1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
gtnhenbr [62]
3 years ago
14

Which plan includes procedures and processes that ensure the smooth functioning of the business even after a disaster?

Computers and Technology
2 answers:
mamaluj [8]3 years ago
8 0

Answer:

The plan that includes procedures and processes that ensure the smooth functioning of the business even after a disaster is the:

business continuity and disaster recovery plan.

Explanation:

An entity that has good business continuity and disaster recovery plan maintains its full operational activities and processes after a business disaster.   After the business disaster, the entity may even grow bigger, because it has identified critical functions and their dependencies for continued growth.  While the period is a time of recovery, for business entities that are well-prepared, the recovery period offers a unique opportunity for innovation and rapid recovery and development on all fours: organization, processes, people, and performance.

Julli [10]3 years ago
4 0

Answer:

<u><em> Business Continuity Plan</em></u>

Explanation:

                                     Sincerely : Baby weeb

You might be interested in
Storage that is wiped clean when power is cut off from a device is known as _____.
Sveta_85 [38]
<span>Volatile. An example would be RAM.</span>
4 0
3 years ago
The _________ indicates the number of elements, or values, an array can hold
Stolb23 [73]
The size declarator indicates the number of elements, or values, an array can hold.It is used in a definition of an array.<span>The size declarator must be a constant integer expression with a value greater than zero. </span>A subscript is used to access a specific element in an array. 
8 0
4 years ago
Information technology has powerful effects on social behavior. Which of the following issues should NOT be expected when intera
AfilCa [17]

Increased inhibitions and a decreased likelihood that all members will contribute to the discussion is the following issues should NOT be expected when interacting with teammates via information technology

b. Increased inhibitions and a decreased likelihood that all members will contribute to the discussion.

<u>Explanation:</u>

In information technology, social behaviour will effect more powerful in industries. In digital medial those use mobile everybody is a media person, easily share the important to social media and sharing person doesn’t aware of the effect of sharing the information.

If a piece of information is received or send both the sender and receiver should be aware of the importance of information make sure it should not be shared outside the group members or the world.

Once import information shared outside the world it can stop any given point time.

6 0
3 years ago
Features of action files​
nadezda [96]

Answer and explanation:

An ".action" file is a file written in Xcode and used by the <u>Automator</u> program, whose function is to create automations in macOS.  Action files contains specific actions that can be combined with other actions to create an automated process.

This type of file is used to automate tasks in <u>macOS</u>, usually with Finder (file manager) or another program.  

Action files are especially useful for repetitive tasks, such as creating sequential batch folders, editing images, or deleting files.

6 0
3 years ago
In the following code, what is the first line that introduces a memory leak into the program?
Fantom [35]

Answer:

The answer is "Line 13".

Explanation:

In the given code first, a header file is included for using basic function, In the next line the main method is defined in this method two-pointer variable is declared that is "numbers1 and numbers2", in which variable numbers1 holds a value that is "NULL".

  • In the next line, both variable uses malloc() function that is used to allocate memory in heap, and in this function, sizeof() function is used that print its size and also increase its value.
  • In the next step, a pointer variable numbers1 assigns a value and another variable numbers2 assigns numbers1 variable value and changes the numbers1 variable.
6 0
4 years ago
Other questions:
  • Where can you access all the formatting options for worksheet cells?
    5·1 answer
  • What is the purpose of a Program Epic?
    7·2 answers
  • What part of the System Model is a Flow Chart primarily developed for?
    9·1 answer
  • X = 19 y = 5 print (x % y)
    11·1 answer
  • SHOW ALL YOUR WORK. REMEMBER THAT PROGRAM SEGMENTS ARE TO BE WRITTEN IN JAVA.
    13·1 answer
  • Write a program that will sort an array of data using the following guidelines - DO NOT USE VECTORS, COLLECTIONS, SETS or any ot
    10·1 answer
  • What is the web page path on the web server for the URL:
    12·1 answer
  • Which are examples of ribbon customizations?
    11·1 answer
  • In your own words, describe invention.
    8·2 answers
  • Assuming a single-processor system, that load and store are atomic, that x is initialized to 0, and that x must be loaded into a
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!