1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
igomit [66]
3 years ago
11

Implementing multiple types of technology and thereby precluding that the failure of one system will compromise the security of

information is referred to as ____________________.
Computers and Technology
1 answer:
Setler79 [48]3 years ago
5 0

Answer:

Redundancy

Explanation:

  • There are several redundant computer systems that can be applied to various operating systems and platforms.
  •  In any case, a server usually has redundant components, disks, network cards and power supplies.
  • The servers usually have two network cards with data redundancy, so in case of failure we will always have one of them available.
  • In conclusion, data redundancy is a fundamental system for the correct storage of the data available in the database.
You might be interested in
A computer has been stored, uncovered, in a dusty closet for several months. Why might this situation cause the operating system
Nezavi [6.7K]

Answer: ....

Dust and debris can cause performance deterioration.

Explanation:

Dust is a problem from the standpoint of blocking fan vents, or, if deep enough, actually insulating parts, causing overheating, but unless it contains substantial amounts of corrosive or conductive material (in which case you shouldn’t be breathing it), it won’t damage the electrical components (beyond any overheating damage).

What could happen, in some circumstances, is condensation inside the box, mixing with dust and creating a conductive sludge. This would generally only occur if you bring the box in from an extremely cold environment (below 0C, roughly) into a humid indoor environment. The protection from this is to wrap the box tightly in plastic before bringing it indoors, and leave it wrapped for a couple of hours, while it has time to warm up.

3 0
3 years ago
Cell phone producers charge a _____, which consumers pay to buy the phones. profit production cost price
alex41 [277]
The answer is price i have gone over this specific lesson multiple times.
4 0
4 years ago
Which of the following dimensions of e-commerce technology involves the integration of video, audio, and text marketing messages
crimeas [40]

Answer:

Richness (Information Richness)

Explanation:

Information richness refers to the complexity of combining  video, audio and  make a marketing advert, the information generated is considered rich. other features or dimensions include; interactivity, information density, personalization etc

3 0
4 years ago
what could backupdocs.com documents backup pdf program handle at one point if at all backupdocs.com functions documents saving p
bekas [8.4K]
This don’t make sense?? But I think it can handle it aha
6 0
3 years ago
Do you think the governmentshould allocate moremoney to HIV/AIDS orphans​
inna [77]

Answer:

Abstract

Objective Through a descriptive study, we determined the factors that influence the decision-making process for allocating funds to HIV/AIDS prevention and treatment programmes, and the extent to which formal decision tools are used in the municipality of KwaDukuza, South Africa.

Methods We conducted 35 key informant interviews in KwaDukuza. The interview questions addressed specific resource allocation issues while allowing respondents to speak openly about the complexities of the HIV/AIDS resource allocation process.

4 0
3 years ago
Other questions:
  • The rules that establish an orderly transfer of data between sender and receiver are called ____.
    5·2 answers
  • Difference between windows 2000 professional and service pack
    11·1 answer
  • Which trait depicts honesty?
    10·1 answer
  • Microprocessors can’t directly understand programming languages, so programs have to be converted into _____________ that corres
    15·1 answer
  • This is more opinionated than question-based.
    7·1 answer
  • Which of the following Internet protocols is MOST important in reassembling packets and requesting missing packets to form compl
    11·1 answer
  • What is the difference between a technological problem and a technological opportunity? Explain with an example.
    7·2 answers
  • Please help explain this calculator code.
    13·1 answer
  • Name:
    13·1 answer
  • Ask the user for five-coordinate pairs. Store each pair as a tuple, and store all the pairs in a list. Print the slope between a
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!