1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
postnew [5]
3 years ago
8

PL Technologies suffered considerable data loss when its database was infected by a virus. George, an operations personnel, atte

mpts to fix the damage by retrieving information from backed up data. George is involved in the process of ________.
Computers and Technology
1 answer:
Luba_88 [7]3 years ago
6 0

Answer:

Recovery is the correct answer to the given question.

Explanation:

Recovery is used when the data is lost from the database in any issue Database Recovery is giving the data to returning in its consistent state of the database.

When George sees that the  PL Technologies is suffered from considerable data loss due to it is infected by a virus then George retrieving the information and the data by using the recovery process  

You might be interested in
Compare and contrast the following codes of ethics, including a listing of their similarities and differences: The ACM Code of E
galina1969 [7]

Answer:

Please see the explanation

Explanation:

ACM professional code has following characteristics:

Genaral moral Imperative- This further consists of:

Contribute to society and human well being

Avoid harm to others

Be honest and trustworthy

Honor property rights including copyrights and patent

Respect the privacy of other

2) Professional responsibilities

Acquire and maintain professional coompetence

Achieve the highest quality

Accept and provide appropriate professional review

Respect the existing laws

Access computing and communication resources only when authorized to do so.

3) Organizational leadership

Articulate social responsibilities of members of an organizational unit and encourage full acceptance of those responsibilities.

Manage personnel and resources to design and build information systems that enhance the quality of working life.

Ensure that users and those who will be affected by a system have their needs clearly articulated during the assessment and design of requirements; later the system must be validated to meet requirements.

Create opportunities for members of the organization to learn the principles and limitations of computer systems.

4) Compliance with Code

Uphold and promote the principles of this Code.

Treat violations of this code as inconsistent with membership in the ACM.

Software Engineering Code of Ethics and Professional Practice

In accordance with their commitment to the health, safety and welfare of the public, software engineers shall adhere to the following Eight Principles:

Public: Software engineers shall act consistently with the public interest.

Client and Employer: Software engineers shall act in a manner that is in the best interests of their client and employer, consistent with the public interest.

Product: Software engineers shall ensure that their products and related modifications meet the highest professional standards possible.

Judgement: Software engineers shall maintain integrity and independence in their professional judgment.

Management: Software engineering managers and leaders shall subscribe to and promote an ethical approach to the management of software development and maintenance.

Profession: Software engineers shall advance the integrity and reputation of the profession consistent with the public interest.

Colleagues: Software engineers shall be fair to and supportive of their colleagues.

Self: Software engineers shall participate in lifelong learning regarding the practice of their profession and shall promote an ethical approach to the practice of the profession.

Australian Code of Professional Conduct

As an ACS member you must uphold and advance the honour, dignity and effectiveness of being a professional. This entails, in addition to being a good citizen and acting within the law, your conformance to the following ACS values.

1. The Primacy of the Public Interest

You will place the interests of the public above those of personal, business or sectional interests.

2. The Enhancement of Quality of Life

You will strive to enhance the quality of life of those affected by your work.

3. Honesty

You will be honest in your representation of skills, knowledge, services and products.

4. Competence

You will work competently and diligently for your stakeholders.

5. Professional Development

You will enhance your own professional development, and that of your staff.

6. Professionalism

You will enhance the integrity of the ACS and the respect of its members for each other.

In a situation of conflict between the values, The Primacy of the Public Interest takes precedence over the other values.

This Code of Professional Conduct is aimed specifically at you as an individual practitioner, and

is intended as a guideline for your acceptable professional conduct. It is applicable to all ACS

members regardless of their role or specific area of expertise in the ICT industry

All the three codes focus on the public interest, honestl, loyalty, ensuring quality of life, and professional development.

In Australian Code of conduct, in a situation of conflict between the values, The Primacy of the Public

Interest takes precedence over the other values, while there is no such thing in other two codes.

Software Engineering Code of Ethics and Professional Practice includes development of self, that is, Software engineers shall participate in lifelong learning regarding the practice of their profession and shall promote an ethical approach to the practice of the profession, which is not usually seen in other two codes.

