1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
tatuchka [14]
3 years ago
8

What is the ability for a system to respond to unexpected failures or system crashes as the backup system immediately and automa

tically takes over with no loss of service
Computers and Technology
1 answer:
weeeeeb [17]3 years ago
5 0

Answer:

The appropriate answer will be "Fault Tolerance".

Explanation:

  • This relates to and is therefore a device rather than a program with nothing more than a self-contained contingency mechanism that enables uninterrupted supply when key characteristics fail.
  • A system has been regarded as fault-tolerant although this keeps working satisfactory manner throughout the existence of one and sometimes more circumstances of failure.
You might be interested in
Please help me with my question ​
Ahat [919]

Answer:

1. Template

2. Name of the website

3. Signature of the instructor

3 0
3 years ago
Read 2 more answers
You want to connect an external hard drive for backups. Which is the fastest connection used by current external hard drives
Fynjy0 [20]

Answer:

thunderbold proly

Explanation:

5 0
3 years ago
All of the following are U.S.-EU data privacy requirements except:
Montano1993 [528]

Answer:

b. Redundant hardware and data backup systems

Explanation:

Data privacy is important where a company collects, processes and stores personal information.In the US-EU have laid down regulations to ensure data privacy is maintained. It is a requirement before collection of personal data, to clearly state why the data is being collected and how it will be used.The individuals whose data is being processed have a right to access their data at no cost during processing . Of great importance is the security of the data so as to maintain its integrity, Companies are required to take steps in protecting the data from unauthorized access, processing and accidental loss.redundant hardware and data backup system are used by companies as a fail-safe mechanism in data protection but they are not a requirement in data privacy, although they enhance it.

8 0
3 years ago
You find an artist's illustration on her web site that you want to use for a newspaper ad. This does not violate copyright laws,
Greeley [361]
As long as you cite the artist and website in your sorce page
3 0
3 years ago
Caroline is collaborating with several writers who are creating multiple documents. There is a single list of content that must
Yakvenalex [24]

A Word document can be shared with multiple users by selecting the File menu at the top ribbon and then select Share from the drop down menu

<em>Several writers</em> can work together on Microsoft Word by using the co-authoring, sharing, and co-editing features in MS Word

In order to co-author the content list, Caroline, should

1. Create the content list document

2. Click on <em>Share</em> icon on the top right corner of the document

3. Ensure to save the document in OneDrive

4. Input the email addresses of the other writers who are working on the list

5. Enter a message to the writers to add the title of the content they are working on in the list

When the other writers open the link to the document sent to them in the email they receive, and they open the document in a web browser, by selecting Edit Document > Edit in Browser

The presence of a writer and their real time changes to the content list document, showing the content they are working on are shown by <u>colored flags</u> that has the author (writer) name next to the content they are working on

Learn more about collaboration in Word here:

brainly.com/question/1877453

4 0
3 years ago
Other questions:
  • FOR ALL PLATO USERS:
    10·2 answers
  • You are an IT technician at your company. The company has two small offices in different cities. The company's head office conta
    5·1 answer
  • Where is the quick access toolbar located?
    7·1 answer
  • The security administrator for Corp.com wants to provide wireless access for employees as well as guests. Multiple wireless acce
    13·2 answers
  • Agent Phil Coulson developed this program to register Avengers in S.H.I.E.L.D's database using cutting-edge programming language
    15·1 answer
  • 4. Use the information under the Nutrients That the Human Body Needs title to create a multilevel list. Your list should meet th
    8·2 answers
  • What tasks should a laptop accomplish?
    15·1 answer
  • (Java)Write a program that calculates and displays the conversion of an entered number of dollars into currency denominations—20
    11·1 answer
  • Question #2
    11·1 answer
  • When using the Internet, do not give out your __________ without your parents' permission. (Select all that apply.)
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!