Answer:
The plan that includes procedures and processes that ensure the smooth functioning of the business even after a disaster is the:
business continuity and disaster recovery plan.
Explanation:
An entity that has good business continuity and disaster recovery plan maintains its full operational activities and processes after a business disaster. After the business disaster, the entity may even grow bigger, because it has identified critical functions and their dependencies for continued growth. While the period is a time of recovery, for business entities that are well-prepared, the recovery period offers a unique opportunity for innovation and rapid recovery and development on all fours: organization, processes, people, and performance.
Answer:
<u><em>Source data entry devices are used for audio input, video input and to enter the source document directly to the computer. Source data entry devices do not require data to be typed-in, keyed-in or pointed to a particular location.</em></u>
Explanation:
<span>A wiki is this type of site. The users can, anonymously or with a profile, add to or delete content already posted. This gives the community the ability to add to the overall knowledge base on a specific subject. The site tracks changes through IP addresses to make sure that changes are not done maliciously.</span>
The access control list searches for patterns in the communication between different packets and responds to any assaults that are found.
<h3>What is the access control list?</h3>
An access control list searches for patterns in the communication between different packets and responds to any assaults that are found.
Based on the IP header data, such as the source or destination IP address, protocol, or socket number, an access control list filters traffic.
Thus, the access control list searches for patterns in the communication between different packets and responds to any assaults that are found.
Learn more about the access control list here:
brainly.com/question/13718195
#SPJ4