1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rosijanka [135]
3 years ago
14

A stock trading company had the budget for enhancing its secondary datacenter approved. Since the main site is a hurricane-affec

ted area and the disaster recovery site is 100 mi (161 km) away, the company wants to ensure its business is always operational with the least amount of man hours needed. Which of the following types of disaster recovery sites should the company implement?
a. Hot siteb. warm sitec. cold sited. cloud-based site
Computers and Technology
1 answer:
Katyanochek1 [597]3 years ago
4 0

Answer: a) Hot site

Explanation: Hot site is the location that is present in the off-site in which the organization can continue the business process during any disaster. This site provides the organization with all the required equipment and elements to carry on the work at regular basis such as data backups, computer system, communication devices etc.

Other options are incorrect because warm site is used for recovering the business process while major data center goes out of service, cold site takes long time to recover the functioning of the business from off-premises and cloud based site is the site where resources and services are provided to consumer through internet facility.

You might be interested in
What field in a TCP segment is used to determine if an arriving data unit exactly matches the data unit sent by the source?]
MrRa [10]

Answer:

The correct answer to the following question will be "Checksum".

Explanation:

A variable that reflects the amount of several bits in a transmitted packet and is used by practitioners of IT to spot heavy-level anomalies in the transmission of data, known as Checksum.

  • After executing a cryptographic hashing algorithm each piece of information or a document could be allocated a value of checksum before delivery.
  • We are relevant because we are using them to verify the authenticity of the documents.

So, it's the right answer.

3 0
3 years ago
Create an Entity-Relationship Diagram with the following requirements.
melamori03 [73]

Answer:

idk

Explanation:

6 0
3 years ago
Signe wants to improve the security of the small business where she serves as a security manager. She determines that the busine
jek_recluse [69]

Answer:Obscurity

Explanation: Security through the obscurity is the mechanism that is used for the security purpose in an operating system by inducing the confidentiality in the internal parts of the operating system.

The functioning of the security through obscurity(STO) works by hiding the  flaws and errors related to security  of the operating system.Thus , Signe is willing to use obscurity system.

 

6 0
4 years ago
Select the statement that best describes the function of the cell wall. O it gives shape to plants cells. O it produces food fro
Maslowich
It’s jelly like fluid surrounds the nucleus
8 0
3 years ago
____________ is used by IM and other applications that provide voice services over lower-speed digital circuits.
zimovet [89]

Answer:

The correct answer is Adaptive differential pulse code modulation

Explanation:

Adaptive differential pulse code modulation (ADPCM) is a variant of differential pulse-code modulation (DPCM) that varies the size of the quantization step, to allow further reduction of the required data bandwidth for a given signal-to-noise ratio. The output data rate can be dynamically adjusted between 16 kbit/s and 64 kbit/s in these applications.

6 0
3 years ago
Other questions:
  • Use the image below to answer this question.
    14·1 answer
  • What is the biggest disadvantage of copying a worksheet into another workbook?
    13·1 answer
  • Double clicking a word selects the entire word?
    10·1 answer
  • What part of a check is the LEAST important?
    14·2 answers
  • Hydraulic systems use liquids because _____.
    14·2 answers
  • ____ is the dubious practice of registering a domain name and then trying to sell the name for big bucks to the person, company,
    5·2 answers
  • Pls help it’s on a test!! no links :) you can zoom in if hard to read
    15·1 answer
  • You were just hired as an IT Specialist for Smalltown School District. Your first assignment is to review a problem area& in
    11·1 answer
  • I need to send this in ASAP
    6·2 answers
  • What can be used to help diagnose and fix computer hardware problems?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!