1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
fgiga [73]
3 years ago
6

______ requires that any electronic communication must be backed up and secured with reasonable disaster recovery infrastructure

.
Computers and Technology
1 answer:
guajiro [1.7K]3 years ago
5 0

SOX requirements requires that any electronic communication must be backed up and secured with reasonable disaster recovery infrastructure.

Sarbanes Oxley (SOX) requires that data security policies are being made, effectively communicated and enforced. This is needed for data security as well as protecting financial data needed for normal operations.

SOX requirements are needed to be met so as to perform compliance auditing.

Find out more at: brainly.com/question/17157670

You might be interested in
Which of the following is the fastest way to open an Access database? a. Right-click the database icon. b. Start Access from the
STALIN [3.7K]

Answer:

C. Double-click the database icon.

5 0
3 years ago
Read 2 more answers
Please Answer Quickly.<br> Match the item on the left with the reason that it is false on the right.
Varvara68 [4.7K]

Answer:

me desculpe mais eu preciso de pontos para ajudr meu irmão autista

5 0
2 years ago
what new technology led to the chaos that spurred the establishment of the federal communications commission?
adelina 88 [10]

Answer:

The digital read Harry quaant

3 0
1 year ago
Your computer has two basic types of software: system software and ________ software.
Elan Coil [88]
Hi!

Our computers will have system software and application software. Application software would be something like a game or just any general purpose app you've downloaded.

Hopefully, this helps! =)
5 0
4 years ago
With respect to PERT and​ CPM, slack A. is a task or subproject that must be completed. B. marks the start or completion of a ta
Wewaii [24]

Answer:

The correct answer is C) With respect to PERT and​ CPM, slack is the amount of time a task may be delayed without changing the overall project completion time.

Explanation:

The CPM (Critical Path Method) method is frequently used in the development and control of projects whose tasks have a fixed duration while the PERT (Program Evaluation and Review Techniques) method is a set of techniques with the same purpose but that allows to work with tasks with estimated probability duration but not deterministic.

Both methods are based on developing a complete scheme that includes all the tasks of a project linked to each other according to their sequence, determining the duration and analyzing different ways of reconfiguring the task planning to optimize the use of the resources of according to the general objectives of the project.

There are tasks that to start performing them must have been completed one or more previous tasks. The overall duration of the project is determined by the Critical Path, which is the sequence of tasks of greater duration. The tasks belonging to the critical path have to be carried out with special care because delays in them would cause delays in the total achievement of the project. That is why these tasks have no slack.

The rest of the tasks have some slack, which is determined by the time that a previous task can be delayed without delaying the total time of completion of the project, that is, not exceeding the duration determined by the critical path.

That is that why we say that the <em>slack</em><em> is the amount of time a task may be delayed without changing the overall project completion time</em>.

8 0
3 years ago
Other questions:
  • Write a program that estimates the approximate number of times the user’s heart has beat in his/her lifetime using an average he
    12·1 answer
  • With dhcp, a device borrows, or ____ an ip address while it is attached to the network.
    6·1 answer
  • Try writing pseudo code that describes how your device uses input data to perform the action that you want.
    9·1 answer
  • ____ is another term for document properties.
    12·1 answer
  • Machines may aid in making work easier over a longer distance. true or false.
    7·1 answer
  • Please help explain this calculator code.
    15·1 answer
  • Describe PROM, EPROM and EEPROM memories​
    7·1 answer
  • Question 7 (True/False Worth 3 points)
    8·2 answers
  • What are some positive and nevative aspects of technology?
    11·1 answer
  • You can merge the cells using the rowspan and colspan attribute of the tag <br> true or false​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!