1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
astraxan [27]
3 years ago
10

What factors are most important when planning for disaster and recovery?

Computers and Technology
1 answer:
BARSIC [14]3 years ago
7 0

Answer:

1 Procure sturdy devices. 2 Deleting old backups. 3 Physically distant backup location. 4 Regular backups.

Explanation:

mark brainliest pls am dying for it ಥ‿ಥ

You might be interested in
Cybersquatters:_________.
ZanzabumX [31]

It should be noted that cybersquatters b. register domain names for famous trademarks or company names to which they have no connection remain connected to popular Web sites.

<h3>What is Cybersquatting?</h3>

Cybersquatting  can be explained as  registering as well as selling a domain name with the so that one can benefit from goodwill of someone else's trademark.

It serves as a practice of buying up domain names which is operating on names of existing businesses.

Learn more about Cybersquatting at;

brainly.com/question/21400963

8 0
2 years ago
Took some photos today for photography class what do you think??
Grace [21]

Answer:

good

Explanation:

8 0
3 years ago
Read 2 more answers
Mobile Device Company (MDC) discovers that defamatory statements about its policies and products are being posted in an online f
dexar [7]

Answer:

MDC should process in Court

Explanation:

4 0
3 years ago
How long is a subnet mask? (Please select one of the four options)
kolezko [41]

Answer: 32 bits

Explanation:

 The subnet mask basically contain 32 bits number which performed various function in terms of mask in the IP address. There are mainly two types IP address that are:

  • Host port
  • Network port

The 32 bit is the mask that is used for the host networking address in the single IP address. If the string represent 1, it means that the subnet mask is the part of the network.  

 

5 0
3 years ago
1) SuperFetch is a memory-management technique that a) determines the type of RAM your system requires. b) makes the boot-up tim
Ira Lisetskai [31]

Answer:

c

Explanation:

It preloads the apps and softwares that you use most into thr memory so that they can boot up faster.But it consumes more ram.

5 0
3 years ago
Other questions:
  • Which of the following advertisements is most likely a legitimate job advertisement?
    14·2 answers
  • Describe IT infrastructure. What is the role of business intelligence in determining the technology needs of a business?
    11·1 answer
  • James gets a job at a multinational corporation. On his first day at work, he finds out that the numerical code assigned by the
    10·1 answer
  • Defensive driving is when you use driving strategies to minimize risk and help avoid accidents.​
    8·1 answer
  • Suppose that the domestic production of computer games creates enjoyment for those who play the games. Domestic production of co
    14·1 answer
  • What are different types of inner classes ?
    8·1 answer
  • C. Compare Mainframe and Minicomputers with their key features<br><br><br><br>plzzz help ​
    12·1 answer
  • Explain the iterative nature of the database requirements collection, definition, and visualization process.
    14·1 answer
  • 1.
    15·1 answer
  • ______________ memory is a small, high-speed, high-cost memory that servers as a buffer for frequently accessed data
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!