1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natita [175]
3 years ago
5

Suppose you have a primary location in New York City where you main corporate servers are located. Just in case something happen

s in New York City, you have backup servers that are updated every minute in Chicago. This is an example of a _________ site.
Computers and Technology
1 answer:
REY [17]3 years ago
3 0

Answer:

Hot

Explanation: A Hot site is a disaster recovery management site which allows an organisation to still continue it computer and interconnection activities through a copied backup servers should there be any disaster or issues on the main server.

Hot site is a very essential part of disaster recovery process and thus for an organisation to use a Hot site there are basically service charges which are paid by such an organisation.

You might be interested in
A method to move data through a network of links and switches which reserves communication sessions between end systems is calle
lubasha [3.4K]

Answer:Circuit switching and packet switching

Explanation: Circuit switching is the switching technique through the connection from the source port to the destination port.Packet switching is also a switching techniques in connectionless form for the data packets. Both these switching techniques helps in communication between end and start ports.

Other option are incorrect as the access networks provide the access to the network and throughput is the input passing in the network.Thus, the correct option is circuit switching and packet switching .

3 0
4 years ago
sales reps at universal containers use salesforce on their mobile devices. They want a way to add new contacts quickly and then
Mamont248 [21]

Answer:

Build a global action to create Contacts

Explanation:

Based on the information given the mobile solution that an app builder should recommend should be GLOBAL ACTION because global action enables new contact to be created quickly ,Global actions also enables the creation or update of records as well sending email, all without leaving the page the person is working on which is why GLOBAL ACTION is often recommended because it saves time.

6 0
4 years ago
Discuss the major procedures that investigators must use in order to collect network trace evidence of computer-related crimes.
frez [133]

Answer:

The answer is below

Explanation:

The major procedures that investigators must use to collect network trace evidence of computer-related crimes include the following:

1. Establish appropriate guidelines to follow: before starting the actual investigation, all the legal procedures and instructions to follow must be clearly stated and shown to everybody involved in the investigation process.

2. Assess the Evidence: the investigators must assess all the available evidence by checking the computer through a specific means. The assessment includes checking of hard drives, email accounts, social networking sites, or similar digital prints that can be used as proof of the criminal activities

3. Acquire the Evidence: here the investigators must find an appropriate means of gathering the evidence formally and legally. This may involve the removal of any form of hardware such as hard drives, and software-related items that can be extracted.

4. Examine the Evidence: this involved examination of the acquired evidence, to determine if it can be used as proof or not. This involved analyzing the evidence to check if they correlate with the criminal activities under investigation. Some of the things to check include, date of formation of the evidence, the names attached to it, the routes those data were sent or received from, etc.

5. Prepare a report and document them appropriately: this involved the proper detailing and recording of the information derived from the evidence. It includes the time of evidence examination and methods used in examining them. Also, the means at which they acquired the evidence among others.

8 0
3 years ago
Which of the following is NOT a type of software?
natta225 [31]

Answer:

Output device

Explanation:

Im pretty sure that correct

3 0
4 years ago
You can use the ________ method to replace an item at a specific location in an arraylist.
r-ruslan [8.4K]
The answer is the <span>ArrayList method</span>
7 0
3 years ago
Other questions:
  • Your bank offers to lend you $114,400 at an 8.5% annual interest rate to start your new business. The terms require you to amort
    11·1 answer
  • You manage 20 windows workstations in your domain network you want to prevent the sales team members from making system changes
    10·1 answer
  • If a database is not maintained or if incorrect data is entered into the database, serious problems can occur. What problems cou
    15·1 answer
  • Write a program that simulates a lottery. The program should havean array of five integers named lottery, and shouldgenerate a r
    12·1 answer
  • . A double is more precise than a float... true or false?
    12·1 answer
  • Seth is considering advertising his business using paid search results.What do you think makes paid search advertising so effect
    11·2 answers
  • Free points <br><br><br><br><br> also if u wanna check out my spotlfy u can (xkuromist)
    6·2 answers
  • What's the use of computer?Where are they used?​
    6·2 answers
  • What are computer specification​
    12·2 answers
  • How does a computer work?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!