1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
JulsSmile [24]
3 years ago
8

​Suppose your computer network was compromised in a large scale virus attack last Thursday. Most of the data files got corrupted

beyond repair. The last data backup was done the Sunday before the virus attack. This means your company has an adequate backup process in place.a. Trueb. False
Computers and Technology
1 answer:
vivado [14]3 years ago
8 0

Answer: False

Explanation: The focus in this question is on the backup. The virus is just used to describe loss of data. The important things to note are the days of the virus attack and the last backup. If it is to be assumed that this company functions every generally accepted working day (Monday to Friday) to say the least, that would mean that all the company data from Monday to Thursday would be lost. The purpose of a backup is most importantly for situations such as the aforementioned virus attack. If the company is unable to recover the latest possible data before the attack, then the backup process is NOT adequate. A more more adequate backup process would be a daily backup process at the end of work hours if the backup process is a rigorous one that could impede work, or even an hourly light backup that runs as a background process while work continues. That way, much data won't be lost.

You might be interested in
Which best describes a VPN?
aleksandr82 [10.1K]

A private connection through a private network

8 0
2 years ago
Read 2 more answers
A “greedy algorithm” sometimes works well for optimization problems???
mrs_skeptik [129]
An optimization problem is one in which you want to find, not just a solution, but the best  solution •<span>A <span>“greedy algorithm” sometimes works </span></span><span>well for optimization problems </span>•<span>But only a few optimization problems can </span><span> be solved by the <span>greedy method</span></span>
5 0
3 years ago
Calcule o resultado em cada caso atividade de matemática poder me ajudar<br><br>​
Phoenix [80]

Answer:

I do not understand can you type in English?

Explanation:

7 0
3 years ago
Do you think our attitude (whether positive or negative) is something we are born with or that we have power to control within o
Rom4ik [11]

Answer:

I think your attitude is something you develop

Explanation:

I think you develop your attitude and that effects the way you respond to something like if you've got a bad attitude and something bad just happened you tend to lash out and get mad or something but if you have good attitude and something bad just happened you would either brush it off or stay calm and fix it and there are a ton of different ways people react to different situations those were just examples I think your attitude is effect by the way you were raised if you were raised in a bad family your attitude would probably be mean or something.

5 0
3 years ago
You notice that it’s very easy to confuse medications at the community health center where you’re working. They are lined up on
Bezzdna [24]

Answer:

The answer is design systems to prevent errors.

Explanation:

This system helps to prevent medication errors with resultant patient harm and cost. The best would be if the community health center could afford systems that use information technology  such as computerized physician order entry, automated dispensing, barcode medication administration, among other technological solutions.

8 0
3 years ago
Other questions:
  • What are the differences between levels 1, 2 and 3 cache memoroes??
    8·1 answer
  • You can encrypt individual files, but microsoft recommends encrypting at what level?
    9·1 answer
  • Give big-O estimate for the number of operations (multiplication or addition) used in the following algorithm segment (ignore co
    15·1 answer
  • Statement: There are two files. One file, "badIP_list.txt" has a listing of known bad IP addresses. These addresses were extract
    8·1 answer
  • 3. The term integration refers to the ability to
    6·1 answer
  • Which precaution should be taken when working inside computer systems??
    9·1 answer
  • 2. What is data redundancy?
    14·1 answer
  • What is the Microsoft excel window where you work on. And it composed of three worksheet?​
    7·1 answer
  • ARGENT !!20 POINTS <br> А ________ translates commands from a computer to draw lines on paper.
    10·2 answers
  • Is permanent software programmed into read-only memory.<br> Firmware<br> JavaScript<br> PHP<br> o
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!