1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
motikmotik
3 years ago
5

If the individual accessing the system for disaster recovery purposes were not familiar with the IT system and required system a

dministrator logon credentials, what additional step would be required in the recovery phase?
Computers and Technology
1 answer:
Alisiya [41]3 years ago
4 0

Explanation:

Recovery phase is the last phase in any disaster recovery process.

According to the given situation it is better to call System administrator so that the system is recovered properly which even avoids damage of important data stored in the system.

Always it is important to keep credentials for important data or system to avoid unauthorized access. So in the recovery phase, the System administrator would login with the credentials and check for possibility of recovering maximum data out of the system.

You might be interested in
Since the 1960s, there have been five major generations, or cycles, of computing. Which represents those generations in order?
sergiy2304 [10]

Answer:a) Mainframes, miniframes, PCs, desktop Internet computing, mobile computing

Explanation: The hierarchy of the computers or computing are in the generation is:-

  • Mainframe:-designed for the execution of huge data processing , storage and execution.
  • Miniframe:-has similar functioning as the mainframe but on smaller scale and version.
  • Personal computer(PC):-It is designed for the individual purpose and according the need of the user.
  • Mobile computing:-computing that can be done on the mobile phone similar to the computing on the personal computer
  • Internet computing:-the computing of the mobile and computer system with the facility of the internet connectivity.

7 0
3 years ago
You have a notebook computer and wish to connect to an IEEE 802.11ac wireless network. The computer does not have a built-in WLA
BARSIC [14]

Answer:

Wireless USB 2.0

Explanation:

USB ports are available in all modern notebook computers. This makes the wireless USB 2.0 adapter a capable option to solve the network issue.

Wireless USB 2.0 can send 480Mbit/s and 110Mbit/s at a 3meters and 10 meters respectively, it frequency ranges from 3.1GHz to 10.6GHz.

In cases where the internal wireless card is faulty or the computer does not come with a wireless chip inside, the Wireless USB 2.0 is the right option for you to be able to connect over a network efficiently.

5 0
3 years ago
A strong example of using keywords would be a. Using “good” to remember the word “hideous” c. Both of these b. Using “hide” to r
posledela

The answer to the question you have asked is <u><em>"B" . </em></u> Because if you really think about it, there is no possible way that "Good" can be a keyword of "Hideous".

6 0
3 years ago
Assume that ip , jp , and tp have all been declared to be pointers to int and that result has been declared to be an array of 10
natita [175]

Answer:

The code to this question can be given as:

code:

tp = ip;

ip = jp;

jp = tp;

Explanation:

In this question, it is defined that write code for swapping values that swap the pointers, not the values they point to. So in this code, we assume that all the variable and its value is defined. we simply use the swapping rule that is the first value holds in the new variable and second value hold on the first variable and in the last second variable holds the value of the new variable. In this code, the value will be interchanged or swapped.

3 0
4 years ago
To restore a document to the default theme for the template on which the document is based, click the themes button, and then cl
PtichkaEL [24]
Depends on the program you are using

4 0
3 years ago
Other questions:
  • What does the hard disk drive do? It stores all of the information on a computer. It controls a computer’s operating system. It
    12·2 answers
  • Make a program that (i) asks the user for a temperature in Fahrenheit degrees and reads the number; (ii) computes the correspond
    8·1 answer
  • HIPAA requires the following controls for medical records: A. Encryption of all data B. Technical safeguards C. Physical control
    12·1 answer
  • Which type of computer graphic can be blown up to a much larger size without getting distorted or losing quality?
    5·1 answer
  • This is your chance to become the instructor. After learning the looping and input validation concepts, create a problem to give
    13·1 answer
  • g 'write a function that takes as input a list and outs a new list containing all elements from the input
    5·1 answer
  • A total stranger is trolling Jack online. He’s offended and annoyed. How can Jack stop the troll in his or her tracks? (5 points
    10·2 answers
  • What is the setting an alarm clock output??
    10·1 answer
  • Choose the missing words in the code below.
    12·1 answer
  • What is Frederick Taylor attributed to doing
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!