1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
JulsSmile [24]
3 years ago
8

​Suppose your computer network was compromised in a large scale virus attack last Thursday. Most of the data files got corrupted

beyond repair. The last data backup was done the Sunday before the virus attack. This means your company has an adequate backup process in place.a. Trueb. False
Computers and Technology
1 answer:
vivado [14]3 years ago
8 0

Answer: False

Explanation: The focus in this question is on the backup. The virus is just used to describe loss of data. The important things to note are the days of the virus attack and the last backup. If it is to be assumed that this company functions every generally accepted working day (Monday to Friday) to say the least, that would mean that all the company data from Monday to Thursday would be lost. The purpose of a backup is most importantly for situations such as the aforementioned virus attack. If the company is unable to recover the latest possible data before the attack, then the backup process is NOT adequate. A more more adequate backup process would be a daily backup process at the end of work hours if the backup process is a rigorous one that could impede work, or even an hourly light backup that runs as a background process while work continues. That way, much data won't be lost.

You might be interested in
Janice usually works on a particular workbook that contains all business related data. She decides to keep a backup of all the d
quester [9]

The answer is to use the Ctrl and C keys on the keyboard to copy content from one workbook to another.

The Ctrl and C key is the standard combination keys on the keyboard that is used to copy any selected text or objects while in a user interface environment. Janice is required to press the C key while holding down the Ctrl key to copy all the content to the new workbook.

Another way of doing it is to make sure that both source and target workbooks are open. Navigate the sheets you want to copy or move in the source workbook. Click the Home tab and select then format dropdown in the Cells group. Select move or copy sheet option in the Organize sheet option. Choose the target workbook from the To Book dropdown and click OK.

6 0
3 years ago
Read 2 more answers
What is security in Technology<br>​
maria [59]

Answer:

IT security is a set of cyber security strategies that prevents unauthorized access to organizational assets such as computers, networks, and data.

3 0
3 years ago
Read 2 more answers
What do we call exceptions to the exclusive rights of copyright law?
Studentka2010 [4]

Answer:

Fair use

Explanation:

I don't know if this is correct but Its the best option.

4 0
3 years ago
Moore's Law states that the number of transistors on an integrated circuit? increases by 20% every year
qaws [65]
Doubles every two years
3 0
3 years ago
Create 3 individual measures that calculate the 1, 3, and 5-year enrollment growth rates (percentages). a. The measures should b
Inessa [10]

IN THIS QUESTIONS MAKING PROGRAMMING

5 0
3 years ago
Other questions:
  • When saving a document or drawing, you determine the destination folder in which the file will be saved by?
    6·1 answer
  • C2.5 - A group of four pirates has a treasure chest and one unique lock and key for each pirate. Using hardware that is probably
    6·1 answer
  • What xDSL version provides a maximum throughput of 24 Mbps downstream and 3.3 Mbps upstream?
    9·1 answer
  • Which of the following operating systems is able to join a domain a) Microsoft office pro b) Microsoft surface R.T. c) google an
    9·2 answers
  • Define the following BASIC terms:<br> 1. Keywords<br> 2. Constants<br> 3.Variables
    8·1 answer
  • Which of the following is considered a basic task in the context of computer operations? a. Connecting to the Internet b. Natura
    6·1 answer
  • Dr. Thomas likes to follow up with her patients to make sure they were happy with their care. She sends all patients an email en
    14·2 answers
  • An Acceptable Use Policy (AUP) are designed for the purpose of _____.
    6·1 answer
  • A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their f
    13·1 answer
  • Can someone be my friend,don't friend me until i ask you Questions
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!