1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
JulsSmile [24]
4 years ago
8

​Suppose your computer network was compromised in a large scale virus attack last Thursday. Most of the data files got corrupted

beyond repair. The last data backup was done the Sunday before the virus attack. This means your company has an adequate backup process in place.a. Trueb. False
Computers and Technology
1 answer:
vivado [14]4 years ago
8 0

Answer: False

Explanation: The focus in this question is on the backup. The virus is just used to describe loss of data. The important things to note are the days of the virus attack and the last backup. If it is to be assumed that this company functions every generally accepted working day (Monday to Friday) to say the least, that would mean that all the company data from Monday to Thursday would be lost. The purpose of a backup is most importantly for situations such as the aforementioned virus attack. If the company is unable to recover the latest possible data before the attack, then the backup process is NOT adequate. A more more adequate backup process would be a daily backup process at the end of work hours if the backup process is a rigorous one that could impede work, or even an hourly light backup that runs as a background process while work continues. That way, much data won't be lost.

You might be interested in
How does limiting a company's scope benefit the company?
Alika [10]
If a company only focuses on a few things,they become a niche player in the market,therefore can demand a higher price because they are experts at only a few things.
8 0
4 years ago
Read 2 more answers
Complete the sentence.
mojhsa [17]

Answer:

its a network

Explanation:

that is how it is called

7 0
3 years ago
A MAC Frame format has a Preamble of 7 octet pattern in the form of alternating 1s and 0s used by a receiver to establish synchr
erastovalidia [21]

Answer:

The answer is "10101010".  

Explanation:

Description of the above question as follows:

  • Encryption with Manchester is a bit transmission method that makes synchronizing the receiver with the sender simple.
  • It splits each bit time frame into two, ensuring that the signal levels are always transient in the middle of each bit.
  • The encoding of Manchester explains the first byte of the frequency signal pattern, which produced in the preambles which are given in the attachment.

6 0
3 years ago
A ______ object is used for displaying the results of a question based on stored data.
LekaFEV [45]

Answer:

B. report

Explanation:

Report is used to show the result of data base quires or stored data contain useful data use in decision making and analysis.

It is also called a report generator, it is a part of database management system that is used to extract information from one or more files and present it in specific format.

4 0
3 years ago
If I Uninstall Nba 2k 19 from my ps4 will my career be gone forever?​
Rudik [331]

Answer:

Not unless you have a ps plus membership

Explanation:

Ps plus have cloud storage so if you have ps plus membership,even if you delete 2k19 your data will be saved in the cloud storage therefore your my carrer will not be gone forever!

7 0
3 years ago
Read 2 more answers
Other questions:
  • I need HELP ASAP! 30 POINTS to the RIGHT answer.
    12·2 answers
  • Function templates ___________.
    5·1 answer
  • What type of accessory device can be used to measure AC current with a VOM without opening the circuit? A. Split inductor B. Amp
    13·1 answer
  • How would you use Microsoft Excel to
    10·2 answers
  • Create a Python dictionary that returns a list of values for each key. The key can be whatever type you want.
    9·1 answer
  • Point out the wrong statement.
    10·1 answer
  • To configure a router/modem, what type of IP interface configuration should you apply to the computer you are using to access th
    10·1 answer
  • Write the code (from to )using for loop andif elseif statementto accept themobile phone numbersof200 residents of Dubaiasstringa
    15·1 answer
  • An employee is working on building a new computer application for a friend. For this purpose, he uses the software that is regis
    5·1 answer
  • Computers are used because they :
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!