5 0
4 years ago
Editing is important because it allows you to
asambeis [7]
Answer A is the answer, as it combines all choices in the list. One can check the overall structure.
8 0
3 years ago
Write Album's PrintSongsShorterThan() to print all the songs from the album shorter than the value of the parameter songDuration
Romashka-Z-Leto [24]

Answer:

Here is the function PrintSongsShorterThan() which prints all the songs from the album shorter than the value of the parameter songDuration.

void Album::PrintSongsShorterThan(int songDuration) const {

unsigned int i;

Song currSong;  

cout << "Songs shorter than " << songDuration << " seconds:" << endl;  

for(int i=0; i<albumSongs.size(); i++){  

currSong = albumSongs.at(i);  

if(currSong.GetDuration()<songDuration){  

currSong.PrintSong();     } } }

Explanation:

I will explain the working of the for loop in the above function.

The loop has a variable i that is initialized to 0. The loop continues to execute until the value of i exceeds the albumSongs vector size. The albumSongs is a Song type vector and vector works just like a dynamic array to store sequences.

At each iteration the for loop checks if the value of i is less than the size of albumSongs. If it is true then the statement inside the loop body execute. The at() is a vector function that is used to return a reference to the element at i-th position in the albumSongs.  So the album song at the i-th index of albumSongs is assigned to the currSong. This currSong works as an instance. Next the if condition checks if that album song's duration is less than the specified value of songDuration. Here the method GetDuration() is used to return the value of duration of the song. If this condition evaluates to true then the printSong method is called using currSong object. The printSong() method has a statement cout << name << " - " << duration << endl;  which prints/displays the name of the song with its duration.

If you see the main() function statement: musicAlbum.PrintSongsShorterThan(210);

The musicAlbum is the Album object to access the PrintSongsShorterThan(210) The value passed to this method is 210 which means this is the value of the songDuration.

As we know that the parameter of PrintSongsShorterThan method is songDuration. So the duration of each song in albumSongs vector is checked by this function and if the song duration is less than 210 then the name of the song along with its duration is displayed on the output screen.

For example if the album name is Anonymous and the songs name along with their duration are:

ABC 400

XYZ 123

CDE 300

GHI 200

KLM 100

Then the above program displays the following output when the user types "quit" after entering the above information.

Anonymous                                                                              

Songs shorter than 210 seconds:                                                                        

XYZ - 123                                                                                                              

GHI - 200                                                                                                              

KLM - 100

Notice that the song name ABC and CDE are not displayed because they exceed the songDuration i.e. 210.

The output is attached.

3 0
3 years ago
I already have an account in this app bt it was uninstall by me bt now i want to log in this app by my Same account.. Bt it is n
Gnom [1K]
If it was uninstalled, most likely, you can't log back in, you are just going to have to make a new one. Of which I see that you already have or you already had one ready.
8 0
3 years ago
In the windows firewall, a __________ arrow in front of the rule indicates that the rule is already enabled
timofeeve [1]

Answer:

Green Check Mark.

Explanation:

A Firewall on a Window’s PC has inbound and outbound rules that are set to either allow or block access to other devices and programs. Inbound rules allow traffic from within the network or outside of the network into your computer while outbound rules is the vice versa from your computer to the network. The rules that have a green check mark means that they are enabled and are currently being used by the firewall while those that have a gray check mark are disabled manually or by default to mean that they are not being used by the Windows Firewall

5 0
4 years ago
Other questions:
  • What is the purpose of interrupts? What is a trap? Can traps be generated intentionally by a user program? If so, for what purpo
    13·1 answer
  • You resurrected an old worksheet. It appears to contain most of the information that you need, but not all of it. Which step sho
    10·1 answer
  • An audit trail is a record of how a transaction was handled from input through processing and output
    10·1 answer
  • 1. Some of the music in the 1960s was used to protest social and political issues. Is music still used as a form of protest? Why
    13·1 answer
  • The use of _______________ can validate input responses from clients and prevent certain attack methodologies
    14·1 answer
  • You are a project manager for Laredo Pioneer's Traveling Rodeo Show. You're heading up a project to promote a new line of souven
    6·1 answer
  • What is the error in the following line: (1)<br><br> age=int(input("Enter your age:")
    5·1 answer
  • a document contains a list of items that appear in no particular order. what is the best way to format the list
    5·1 answer
  • Write a recursive method called, doMyMath, which takes as input any positive integer and calculates the factorial (use comments
    13·1 answer
  • Who is maintain data and time of computer?​
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!