1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
motikmotik
3 years ago
5

If the individual accessing the system for disaster recovery purposes were not familiar with the IT system and required system a

dministrator logon credentials, what additional step would be required in the recovery phase?
Computers and Technology
1 answer:
Alisiya [41]3 years ago
4 0

Explanation:

Recovery phase is the last phase in any disaster recovery process.

According to the given situation it is better to call System administrator so that the system is recovered properly which even avoids damage of important data stored in the system.

Always it is important to keep credentials for important data or system to avoid unauthorized access. So in the recovery phase, the System administrator would login with the credentials and check for possibility of recovering maximum data out of the system.

You might be interested in
To edit the color of the text in Word Online, choose the Font color command under what tab?
sukhopar [10]

Answer:

Home Tab

Explanation:

Font group --- choose the arrow next to Font Color, ---- then select a color.

8 0
3 years ago
A soft news story and a feature story are the same thing.<br> O True<br> O False<br> HELLPP ASSAAAP
bogdanovich [222]
The answer would be False!
5 0
3 years ago
Read 2 more answers
a pair of shoes is on sale for 15% off with this discount customers will pay $9 if they buy the shoes ​
Svetllana [295]

Answer:

do 15% on a calculator then divide by 9

Explanation:

7 0
3 years ago
When you use the .net data provider objects to retrieve data from a database, you can store the data in an object called a?
Ainat [17]
Data set is the object that you can store data.
6 0
3 years ago
If you are referencing cell (C2)in Excel and want to be able to copy the formula and keep using the data in cell C2 in every pla
sergiy2304 [10]

If you are referencing cell (C2)in Excel and want to be able to copy the formula and keep using the data in cell C2 in every place you copy it to, the way to reference the cell? is known to be $C$2.

<h3>What is a cell reference in Excel?</h3>

A cell reference is known to be called a cell address and this is seen as a make up of a column letter and also those of  row number that tells a cell on a worksheet.

Hence, If you are referencing cell (C2)in Excel and want to be able to copy the formula and keep using the data in cell C2 in every place you copy it to, the way to reference the cell? is known to be $C$2.

Learn more about cell referencing from

brainly.com/question/19035038

#SPJ1

8 0
2 years ago
Other questions:
  • Continuous reboots of a Windows host upon encountering a persistent stop error might be caused by Startup and Recovery configura
    10·1 answer
  • Which tab allows you to modify the width of a page margins in Microsoft word?
    7·2 answers
  • The figure below shows a black and white image with a resolution of 720×504. Identify how much memory (in bits) will be occupied
    15·1 answer
  • A peer-to-peer (p2p) network is an example of ________ administration
    5·1 answer
  • sara has just started using the Internet. She would like to be more efficient . In 3-4, give sara some advice about how to be mo
    5·1 answer
  • The character you control enters the Mystic Palace. Once inside, you find that the game’s world turns upside down. Standing on t
    9·2 answers
  • The base 10 number 18 is equal to which base 16 number?<br><br> 10<br><br> 12<br><br> 14<br><br> 16
    11·1 answer
  • Laura is filming a scene in which the subject is sitting with a lit fireplace behind him. The only other source of light in the
    5·1 answer
  • PLEASE SOMEONE PLEASE HELP ME OUT!!!!
    10·2 answers
  • A hacker is trying to gain remote access to a company computer by trying brute force password attacks using a few common passwor
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!