1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
deff fn [24]
4 years ago
15

Sarah's Texas location has a server that is starting to give her trouble. It is needing to be restarted frequently and seems to

be very slow. The server is on the replacement schedule and has just overheated, stopped and will not restart. What plan should direct the recovery for this single server
Computers and Technology
1 answer:
frez [133]4 years ago
5 0

Answer:

Hello your question lacks the required options

A) Business impact analysis plan

B) Business continuity plan

C) Disaster recovery plan

D) Recovery point plan

answer : Disaster recovery plan ( c )

Explanation:

The Disaster recovery  plan is a comprehensive creation of a system/set procedures of recovery of the IT infrastructure from potential threats of a company. especially when the interruption is caused by a disaster, accident or an emergency.

The shutting down of the sever due to overheating and not able to restart for Business is an interruption in a critical business process and the plan to direct the recovery for this single server should be the " Disaster recovery plan"

You might be interested in
An outdoor products company wants to test a new website design where customers can get information about their favorite outdoor
ExtremeBDS [4]

Answer:

Option (A) is the right answer for factors.

Option (B) is the right answer for factor levels.

Explanation:

As per the scenario, the company wants to see the effect of their new website design on their customers, for which the factor of time spent on the new website is right because it gives the company to acknowledge the data of time spent by a customer on the new website.

To reach the result of the factor, we have to work on the factor level, in which we will compare the time spent on the old website and the new website because it gives the company an idea of customers preferring which website design.

8 0
3 years ago
]
loris [4]
B. Which promotes a chemical reaction
5 0
3 years ago
To track what level a player is on, you can create a simple variable and a block saying change level by 1 attached to the when g
marishachu [46]

Answer:

False

Explanation:

I did it on edgnuity also i got it right

5 0
3 years ago
Given a positive integer, output its complement number. The complement strategy is to flip the bits of its binary representation
EleoNora [17]

Answer:

var findComplement = function(num) {

   

   var start = false;

       for (var i = 31; i >= 0; --i) {

           if (num & (1 << i)) {//find the leftmost hightest bit 1 and start from there

               start = true;

           }

           if (start) {

               

               num ^= (1 << i);

             

           }

       }

       return num;

};

var findComplement = function(num) {

   var bits = num.toString(2);

   var complement = '';

   for(var i=0;i<bits.length;i++)

   {

       complement += (bits[i]==1?0:1);

   }

   return parseInt(complement,2);

};

Explanation:

The javascript code above would accept a number in the variable complemnt and using the parseint keyword, it converts it to a binary value of that number.

Each bit is converted from the least to the most significant bit, then it is returned to the find compliment function and converted back to an integer.

5 0
3 years ago
Which of the following is planted on an infected system and deployed at a predetermined time?A. Logic bombB. Trojan horseC. Worm
nekit [7.7K]

Answer:

A. Logic Bomb.

Explanation:

A Logic Bomb is a piece of code that is planted in a software system that is infected intentionally to set off malicious function.They are deployed at a predetermined time.

For ex:- a programmer hiding the files that deletes details of the employee who left the company.So these files can never be deleted.

4 0
3 years ago
Other questions:
  • Type the correct answer in the box. Spell all words correctly.
    9·1 answer
  • Which service is used when your email program exchanges messages with the mail server on a distant network?
    5·1 answer
  • Which of the following is a central feature of agroup?interactionmutual influenceinterdependenceall of the given options
    10·1 answer
  • The point of entry from a wireless device to a wired network is performed at a device called a(n) ____________________.
    10·1 answer
  • What are the four steps of the research process?
    13·1 answer
  • What is the minimum number of bits needed to store the decimal value 200?
    12·1 answer
  • What is the best way of farming exotics in destiny?
    12·2 answers
  • The person that includes the most and funniest memes (screenshot from the web) gets brainliest.
    5·1 answer
  • 45 points!!
    15·2 answers
  • A network administrator is importing a list of certificates from an online source, so that employees can use a chain of trust an
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!