1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
djverab [1.8K]
3 years ago
12

Your company has decided to store data files in Cloud Storage. The data would be hosted in a regional bucket to start with. You

need to configure Cloud Storage lifecycle rule to move the data for archive after 30 days and delete the data after a year. Which two actions should you take?
Computers and Technology
1 answer:
Natasha_Volkova [10]3 years ago
7 0

1. Necessary backup from cloud storage to client workstation or desktop or pc.

2. Delete 30 day and one year data from cloud storage.

<u>Explanation:</u>

Purging the data is used in database where necessary backup and purging the data up to certain years. So that database is access will be faster.

At cloud storage it has very limited storage's and by increasing storage will cost more to company or organization, as best practices every 30 day the purge old data should done in cloud storage's and with necessary backup  to be taken as precautionary measurement.

Once data is completed more than one year, with necessary backup delete old year data from cloud storages. Some cases old dead account where been deactivated also can deleted depends of organizations policy.

You might be interested in
How many references should you have ready to list if an employer asks for them? a. 1-3
Leno4ka [110]
Best to have as many as possible. However usually 3
8 0
3 years ago
Company ABC has always used passwords to protect the highly confidential information in their company. Recently, someone who was
Leno4ka [110]
Company ABC should use passwords but also have them use a code so that not just anyone can get in. Kinda like facebook.
3 0
3 years ago
What is the main function of an operating system​
alina1380 [7]

Here are the main functions of an operating system:

1) Manage the resources of the device

The operating system controls how much of each resource is distributed, and it controls things like the processing unit and memory.

2) Establish a interface for the user of the device

The operating system must classify what the classes of the script/code have to do and what they implement.

3) Service application software

The operating system must service each application that is downloaded onto the device. It must balance it's use of storage between apps.

4 0
3 years ago
Jason Chang is creating photos of his restaurant for a new website. Some of the photos of the staff have red eye, others are bad
Nadusha1986 [10]

It is okay to modify photos digitally to improve their appearance as long as it doesn't show what they aren't producing.

<h3>What is Advertisement?</h3>

This is the act of persuading people to buy goods and services and is usually done with the aid of the media.

Pictures are usually taken which have to be in the best shape and quality in order to entice people to buy the goods thereby bringing about higher sales and profit for the company.

Read more about Advertisement here brainly.com/question/1020696

7 0
2 years ago
Protocol 2 - Check for Errors
Lapatulllka [165]

Please note that the Problem to be solved from Protocol 1 is not provided hence the general answers. To construct and send, open a network environment a single multi-packet message, simply click "Add Packet" and then click "Send at Once".

<h3>How will the receiver know the order of the packets or if any are missing?</h3>

If the text or message sent does not make any reading sense, or if certain words are jumbled and out of place, then it is clear that something is wrong.

If the messages arrive in a coherent fashion, then the packet was fully received.

<h3>How will the receiver request missed packets and what will the sender do in response?</h3>

Where the users are familiar with the Transmission Control Protocol, lost packets can be detected when there is a timeout. Lost packets are referred to as Dropped packets.

Learn more about Packets at:
brainly.com/question/17777733

7 0
2 years ago
Other questions:
  • , = , ?<br><br>) ..(++ &lt;= );<br><br>) ..(++ &lt;= );​
    10·1 answer
  • The text discusses three different steps when processing input. Which of the following is (are) one of those steps? (Check all t
    8·1 answer
  • What does the following code print out? (10 points) int[] array = { 1, 4, 3, 6, 8, 2, 5}; int what = array[0]; // scan the array
    14·1 answer
  • Although “dog.jpg” and “dog.JPG” and “Dog.jpg” and “DOG.JPG” all appear to be the same file, they are not considered the same wh
    6·1 answer
  • What are procedures that help keep a data base current
    7·2 answers
  • How do mass and social media differ
    8·1 answer
  • Mingji is working to transfer photos from her digital camera to her computer. While
    11·1 answer
  • Savings accounts _____.
    15·1 answer
  • Need help with this please
    13·1 answer
  • 12. Fill in the blanks: In a ____________, the root of the tree is labeled _______________, children of the root are the names o
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!