1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
alekssr [168]
2 years ago
6

How do big organizations take back their data to be reviewed after a disaster?

Computers and Technology
1 answer:
Jet001 [13]2 years ago
4 0
Here a 5 step recovery plan, I have been in IT for 8 years

1. Create a disaster recovery team.

The team will be responsible for developing, implementing, and maintaining the DRP. A DRP should identify the team members, define each member’s responsibilities, and provide their contact information. The DRP should also identify who should be contacted in the event of a disaster or emergency. All employees should be informed of and understand the DRP and their responsibility if a disaster occurs.

2. Identify and assess disaster risks.

Your disaster recovery team should identify and assess the risks to your organization. This step should include items related to natural disasters, man-made emergencies, and technology related incidents. This will assist the team in identifying the recovery strategies and resources required to recover from disasters within a predetermined and acceptable timeframe.

3. Determine critical applications, documents, and resources.

The organization must evaluate its business processes to determine which are critical to the operations of the organization. The plan should focus on short-term survivability, such as generating cash flows and revenues, rather than on a long term solution of restoring the organization’s full functioning capacity. However, the organization must recognize that there are some processes that should not be delayed if possible. One example of a critical process is the processing of payroll.

4. Specify backup and off-site storage procedures.

These procedures should identify what to back up, by whom, how to perform the backup, location of backup and how frequently backups should occur. All critical applications, equipment, and documents should be backed up. Documents that you should consider backing up are the latest financial statements, tax returns, a current list of employees and their contact information, inventory records, customer and vendor listings. Critical supplies required for daily operations, such as checks and purchase orders, as well as a copy of the DRP, should be stored at an off-site location.

5. Test and maintain the DRP.

Disaster recovery planning is a continual process as risks of disasters and emergencies are always changing. It is recommended that the organization routinely test the DRP to evaluate the procedures documented in the plan for effectiveness and appropriateness. The recovery team should regularly update the DRP to accommodate for changes in business processes, technology, and evolving disaster risks.



summary :an organization must develop a recovery team to create a disaster recovery plan that includes identifying and assessing disaster risks, determining critical applications, and specifying backup procedures. Other procedures may be included in the plan based on the organization. The recovery team and organization must then implement the DRP and follow through on the plan procedures. The DRP should be continually tested and maintained to consistently prepare the organization for evolving disasters and emergencies.
You might be interested in
If you're doing a relational comparison, which filter would be available?
taurus [48]

Answer:

C. Number

Explanation:

If you're doing a relational comparison, a number filter would be available.

7 0
3 years ago
Which program or security application prevents access between a private and trusted network, and other untrusted networks?
zavuch27 [327]

The answer is a firewall. A firewall is capable of blocking unwanted and/or unauthorized connections from accessing either your computer or your entire network thereby resulting in data loss and information theft.

7 0
3 years ago
Read 2 more answers
TLO 06 Active Directory Domain and Trusts tool is used to move servers between site in an AD Infrastructure.a. Trueb. False
Elan Coil [88]

Answer:

b. False

Explanation:

Active Directory Domain and Trusts tool is used for the following operations:

1. To increase the domain functional level

2. To increase forest functional level

3. To add UPN suffixes

4. To manage domain trust

5. To manage forest trust.

Hence, the correct answer is: it is FALSE that Active Directory Domain and Trusts tool is used to move servers between site in an AD Infrastructure

4 0
3 years ago
Which features would work well for text entered into cells? Check all that apply.
yKpoI14uk [10]

Which features would work well for text entered into cells?

All the features given apply to text entered into a cell.

thesaurus , spelling , autosum , average , find , replace​

Explanation:

  • The tasks are referred to as basic tasks and include such operations as inserting and typing over, copying and moving items, finding and replacing text, undoing and redoing commands, checking spelling and grammar, using the thesaurus, and using formatting tools.
  • A thesaurus is used on a computer while writing an e-mail, letter, or paper to find an alternative meaning for words. For example, repeating the same word throughout your writing can become repetitive to a reader, and you could use a thesaurus to get a synonym of the word
  • Spelling is defined as the proper way to write a word, using the correct order of letters. This feature is provided by Excel for the cells.
  • AutoSum is a Microsoft Excel and other spreadsheet program function that adds together a range of cells and displays the total in the cell below the selected range.
  • The AVERAGE function calculates the average of numbers provided as arguments. To calculate the average, Excel adds the numbers together and divides by the total number of values supplied.
  • The
  • Microsoft Excel FIND function returns the location of a substring in a string. The search is case-sensitive. The FIND function is a built-in function in Excel that is categorized as a String/Text Function.
  • The Microsoft Excel REPLACE function replaces a sequence of characters in a string with another set of characters. The REPLACE function is a built-in function in Excel that is categorized as a String/Text Function. It can be used as a worksheet function (WS) in Excel.
4 0
4 years ago
Read 2 more answers
The class at the top of exception class hierarchy is ..........................
Lynna [10]

Answer:

<u>B) Throwable</u>

Explanation:

Great question, it is always good to ask away and get rid of any doubts that you may be having.

There are a wide range of classes on the exception class hierarchy. All the way on the top is the Objects Class but since that is not an available answer we will move on to the next one. The next one is the <u>Throwable</u> class. therefore that is the answer.

**Exception is after Throwable , and Arithmetic Exception is at the bottom.... everything is a class so that is not a part of the hierarchy **

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
3 years ago
Other questions:
  • What is the recommended size for bulleted text?
    5·2 answers
  • The computer component that makes sure that instructions are decoded and executed properly is the ___________.
    11·2 answers
  • David has created a lot of styles and now his Quick Style Gallery contains styles he no longer uses.
    14·2 answers
  • Tweaking existing technology in a new way is usually called _____. leveraged creativity state-of-the-art breakthrough applicatio
    5·1 answer
  • Public class Square extends Shape{
    13·1 answer
  • Is there any quantum computer in India?​
    9·1 answer
  • A human interest story is an example of hard news.<br> O True<br> O False HEL
    15·1 answer
  • Create a method called letterGrade that will pass the student's average grade as a parameter and return a letter grade (char). O
    12·1 answer
  • Which key combination should you use
    9·2 answers
  • 2 red and 2 overlapping balls in the center are surrounded by a green, fuzzy, circular cloud with a white line running through i
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!