by the process of nuclear: <br><br> A.fission <br> B.fusion
    7·2 answers
  • The moon has less mass than the earth, so what happens to objects on the moon?
    11·1 answer
  • Amy just added a 462 meter run of fiber optic cable to the network what should she do next?
    10·1 answer
  • Why the internet is not considered a mass medium in Africa​
    13·2 answers
  • What department is cyber security
    6·2 answers
  • I need help!!!! 1.04
    9·1 answer
  • Write a program which will enter information relating to a speeding violation and then compute the amount of the speeding ticket
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!