1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fynjy0 [20]
4 years ago
15

When planning a backup strategy, ideally one needs to prioritize important data and only back up what is absolutely necessary fo

r operations. Assuming storage limitations, which of these is LEAST important to back up?
Computers and Technology
1 answer:
exis [7]4 years ago
4 0

The available options are:

Emails

Financial spreadsheets

User downloads

Databases

Answer:

User downloads

Explanation:

The correct answer is User downloads, this is because, the downloaded files are in cloud or another website memory or database, which serves as an alternative backup already. Thus, those downloaded files can still be recovered at later time when one needs to get the files back.

However, Emails, Financial spreadsheets and Databases, do not have any other place to retrieve them, because they are originally created and are yet to be uploaded to cloud or another website memory space to serves as alternative back up.

You might be interested in
Learning Task 3: Write the safety requirement indicated in each number on a
UkoKoshka [18]

Answer:

Please find the complete question in the attached file.

Explanation:

Recall that its SIS consists of one or even more Safety - management Functions (SIFs), which can include a mixture of the device(s), logic when and), and a complete component (elements), along with all user interface as well as power sources, such that two sets of criteria are delineated for each SIF by SRS: the System Requirement Set as well as the Integrate Requisites Set.

5 0
3 years ago
Your source data is of 50 GB. You make a full backup. Next week, once again you perform a full backup, but this time 10 more GB
ahrayia [7]

<u>The total size of backups:</u>

The source data is 50 GB. When its full backup is created, it takes 50 GB of space. Now, next week when 10 more GB of data has been added, the total source data are 60 GB. On creating another full backup, the size comes  out to be 60 GB as well and cumulative backup is 50 GB + 60 GB which equates to 110 GB.

In the second week, another 30 GB has been added to the source data, and on full backup creation, the size will be 60 GB + 30 GB which equates to 90 GB. So, the total size of backups saved till date will be 110 GB + 90 GB which equates to 200 GB.

7 0
3 years ago
________ is the art of manipulating people into breaking normal security procedures or divulging confidential information.
Alina [70]

Answer:

Social engineering is a process of manipulating people into breaking normal security procedures or divulging confidential information.

Explanation:

7 0
2 years ago
The length of a hailstone sequence is the number of terms it contains. For example, the hailstone sequence in example 1 (5, 16,
11111nata11111 [884]

Answer:

Following are the program to this question:

#include <iostream> //defining header file

using namespace std;

int hailstoneLength(int n) //defining method hailstoneLength

{

int t=1; //defining integer variable assign  

while(n!=1) //define a loop that checks value is not equal to 1

{

if(n%2==0) // check even number condition

{

n=n/2; // divide the value by 2 and store its remainder value in n

t++; //increment value of t by 1.

}

else

{

n=n*3+1; //calculate and hold value in n  

t++; //increment value of t variable by 1  

}

}

return t; //return value

}

int main() //defining main method

{

int n; //defining integer variable

cout<<"Enter any number: "; //print message

cin>> n; //input value

cout<<hailstoneLength(n); //call method and print its value

return 0;

}

Output:

Enter any number: 3

8

Explanation:

Program description can be given as follows:

  • In the given C++ language program an integer method "hailstoneLength", is declared, that accepts an integer variable "n" in its parameter.
  • Inside the method, an integer variable t is declared, that assign a value that is 1, in the next line, a while loop is declared, that uses if block to check even condition if number is even it divide by 2 and increment t variable value by 1.
  • If the number is odd it will multiply the value by 3 and add 1 and increment t by 1 then it will go to if block to check value again. when value of n is not equal to 1 it will return t variable value.
  • In the main method, an integer variable "n" is used that call the method and print its return value.
7 0
3 years ago
Sally needs to copy data from the first worksheet to the fifth worksheet in her workbook. Which combination of keys will she use
Marta_Voda [28]

To make things faster, instead of using your mouse to navigate multiple Microsoft Excel sheets that are in the same document, you can use a shortcut instead. This is what Sally will be doing to copy data from her first worksheet to the fifth.

The shortcut function that Sally needs to use to achieve this is (A) Ctrl and Page Up or Page Down Keys.

7 0
3 years ago
Read 2 more answers
Other questions:
  • Which finger types the highlighted keys on a number keypad? A. Third B. First C. Pinky D. Thumb
    7·2 answers
  • Explain how Deep Packet Inspection works (DPI). How is this technology beneficial to Perimeter Security? Lastly, describe a scen
    6·1 answer
  • Can you get financial aid with average grades
    15·1 answer
  • What is the Matlab command to create a column vector with 11 equally spaced elements, whose first element is 2 and whose last is
    8·1 answer
  • Kyle returns to work the next day and he would like to continue working on the document from yesterday. What should Kyle do?
    7·1 answer
  • Do you think Mortal Combat is cool?
    10·2 answers
  • Write a program that reads a list of integers, and outputs whether the list contains all even numbers, odd numbers, or neither.
    5·1 answer
  • Which of the following keywords allows a subclass to access a superclass method even when the subclass has overridden the superc
    9·1 answer
  • How to create create a database in mysql using clv files
    11·1 answer
  • What is the purpose of heading tags?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!