1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
musickatia [10]
3 years ago
14

Shawn works at the local electrical company in Nampa, ID, which provides electricity to the entire city of Boise. This area is p

rone to floods, high winds, and tornados. As the lead enterprise architect on the night shift, Shawn has been asked to suggest ways the company can protect its information MIS infrastructure. Shawn notices that the company does not have the ability for its systems to respond to unexpected failures or crashes and there is not a backup system that can automatically take over without a loss of serve to Boise residents. What should Shawn recommend his company implement
1. accesbility
2. moore's law
3. antivirus software
4. fault tolerance
Computers and Technology
1 answer:
Andreas93 [3]3 years ago
3 0

Answer:

Fault tolerance

Explanation:

Fault tolerance is the property that enables a system to respond to unexpected failures or system crashes while maintaining proper operation during the event of the failure of some of its components.

You might be interested in
How does design influence the product's function?
r-ruslan [8.4K]
I think the answer is
8 0
3 years ago
provides an automated method for discovering host systems on a network. Although it doesn't necessarily discover all weaknesses,
Oxana [17]

Answer:

Network scan

Explanation:

Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.

Generally, a security assessment is carried out by network security experts on a regular basis to determine potential loopholes or vulnerabilities in the information and technology (IT) infrastructure. One of the techniques or approach used in security assessment is a network scan.

A network scan is a security assessment technique used for the automatic detection of host systems on a network. Although a network scan isn't capable of discovering or detecting all the weaknesses on a network, it avails users information about the computer systems that are active on the network and what services the computer systems offer or what ports are available on them.

3 0
3 years ago
Once you have saved a block of text for easy insertion in other documents, it will show up where?
kherson [118]
Click file and look up the name
7 0
3 years ago
What do all social media sites have in common? (Must check all that apply)
Georgia [21]
* <span>They all engage users with fun or interesting features.
*</span><span>They encourage people to participate.</span>
3 0
3 years ago
A copyright gives the exclusive legal right to the original author or creator to print, publish, perform, record, or produce mat
KatRina [158]

Answer:                

True.                                

Explain: TRUE                                                  

4 0
3 years ago
Read 2 more answers
Other questions:
  • Which key removes all data from an active cell with one click
    7·2 answers
  • Tonya is working with a team of subject matter experts to diagnose a problem with her system. The experts determine that the pro
    14·1 answer
  • A wireless _____ area network is designed for devices in an area up to 50 kilometers (31 miles) using rf or infrared transmissio
    5·1 answer
  • Ebba received a message from one of her tech support employees. In violation of company policy, a user had downloaded a free pro
    14·1 answer
  • Privacy Group of answer choices must be respected if we are to function as complete, self-governing agents is an absolute value
    5·1 answer
  • Which list method allows elements in a sequence to be removed and added at either end of the structure?
    6·2 answers
  • 8.7 lesson practice question 1
    13·1 answer
  • You receive an email that appears to legitimately be from your Bank. The email indicates the need for verification of your infor
    15·2 answers
  • Which of the following is NOT one of the three main ways to control a program when writing code?
    6·2 answers
  • What was software for modems that connected through phone lines called?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!