1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rosijanka [135]
3 years ago
14

A stock trading company had the budget for enhancing its secondary datacenter approved. Since the main site is a hurricane-affec

ted area and the disaster recovery site is 100 mi (161 km) away, the company wants to ensure its business is always operational with the least amount of man hours needed. Which of the following types of disaster recovery sites should the company implement?
a. Hot siteb. warm sitec. cold sited. cloud-based site
Computers and Technology
1 answer:
Katyanochek1 [597]3 years ago
4 0

Answer: a) Hot site

Explanation: Hot site is the location that is present in the off-site in which the organization can continue the business process during any disaster. This site provides the organization with all the required equipment and elements to carry on the work at regular basis such as data backups, computer system, communication devices etc.

Other options are incorrect because warm site is used for recovering the business process while major data center goes out of service, cold site takes long time to recover the functioning of the business from off-premises and cloud based site is the site where resources and services are provided to consumer through internet facility.

You might be interested in
Salvado has a flash dish of is GB
exis [7]

Answer:

About 1,655 files or exactly 1655.646315789473684210526315785

1578

Source(s):

1.5 gb = 1,500 mb<---wrong right --->1536

Explanation:

6 0
2 years ago
How many discussion posts must you complete to meet the Expectations of the replies category
Dennis_Churaev [7]

Answer:

I want to take this time to discuss a few expectations and helpful information about how to participate in the weekly online discussions. You can scroll down the page or use the links here to navigate to each section.  All Discussions can be found by clicking on the Discussions link located on the left-hand side of the course.

Explanation:

Participation in the discussion forums is critical for maximizing student learning in this course, both because your participation is graded and because it's a chance to engage in a dialogue about course material.  In this course, students are required to be a part of an online community of learners who collectively interact, through discussion, to enhance and support the professional performance of each other. Part of the assessment criteria for the course includes evaluating the quality and quantity of your participation in the discussion forum.

The TAS will facilitate student discussions, although they likely will not address every single post. In most cases, they might share a related idea, intervene when the discussion goes off-track, or tie student comments together to help deepen student learning.  Remember, if you have a specific question, pose

3 0
2 years ago
Now the y0utube home screen is gone
erik [133]

Answer:

oh no thanks not good

Explanation:

did you try it on a different device mabye a phone

7 0
3 years ago
Read 2 more answers
Importing data is sending data to a new file.Is this true or false
Kipish [7]

false homie I gotcho


3 0
3 years ago
Read 2 more answers
What is a primary risk to the Workstation Domain, the Local Area Network (LAN) Domain, and the System/Application Domain
eimsori [14]

It should be noted that a primary risk to the Workstation Domain is the absence of a firewall and unauthorized access to the workstation.

<h3>What is a workstation domain?</h3>

The Workstation Domain simply means an individual user's computer where his or her work takes place. It should be noted that computers operating systems have vulnerability which can be susceptible to hackers.

A primary risk to the Workstation Domain is the absence of a firewall and unauthorized access to the workstation.

Learn more about workstation on:

brainly.com/question/26097779

8 0
2 years ago
Other questions:
  • what is a massive online storage that allows for access by any Internet connected device running a web browser and is used for l
    7·1 answer
  • What authentication protocol is ticket-based and is used by windows computers that are members of an active directory domain?
    13·1 answer
  • Implement the function pairSum that takes as parameters a list of distinct integers and a target value n and prints the indices
    11·1 answer
  • Identify the layout in which you will be able to view and edit the header and footer
    12·1 answer
  • Which part of a computer takes the text and pictures on your screen and prints them onto paper?
    6·1 answer
  • Web crawlers or spiders collect information from Web pages in an automated or semi-automated way. Only the text of Web pages is
    10·1 answer
  • Given that two int variables, total and amount, have been declared, write a loop that reads integers into amount and adds all th
    11·1 answer
  • Your company has a wireless network for its small office network. The wireless network does not broadcast its service set identi
    11·1 answer
  • A store trying to analyze the behavior of its customers will often maintaina two-dimensional array A, where the rows correspond
    6·1 answer
  • It is possible to limit the search results to a range of publication dates.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!