To supplement backup procedures, businesses and other organizations should have a(n) ____.
A. insurance plan
B. continuation rule
C. disaster recovery plan
D. survival guide
Answer: C
Computer Science & Information Technology
You might also like to view...
Access can build complete databases or retrieve data from tables of existing databases
Indicate whether the statement is true or false
Computer Science & Information Technology
Internet addiction is the excessive use of the Internet for gaming, video, web surfing, and so on.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
When using IAM to control access to your RDS resources, the key names that can be used are case sensitive. For example, aws:CurrentTime is NOT equivalent to AWS:currenttime.
a. true b. false
Computer Science & Information Technology
A ____ specifies the rules for the markup language so browsers can render the content correctly.
A. DTD B. plug-in C. property D. file inspector
Computer Science & Information Technology