1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ymorist [56]
4 years ago
15

The unthinkable happens and disaster strikes, crippling your network. You implement your disaster plan, but it doesn't go smooth

ly. You decide to investigate. What is a commom term in the IT community for this investigation?
Computers and Technology
1 answer:
Degger [83]4 years ago
7 0

Answer:

Post-mortem.

Explanation:

It refer to the discussion or analysis of event like here disaster why it doesn't work like plan based and through whole discussions what we learn so in future avoid such type of issue or mistakes.

You might be interested in
Desktop publishing design tools are represented by A. icons. B. windows. C. trackballs. D. modems.
AnnZ [28]
The best answer is A
Windows are the screens you can maximize and minimize.
Trackballs make the mouse move.
Modems are associated with internet connection.
Those three answers are unrelated leaving icons to be the most reasonable.
3 0
3 years ago
2x=y t-09 3xX=v 8x0=?+ 87-6x5=
Molodets [167]

Answer:

6

x  

3

 

​  

+x  

2

+2x

Explanation:

4 0
3 years ago
In the context of intentional computer and network threats a ____ is a programming routine built into a system by its designer
lara31 [8.8K]

Answer:

a. backdoor

backdoor (also called a trapdoor) is a programming routine built into a system by its designer or programmer. It enables the designer or programmer to bypass system security and sneak back into the system later to access programs or files.

6 0
3 years ago
Read 2 more answers
What controls network connectivity such as Wi-Fi and the GPS locator in a mobile device?
MakcuM [25]

Answer:

There are hybrid system that consist of WiFi, GPS, GSM and IP address to locate the mobile devices.

Explanation:

In Cellular phone communication, hybrid technique is used to locate to find the locations. It consist of WiFi, GSM, GPS and IP addresses. GPS technology is used with satellite communication. Location has been sent from satellite to the mobile network with the help of Google maps. There are few other techniques used to such as GSM based techniques that is used by the help of radio signals strength to find the location of the device. This technique is helpful in the areas where the many communication tower are there to locate the signal strength in the area of the mobile device. WiFi also used to locate the mobile device with the help of IP addresses.

In mobile phones, different combinations of all above technologies used to provide the network connectivity such as WiFi and GPS locator in the mobile Phone.  This is called Cellular locating technology.

5 0
3 years ago
Which is not covered under the Computer Access Device and Computer Fraud and Abuse Act (CADCFA)? unauthorized use of federal com
Mazyrski [523]

Answer:

The correct answer to the following question is "Typewriters".

Explanation:

CADCFA seems to be the very first provision of federal laws to specifically concentrate on computer assault. These clauses continued to allow corporations to prosecute unjust workers for compensation for the misuse of confidential or sensitive information.

  • Even though we all agree that sometimes a federal worker uses the typewriters in the abundance of power, that's why it's not protected by that same act.
  • The other options are incorrect because they are all known and are covered for that given CADCFA act.
5 0
3 years ago
Other questions:
  • Carlos owns a hardware store. He currently is not using any software to track what he has in the store. In 1–2 sentences, descri
    9·2 answers
  • You have been asked to create a query that will join the Production.Products table with the Production.Categories table. From th
    6·1 answer
  • In C++ :
    6·1 answer
  • 6.3 code practice: Question Edhesive
    8·1 answer
  • Tiffany is writing a program to help manage a bake sale. She writes the following code which prompts the user to enter the total
    15·1 answer
  • Can someone answer this ?
    7·1 answer
  • Raj needs to apply sorting to a current list in his Word document.
    9·2 answers
  • Mention five of the format tools use to edit a picture in a word document<br>​
    13·1 answer
  • Example of vector image format​
    12·1 answer
  • Page 1. I who invented computer?​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!