1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
deff fn [24]
3 years ago
15

Sarah's Texas location has a server that is starting to give her trouble. It is needing to be restarted frequently and seems to

be very slow. The server is on the replacement schedule and has just overheated, stopped and will not restart. What plan should direct the recovery for this single server
Computers and Technology
1 answer:
frez [133]3 years ago
5 0

Answer:

Hello your question lacks the required options

A) Business impact analysis plan

B) Business continuity plan

C) Disaster recovery plan

D) Recovery point plan

answer : Disaster recovery plan ( c )

Explanation:

The Disaster recovery  plan is a comprehensive creation of a system/set procedures of recovery of the IT infrastructure from potential threats of a company. especially when the interruption is caused by a disaster, accident or an emergency.

The shutting down of the sever due to overheating and not able to restart for Business is an interruption in a critical business process and the plan to direct the recovery for this single server should be the " Disaster recovery plan"

You might be interested in
1.<br> The correct way to use a seat belt is
Nesterboy [21]

Answer:

4 steps

Explanation:

Step 1: Pull belt across body

Sit in any of your vehicle's seats and secure the three-point harness in its buckle by pulling it across your body.

If the seatbelt is too short, consider an aftermarket restraint and extender. Make sure they meet federal safety standards and are installed professionally.

Step 2: Adjust lower belt

Adjust the lower belt snuggly across your lap and pelvis area – never your stomach.

Pregnant women should wear the lap belt below their belly, not on or above it.

Step 3: Adjust shoulder belt

Adjust the shoulder belt to fit comfortably across the collarbone and chest. It should never rub on your neck or face. Never put the shoulder belt behind your back or under your arm.

Step 4: Check before driving

Check that the belt is secure before driving.

4 0
3 years ago
Write a program to output the following quote by Edsger W. Dijkstra:
adell [148]

Answer:

#include<iostream>

using namespace std;

main(){

cout<<"\*Computer Science is no more about computers \n than astronomy is about telescopes"<<endl;

}

Explanation:

using c++

5 0
2 years ago
Read 2 more answers
, , ,g d,t ,dt m,dt ymtd
maks197457 [2]

Answer:ummm me confused

Explanation:

4 0
3 years ago
Which is true about SSH and Telnet?
MaRussiya [10]

Answer:

Data is encrypted on SSH

Explanation:

Telnet and SSH both are the networking protocols. These protocol are used for the security of data. In telnet data is sent over the link without any encryption. That is the reason, in telnet protocol data is less secure.

In SSH (Security Shell) protocol data has been encrypted before transmission. The encryption of data make it more secure between transmitter and receiver.

So the true statement is that, SSH has data encryption.

8 0
3 years ago
An investigator responsible for tracking e-mail communication would begin by locating what
Ainat [17]
Email headers contains information about email
6 0
3 years ago
Other questions:
  • Internet control message protocol (icmp) is a method of ip address assignment that uses an alternate, public ip address to hide
    7·1 answer
  • Write the definition of a function typing_speed, that receives two parameters. The first is the number of words that a person ha
    9·1 answer
  • Create a calendar named fitness and then display it in a calendar view with the default calendar.
    15·1 answer
  • Tasks:_______.
    7·1 answer
  • Computer piracy occurs when what is violated
    6·1 answer
  • You have purchased a printer that has the capability to print in duplex mode so that users can print on both sides of a sheet of
    7·1 answer
  • Write the definition of a function reverse, whose first parameter is an array of integers and whose second parameter is the numb
    15·1 answer
  • State the functions of all the parts of the computer​
    14·1 answer
  • Which is an example of artificial intelligence in computers? A. multimedia software B. encryption software C. voice recognition
    6·1 answer
  • Complete the procedure for pasting content from a Word document in a message by selecting the correct term from
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!