1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Pani-rosa [81]
3 years ago
11

Your company's data center has suffered a recent power outage, and corporate applications were unavailable for two days. You hav

e been asked to craft a strategy to quickly continue operations in the event of another outage. What type of availability (HA/DR/FT) would you recommend and why?
Computers and Technology
1 answer:
Goryan [66]3 years ago
5 0

Answer:

I would recommend HA.

Explanation:

HA stands for high availability. High availability is recommended because it has the power to be consistent or operational for a great amount of time. It is one of the features of a system whose objective is to make sure that operational performance is higher than it would be normally. Such a system works by having multiple components and checking regularly to see if each of the components are working fine, in a situation were it isn't, a component that is working well will be switched to.

You might be interested in
Explain computer software in detail with the help of proper examples
Brums [2.3K]
Computer software, or simply software, is a part of a computer system that consists of data or computer instructions, in contrast to the physical hardware from which the system is built. In computer science and software engineering, computer software is all information processed by computer systems, programs and data. Computer software includes computer programs, libraries and related non-executable data, such as online documentation or digital media. Computer hardware and software require each other and neither can be realistically used on its own.
8 0
3 years ago
How do you determine which type of operating system that best supports your computer or mobile device?
kirill115 [55]
Run a compatibility check on your computer to check it or ask a tech professional what os they think would be compatible 
4 0
3 years ago
Reading log of any book with page numbers​
Ostrovityanka [42]

Answer:

index

Explanation:

its in the index?

6 0
3 years ago
Windows stores information from the Credential Manager application in secure folders called
Delicious77 [7]

Windows stores information from the Credential Manager application in secure folders called<u> VAULTS.</u>

<u></u>

Explanation:

  • A credential vault is a database used to store passwords and similar cryptographic key material.
  • The most common data stored in a credential vault are current and historical passwords to privileged accounts.
  • All credentials are saved in special folders on the computer, a place called Vaults. Moreover, you can back up all credentials to a file and restore them on to different computer.
  • Vault is a shareware program that acts as a bank vault, or safe, where you can keep you private information or files hidden and secure.
  • Everything in the vault is protected with an advanced encryption, and requires a password (your password) to open the vault to access the information.
8 0
3 years ago
This is a python program.
denpristay [2]

Answer:

word = input("Type your name: ")

print(len(word))

Explanation:

The len function will count all the chars in the string.

7 0
3 years ago
Other questions:
  • How does the mantle interact with the tectonic plates at a convergent boundary?
    14·2 answers
  • A lamp outside a front door comes on automatically when it is dark, and when someone stands on the doormat outside the front doo
    7·1 answer
  • What does FLUX do when soldering an electrical joint?
    13·2 answers
  • Short notes on Supply chain Management System (SCMS)
    12·1 answer
  • MEOWWWWWRARRARARARARRA
    5·1 answer
  • Is anyone a robIox moderator?
    13·2 answers
  • A python program for the following output using for loop.
    13·1 answer
  • An animation of a person standing with their arms extended out to their sides. There are 3 dimensional boxes around the torso of
    5·1 answer
  • Most of the energy we use originally came from:
    8·1 answer
  • ________ helps in determining the cause of a security threat in an incident response plan. Question 7 options: A) Restricting sy
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!