1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sweet [91]
3 years ago
15

You need to design a backup strategy. You need to ensure that all servers are backed up every Friday night and a complete copy o

f all data is available with a single set of media. However, it should take minimal time to restore data. Which of the following would be the _________.(a) full backup
(b) incremental backup
(c) snmp (collect & organize data)
(d) priority code point (pcp)
Computers and Technology
1 answer:
cestrela7 [59]3 years ago
8 0

Answer: (A) full backup

Explanation: A backup strategy is a term used to describe the various effective approach engaged in creating a backup for data or information.

A FULL BACK UP IS THE VARIOUS APPROACH AND SYSTEMS PUT IN PLACE BY A COMPUTER USER OR AN INFORMATION TECHNOLOGY EXPERT IN ORDER TO CREATE AN ADDITIONAL SAMPLE OR COPY OF AN INFORMATION OR A DATA IN S SINGLE BACKUP.

You might be interested in
What is the value of creating recurring tasks?
scoundrel [369]

Answer:

✔️saves time spent manually creating multiple tasks

Explanation:

I did it on edge

4 0
3 years ago
Read 2 more answers
You are researching RAM for a computer you are building for a friend who will be using the system as a home office server for he
belka [17]

Answer:

c) ECC

Explanation:

Based on the usage that the friend will have as well as his concern of the computer crashing due to a memory error, we can say that the best type of RAM that he can purchase is ECC memory. These are regular RAM modules but come with error correcting code. This code checks data as it passes through the RAM and auto corrects it if necessary in order to avoid crashes due to memory error.

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

5 0
3 years ago
Have you ever watched Full House? Who is your favorite character and why? EXPLAIN AND ILL GIVE BRAINLIEST!
liubo4ka [24]

Answer:

havent watched it and thanks for this

Explanation:

7 0
3 years ago
Pseudocode for mystry algorithm
kari74 [83]

Answer:

Initially if x = a = 2437 and y = 875,  condition (1) that is x>y is true and output would be x = 1562 with y = 87

Explanation:

According to pseudo code the code will run until x becomes equal to y. Initially if x = a = 2437 and y = 875,  condition (1) that is x>y is true. So next step would be x=x-y and output would be x = 1562 with y = 875. With initial values x = a = 2437 and y = 875, x becomes equal to y after 21 iterations and output is x=y=1

                 X        Y

  1.      2437         875
  2.      1562         875
  3.       687          875
  4.       687          188
  5.       499          188
  6.       311            188
  7.       123           188
  8.       123           65
  9.       58            65
  10.       58             7
  11.       51              7
  12.       44             7
  13.       37             7
  14.       30             7
  15.       23             7
  16.       16              7
  17.        9              7
  18.        2              7
  19.        2              5
  20.        2              3
  21.        2              1
  22.        1               1
8 0
3 years ago
Windows OS and Mac OS are examples of which type of operating system?
german
Windows OS and Mac OS are examples of single user, multi tasking Operating Systems.
5 0
3 years ago
Read 2 more answers
Other questions:
  • Fordham3 Hardware is known for its consensus buying center culture. Recognizing this corporate culture, someone attempting to se
    8·1 answer
  • A Trojan horse is a program that copies itself repeatedly using up resources and potentially shutting down a network. true or fa
    11·1 answer
  • A user calls to report that she is experiencing intermittent problems while accessing the wireless network form her laptop compu
    9·1 answer
  • What does core mean? what are they for?​
    5·1 answer
  • Which of these is one of the primary concerns for protecting your family when online?
    9·2 answers
  • My mom hid my laptop and now I can't find it​
    9·1 answer
  • Write a program get_price.py with a function get_price() that takes a dictionary of fruits as an argument and returns the name o
    6·1 answer
  • Write a qbasic program to design any simple software with output ​
    5·1 answer
  • Owen is writing a program that will lock his computer for one hour if the incorrect password is entered more than five times. Ha
    14·1 answer
  • (True or False) The speed at which data travels on a bus is referred to as the word size.
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!