To supplement backup procedures, businesses and other organizations should have a(n) ____.

A. insurance plan
B. continuation rule
C. disaster recovery plan
D. survival guide


Answer: C

Computer Science & Information Technology

You might also like to view...

Access can build complete databases or retrieve data from tables of existing databases

Indicate whether the statement is true or false

Computer Science & