1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Scorpion4ik [409]
4 years ago
6

Database administrators must make sure that ________ and ________ techniques and procedures are operating to protect the databas

e in case of failure and to recover it as quickly and accurately as possible when necessary.
Computers and Technology
1 answer:
butalik [34]4 years ago
5 0

Answer:

backup; recovery

Explanation:

Backup and recovery refers to the process of backing up data in case of a loss and setting up systems that allow that data recovery due to data loss. Backing up data requires copying and archiving computer data, so that it is accessible in case of data deletion or corruption. Data from an earlier time may only be recovered if it has been backed up.

Data backup is a form of disaster recovery and should be part of any disaster recovery plan.In some cases, backing up or restoring entire systems, or the enterprise, after an event or disaster can take days

You might be interested in
Bytes are arrangements of
tigry1 [53]
The answer is B. Eight bits
7 0
3 years ago
What is the only language a microprocessor can process directly but most programmers almost never write programs in this code? Q
elixir [45]
A microprocessor can directly process machine code but most programmers almost never write in it.
C. Machine code
7 0
3 years ago
Read 2 more answers
This question is related to linked-list representation of disjoint sets. Consider two sets Sx and Sy that have 3 and 5 elements,
sattari [20]

Answer:

A union (UNION(x,y)) of the sets Sx and Sy represented by x and y, respectively will perform ________4_________ update(s) of the attribute.

Explanation:

The UNION (x, y) disjoint-set data structure unites the dynamic sets that contain x and y, say Sx and Sy, into a new set.  It is called the union of the two sets. Before the union operation, the two sets are disjoint.  After the union operation, the representative of the resulting set is some member of Sx and Sy or either Sx or Sy. The sets Sx and Sy are then destroyed to remove them from the union collection S.  So, four operations are required.

8 0
3 years ago
What happens when you drag a file from the Documents folder on the hard drive to the Pictures folder on the hard drive?
lora16 [44]

Answer:

The file changes its location within your hard drive while the file itself remains unchanged

Explanation:

The file's location will change from C:\Users\username\Documents to

C:\Users\username\Pictures

6 0
3 years ago
How you might change your normal everyday browsing habits​
Elodia [21]

Hello! I am Angie. I'm going to be helping you :) If you could thank me, that would be nice.

So I'll start.

The best way to do this is by being conscious of what you are searching on the internet. Acknowledge that there is a possibility you may end up using your time-eating websites.

Having done that, the next step is to have your short -term priorities straight, tell yourself that you came there for 1 reason and that's all you're going to do - browse for that one reason.

The final step is to try not to get distracted and fulfill your actual intention.

If these steps are repeated every day, your browsing habits can change.

I hope I helped.

5 0
3 years ago
Other questions:
  • Which of the descriptions listed below best describes the step in the reverse engineering process called functional analysis? A)
    12·1 answer
  • Which of the following are types of formatting you
    12·2 answers
  • Use this option to view your presentation as your audience will see it. a.File menu b.Play button c.Slide Show button d.Tools me
    6·2 answers
  • HELP I am in the computer lab right now and I need legit reasons why i should work on a laptop instead of a computer. I dont lik
    5·2 answers
  • How many unique ip addresses can be made in a fixed-length ip address system using 6 bits?
    8·1 answer
  • Who creates Virus ? virus is not made for what?
    14·2 answers
  • Implication of technological literacy to a teacher training today
    13·1 answer
  • Given a PrintWriter reference variable named output that references a PrintWriter object, write a statement that writes the stri
    5·1 answer
  • If Anime Characters were real , Who Would Your Anime Wife Would Be (Tell Who And Why)
    10·1 answer
  • B. WAP to check whether input number is palindrome number or not using SUB...... END SUB.​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!