1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetlanka [38]
3 years ago
15

What term is the ability to restore service quickly and without lost data if a disaster makes your components unavailable or it

destroys data
Computers and Technology
1 answer:
oksian1 [2.3K]3 years ago
8 0

Answer:

"Recoverability" is the appropriate solution.

Explanation:

  • The above refers to either the DBMS work timetables where only certain processes are conducted out only when all transactions where such modifications are learned by the submission are implemented or operated.
  • This technique is used to reinstate make informed even without system failures.
You might be interested in
Which statement is true about encoding in Python?
vovangra [49]

Answer:

In Python 3, strings are automatically encoded using Unicode.

Explanation:

i just tookthe test

6 0
3 years ago
Is there such a thing as an ethical reason for unauthorized access into a computer system?
Anastaziya [24]
Of course there is. On a simple level, consider a parent trying to locate their missing child. Someone might break into their social media accounts to see if there are messages that might help determine their whereabouts.

Consider a website hosting inappropriate pictures of children. Breaking into the server hosting the files and removing them is 100% ethical. 

I'm sure you can think of more examples. 
7 0
3 years ago
What are the pros and cons of using ICT​
Setler79 [48]

Answer:

Communication - Speed / time – money can be saved because it's much quicker to move information around. ...

Globalization - Video conferencing saves money on flights and accommodation. ...

Cost effectiveness - It feels free to send an email (although it isn't); it's without doubt cheaper than phone calls.

Explanation:

4 0
2 years ago
Which unit of the computer works as the input​
PolarNik [594]

Answer:

Center Processing Unit ....

4 0
3 years ago
3. A vulnerability is: a. A hacker searching for open ports b. A known attack method c. An incorrectly implemented policy d. All
ELEN [110]

Answer:

A

Explanation:

A hacker searching for open ports denotes vulnerability of computer (to hacking).

Cheers

7 0
3 years ago
Other questions:
  • When employees are hired, they agree to only use cell phones during breaks. How would you classify this?
    8·2 answers
  • "The fact that we could create and manipulate an Account object without knowing its implementation details is called"
    9·1 answer
  • A snail goes up A feet during the day and falls B feet at night. How long does it take him to go up H feet? Given three integer
    8·1 answer
  • How does the access point know whether a wireless data packet is intended for its network?
    14·1 answer
  • Which factors are involved in search engine optimization​
    10·1 answer
  • What steps will add content to a report header section?
    5·2 answers
  • A profit of ₹ 1581 is to be divided amongst three partner P,Q and R in ratio 1/3:1/2:1/5.theshareof R will be?​
    10·1 answer
  • Which of the following screen elements is a horizontal bar that displays at the
    8·1 answer
  • Which generation computer supported GUI operating system?​
    11·1 answer
  • This provides an easy method for workers to use their computers. FAT FAT RAM RAM DOS DOS GUI
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!