1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
grandymaker [24]
3 years ago
10

Assume you are a security professional. You are determining which of the following backup strategies will provide the best prote

ction against data loss, whether from disk failure or natural disaster: Daily full server backups with hourly incremental backups Redundant array of independent disks (RAID) with periodic full backups Replicated databases and folders on high-availability alternate servers Answer the following question(s): Which backup strategy would you adopt? Why?
Computers and Technology
1 answer:
BlackZzzverrR [31]3 years ago
6 0

Answer: if you have data that is lost then you need to find the things you have deleted and get that data back

Explanation:

You might be interested in
A proxy is
salantis [7]

Answer:

C. an authorization of a registered stockholder to another person to act in their place at the meeting

Explanation:

  • The proxy server acts as a gateway between you and the Internet.
  • it is a Intermediate Server separates users from browsing websites
  • Therefore, the proxy here refers to allowing someone to act on their behalf. In the case of the company, the proxy allows another person to act on behalf of the registered stockholder at company meetings.
4 0
3 years ago
A specified group of banks get together and agree to use a blockchain for wholesale settlement of interbank transfers. This is m
Minchanka [31]

Answer:

Permissioned

Explanation:

In this scenario, specified group of banks got together and joined forces by agreeing to use a blockchain for wholesale settlement of all interbank transfers. Thus, this is most likely an example of a permissioned blockchain.

8 0
3 years ago
PLEASE HELP!!! ILL MARK BRAINLIEST!!
xz_007 [3.2K]

Answer:

1. Copyright.

2. Trademark.

3. Patent.

Explanation:

A patent can be defined as the exclusive or sole right granted to an inventor by a sovereign authority such as a government, which enables him or her to manufacture, use, or sell an invention for a specific period of time.

Generally, patents are used on innovation for products that are manufactured through the application of various technologies.

An intellectual property can be defined as an intangible and innovative creation of the mind that solely depends on human intellect.

Simply stated, an intellectual property is an intangible creation of the human mind, ideas, thoughts or intelligence. They include intellectual and artistic creations such as name, symbol, literary work, songs, graphic design, computer codes, inventions, etc.

Basically, the three (3) main ways to protect an intellectual property is to employ the use of the following;

1. Copyright: protects the specific expression of a creation.

2. Trademark: protects signs, symbols, names, or short phrases that reveal the origin of a product or service.

3. Patent: protects the idea underlying a creation.

7 0
3 years ago
What command is used to request the name and address information from a dns server?
topjm [15]
Nslookup is deprecated in favor of dig
7 0
4 years ago
An academic or professional blog would be especially useful in which of the following fields?
Vesna [10]
Blogs, even academic and professional, are not usually considered reliable sources. Most importantly, that's because they don't undergo the peer review process, which ensures the quality of the published papers (that they don't publish lies, in simple words).

So usually, you would prefer a published paper.

When then would you use a blog?
One such instance is when you want to find out about a quickly changing field , for example the newest standards in software development. So software engineering is one such field.

Another field is internet protection and security, as the viruses and the ways to defend against them also develop faster than can be published in a paper
7 0
3 years ago
Read 2 more answers
Other questions:
  • Write code to print the location of any alphabetic character in the 2-character string passCode. Each alphabetic character detec
    8·1 answer
  • How many occupational groups are there in the SOC system?
    12·1 answer
  • Given that note, write a program which tells us the major scale starting at that note, using the pattern above. In the main bloc
    6·1 answer
  • What are the buisness debts called?
    7·1 answer
  • ___ allow users to select controls by keyboard shortcuts. (Points : 3) Alternative keys
    13·1 answer
  • A representation of something by using a description, summary or image.
    7·1 answer
  • Which model represents any process in general?
    6·1 answer
  • Who invented pascaline and when?​
    11·2 answers
  • Integrated circuits incorporate many transistors and electronic circuits on a single tiny silicon chip, allowing ____ to be even
    15·1 answer
  • us refe rence: so 1 ac 2 2. describe the applications for merged documents in terms of the following benefits 2. describe the ap
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!