1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Svetlanka [38]
3 years ago
15

What term is the ability to restore service quickly and without lost data if a disaster makes your components unavailable or it

destroys data
Computers and Technology
1 answer:
oksian1 [2.3K]3 years ago
8 0

Answer:

"Recoverability" is the appropriate solution.

Explanation:

  • The above refers to either the DBMS work timetables where only certain processes are conducted out only when all transactions where such modifications are learned by the submission are implemented or operated.
  • This technique is used to reinstate make informed even without system failures.
You might be interested in
Tiling is when a browser loads a background image and then repeats the image in both the vertical and horizontal directions unti
jeyben [28]
The correct answer is true
7 0
3 years ago
Read 2 more answers
Software created according to user choice​ true or false
solniwko [45]

Answer:

True

Explanation: so that everything we want is available that is why we can customize our interface.

3 0
3 years ago
What evaluates variables that search engines use to determine where a URL appears on the list of search results?
RSB [31]

Answer:

The correct answer is "Search engine ranking".  

Explanation:

The search engine is also known as an Internet search engine that is developed for searching the website or the web. The search engine is a type of software system. When we search anything into the web there are so many website or related links are appeared the Search engine ranking means on searching on the top which is appeared or which appeared in bottom simply it gives the position of the searching web.

The main objective of the Search engine ranking to determine where a URL appears on the list on searching into the web.

6 0
3 years ago
Apart from the challenges of heterogeneity, business and social change and trust and security, identify other problems and chall
Klio2033 [76]

Answer:

The challenge of cost control

The challenge of competence

The challenge of reduced system delivery times.

Explanation:The Challenge of Cost control is a major challenge affecting the software engineering in the 21st century,the cost of Microchips and other hardware are constantly rising.

The challenge of competence is another major challenge affecting software engineering in the 21st century,as most software engineers lack the required competence to handle some of the issues facing softwares.

The challenge of reduced system delivery times is a major challenge likely to affect software engineering in the 21st century,as people required the software to be available in the shortest possible time.

7 0
3 years ago
A programmer is debugging an action-adventure game they have just created.
svlad2 [7]

By trying the moves and decisions that players of the game will be unlikely to make is a good strategy for debugging a game so the answer is option A : Yes, because making unexpected moves is likely to test the game's limits.

<h3>How does a programmer debug a program?</h3>

Debugging as defined in computer programming  is known to be a kind of a  multistep procedure which involves the act of knowing a problem, and also isolating the origin of the problem, and lastly one can correct the issue or know a way to work around the issue.

Note that the last step of debugging is to test the correction that was made or one can  workaround and make sure that it works or functions well.

Hence, By trying the moves and decisions that players of the game will be unlikely to make is a good strategy for debugging a game so the answer is option A : Yes, because making unexpected moves is likely to test the game's limits.

Learn more about debug  from

brainly.com/question/15079851

#SPJ1

4 0
1 year ago
Other questions:
  • 9. In Electronic Codebook (ECB): a. The message is broken into independent blocks which are encrypted b. The message is broken i
    6·1 answer
  • ___________ is an unsecured client server application / protocol that transfers files between two computers.
    11·1 answer
  • Sorting and filtering are two ways to blank data
    14·1 answer
  • What device provides ports to allow a laptop to easily connect to a full-sized monitor, keyboard, ac power adapter, and other pe
    11·1 answer
  • What are the five Ws?<br> (I don’t even know what this means)
    5·2 answers
  • What is the output?
    11·1 answer
  • The format that you will use on your works cited page when the entry is longer than one line is__________.
    5·1 answer
  • Describe the method used by operating systems to differentiate between TCP connections.
    15·1 answer
  • Create a program that prompts the user for a positive integer then prints a right-aligned pyramid using that number using the st
    10·1 answer
  • Which code snippet is the correct way to rewrite this in Semantic HTML?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!