Answer:
The plan that includes procedures and processes that ensure the smooth functioning of the business even after a disaster is the:
business continuity and disaster recovery plan.
Explanation:
An entity that has good business continuity and disaster recovery plan maintains its full operational activities and processes after a business disaster. After the business disaster, the entity may even grow bigger, because it has identified critical functions and their dependencies for continued growth. While the period is a time of recovery, for business entities that are well-prepared, the recovery period offers a unique opportunity for innovation and rapid recovery and development on all fours: organization, processes, people, and performance.
Answer:
c. Elasticity
Explanation:
When referring to Cloud Servers this capability is known as Elasticity. It basically describes how able and efficient a server is to automatically implement resources and remove resources in order meet the specific amount of demand at any given moment. Many times a server will not have much demand but will still have all the resources being used by the server. Being able to remove these unused resources so that they are available for other usage is what makes the servers elastic.
The hashing function can take any number of key-value pairs and there is no specific limit to it.
<h3>What is hashing?</h3>
Hashing is a file-based algorithm for producing a fixed-length bit string value. A file is essentially a collection of data blocks. The length of the data is reduced by hashing to a fixed number or key that represents the original string.
When hashing is employed, the hash function may plot all of the keys and values to what the real size of the table is, demonstrating that the hashing function can take any number of key-value pairs with no restriction.
However, if the passwords are hashed in encryption, recovering the passwords is extremely difficult.
Thus, the hashing function can take any number of key-value pairs and there is no specific limit to it.
Learn more about the hashing here:
brainly.com/question/13106914
#SPJ1
The type of computer application which apple keynote is, is: c. presentation.
<h3>What is a
presentation application?</h3>
A presentation application can be defined as a type of computer application which is designed and developed to avail its end users an ability to create various slides that comprises both textual and multimedia information, which are typically used during a presentation.
This ultimately implies that, apple keynote is an example of a presentation application which is used on computers.
Read more on presentation application here: brainly.com/question/26404012
#SPJ4
Answer:
In geometry, the area enclosed by a circle of radius r is πr2. Here the Greek letter π represents a constant, approximately equal to 3.14159, which is equal to the ratio of the circumference of any circle to its diameter.
Explanation: