1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rosijanka [135]
3 years ago
14

A stock trading company had the budget for enhancing its secondary datacenter approved. Since the main site is a hurricane-affec

ted area and the disaster recovery site is 100 mi (161 km) away, the company wants to ensure its business is always operational with the least amount of man hours needed. Which of the following types of disaster recovery sites should the company implement?
a. Hot siteb. warm sitec. cold sited. cloud-based site
Computers and Technology
1 answer:
Katyanochek1 [597]3 years ago
4 0

Answer: a) Hot site

Explanation: Hot site is the location that is present in the off-site in which the organization can continue the business process during any disaster. This site provides the organization with all the required equipment and elements to carry on the work at regular basis such as data backups, computer system, communication devices etc.

Other options are incorrect because warm site is used for recovering the business process while major data center goes out of service, cold site takes long time to recover the functioning of the business from off-premises and cloud based site is the site where resources and services are provided to consumer through internet facility.

You might be interested in
If a Web page is not copyright protected, then it is ethical to cut and paste sections of the page into your speech without citi
JulijaS [17]

Answer:

False.

Explanation:

Even if the web page does not have copyright protection it is unethical to cut and paste sections of the page into your speech without citing the source.It is definitely plagiarism.You are copying content from other sources and representing the mas your own.So we conclude that the answer is false.

5 0
3 years ago
Which function would you use to make sure all names are prepared for a mailing label? TODAY UPPER PROPER LOWER
Aleonysh [2.5K]

Answer:

Proper.

Explanation:

5 0
2 years ago
What is a set of javascript statements that result in an action?
AlexFokin [52]

function is the right answer because function is a block of code designed to perform a particular task

4 0
3 years ago
6. Which of the following is malware? (1 point)
marusya05 [52]
Software to damage computers
5 0
3 years ago
Read 2 more answers
What occurs when information is copied from an internet source to another computer?
Margarita [4]
The answer is pasting
3 0
3 years ago
Other questions:
  • What is a device driver?
    9·2 answers
  • A database on a mobile device containing bands, sub-bands and service provider IDs allowing the device to establish connection w
    9·1 answer
  • What is the difference between operating systems and application software?
    6·2 answers
  • Which city is the largest within the Andean and midlatitude countries? A. Buenos Aires, Argentina B. La Paz, Bolivia C. Santiago
    11·2 answers
  • Project: big research project
    15·2 answers
  • Who is the intended audience of a pseudocode document?
    14·1 answer
  • Help me please I’m failing
    11·1 answer
  • Write a program that inputs numbers and keeps a running sum. When the sum is greater than 100, output the sum as well as the cou
    8·1 answer
  • Data is stored on ________ using a laser to either melt the disc material or change the color of embedded dye.
    11·1 answer
  • A(n) __________ is a computer that presents itself as a sweet, tempting target to a hacker but, in reality, is a decoy
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!