1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrew [12]
2 years ago
10

Which of the following is a recommended approach for data backup? Select one: a. Allow employees to take copies of vital data ho

me at the end of the work day. b. Store the data in a building adjacent to the company. c. Store all the data in an external disk and place it in the server room. d. Use online databases to update and backup the data.
Computers and Technology
1 answer:
frosja888 [35]2 years ago
6 0

Answer:d)Use online databases to update and backup the data.

Explanation: Data backup is the creation of copy of the data to be stored in the secondary memory.This data is utilized when the data is lost or deleted from original positional and thus gets restored . Database are used for the updating the backed-up data on online mode.

Other options are incorrect because it does not creates copies for the offices members to take home, no data storage is created in following organization and does not store data in external disk.Thus, the correct option is option(d).

You might be interested in
Reading for comprehension requires _____ reading?
Levart [38]

Answer:

IT is ACTIVE

Explanation: I took the quiz

4 0
2 years ago
One lap around a standard high-school running track is exactly 0.25 miles. Write a program that takes a number of miles as input
WINSTONCH [101]

Answer:

F(x) = x*.25

Explanation:

the amount of miles (x) divided by 4 (four quarters in a mile) or just multiply by .25

6 0
3 years ago
Read 2 more answers
When you add an rss feed to hootsuite publisher, posts from blogs and websites you designate will be?
Cloud [144]

All answers are correct.

Source and explanation: certificationanswers.com/en/category/hootsuite-platform/

8 0
2 years ago
In the context of intentional computer and network threats a ____ is a programming routine built into a system by its designer
lara31 [8.8K]

Answer:

a. backdoor

backdoor (also called a trapdoor) is a programming routine built into a system by its designer or programmer. It enables the designer or programmer to bypass system security and sneak back into the system later to access programs or files.

6 0
3 years ago
Read 2 more answers
a third important logical element is the inverter. an inverter does pretty much what it says. if the input is 0, the output is 1
Mrrafil [7]

Answer:

xy225.252 <  \geqslant  > . \times 5 \times . =  {?}^{2}

7 0
3 years ago
Other questions:
  • In fiberoptic cable, the signal source is__________waves
    7·1 answer
  • You have no control over who views your social network information
    13·2 answers
  • If you're doing a relational comparison, which filter would be available?
    15·1 answer
  • What is runtime error in Python? Provide an example
    14·1 answer
  • Design a hierarchy c hart or flowchart for a program that calculates the current balance in a savin gs account. The program must
    8·1 answer
  • Being nice take the points​
    9·1 answer
  • What is the value of the variable named result after the following code executes?
    10·1 answer
  • A group of two or more computer systems linked together via communication devices is called:.
    10·1 answer
  • ANSWER QUICKLY!!! <br><br> Which aspect of planning is a preventive action?
    15·1 answer
  • to provide for ecmascript compatibility in older browsers, you can use group of answer choices javascript shivs javascript shims
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!