1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
JulsSmile [24]
3 years ago
8

​Suppose your computer network was compromised in a large scale virus attack last Thursday. Most of the data files got corrupted

beyond repair. The last data backup was done the Sunday before the virus attack. This means your company has an adequate backup process in place.a. Trueb. False
Computers and Technology
1 answer:
vivado [14]3 years ago
8 0

Answer: False

Explanation: The focus in this question is on the backup. The virus is just used to describe loss of data. The important things to note are the days of the virus attack and the last backup. If it is to be assumed that this company functions every generally accepted working day (Monday to Friday) to say the least, that would mean that all the company data from Monday to Thursday would be lost. The purpose of a backup is most importantly for situations such as the aforementioned virus attack. If the company is unable to recover the latest possible data before the attack, then the backup process is NOT adequate. A more more adequate backup process would be a daily backup process at the end of work hours if the backup process is a rigorous one that could impede work, or even an hourly light backup that runs as a background process while work continues. That way, much data won't be lost.

You might be interested in
What are the two types of electronic components
IrinaVladis [17]

Answer:

The two type of electronic components are Active components and passive components

Active components are parts of a circuit that rely on an external power source to control or modify electrical signals. ... - Passive components like resistors, transformers, and diodes don't need an external power source to function. These components use some other property to control the electrical signal.

5 0
2 years ago
Read 2 more answers
Write a statement to create a Google Guava Multimap instance which contains student ids as keys and the associated values are st
Sergeu [11.5K]

Answer: provided in the explanation section

Explanation:

Note: take note for indentation so as to prevent error.

So we import com.google.common.collect.Multimap;

import java.util.Collection;

import java.util.Map;

class Main {

   public static void main(String[] args) {

       // key as studentId and List of Profile as value.

       Multimap<String,Profile> multimap = ArrayListMultimap.create();

       multimap.put("id1", new ExamProfile("examStudentId1"));

       multimap.put("id1", new ELearningProfile("userId1"));

       multimap.put("id2", new ExamProfile("examStudentId2"));

       multimap.put("id2", new ELearningProfile("userId2"));

       // print the data now.

       for (Map.Entry<String, Collection<Profile>> entry : multimap.entrySet()) {

           String key = entry.getKey();

           Collection<String> value =  multimap.get(key);

           System.out.println(key + ":" + value);

       }

   }

}

// assuming String as the studentId.

// assuming Profile as the interface. And Profile can multiple implementations that would be

// specific to student.

interface Profile {

}

class ExamProfile implements Profile {

   private String examStudentId;

   public ExamProfile(String examStudentId) {

       this.examStudentId = examStudentId;

   }

}

class ELearningProfile implements Profile {

   private String userId;

   public ELearningProfile(String userId) {

       this.userId = userId;

   }

}

This code is able to iterate through all entries in the Google Guava multimap and display all the students name in the associated students profile.

8 0
3 years ago
Kayla wants to know whether she should set her network up as a WAN or a LAN. What are the three questions you would ask her, and
Ann [662]
Due to it's typically massive size, WAN's are almost always slower then a LAN. The further the distance, the slower the network. One of the big disadvantages to having a WAN is the cost it can incur. Having a private WAN can be expensive.
3 0
2 years ago
What are the names of first generation computers?
KengaRu [80]
EDSAC is the first computer ever
8 0
2 years ago
Which answer choice correctly distinguishes among the three pieces of data?
wolverine [178]

Answer:

a. 1 is a packet, 2 is data, 3 is a frame.

Explanation:

And what is not  mentioned is segment which used TCP/UDP and is part of Transport layer. The packet carries the destination and sender IP address, and is part of the Network Layer. The frame has the Mac address of destination device and senders device and is part of data link layer.

Hence segment has no IP address, hence b. is not correct. Also, data cannot have the IP Address, and Frame has the MAC address, Hence, the above answer. And this arrangement is part of Data Encapsulation.

Also keep in mind data can be anything like a series of bits, or any and it can or not have a header.

7 0
2 years ago
Other questions:
  • A prediction or statement that can be tested is ____
    9·1 answer
  • Five computers are connected to a switch in a star topology. what type of network is this?
    12·1 answer
  • Which database is more secure: the java-based apache derby or mysql?
    6·1 answer
  • COMPUTER ORGANIZATION &amp; ARCHITECTURE I question 3<br> need correct the answers to all
    12·1 answer
  • A unique ability of people which sets them far apart from animals is:
    8·1 answer
  • Please tell me the answer
    5·1 answer
  • Best way to build a model bridge
    5·2 answers
  • Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integer
    6·1 answer
  • Where does change management play a major role in transforming a client
    11·1 answer
  • In _________, the process requests permission to access and modify variables shared with others. a) entry section b) critical se
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!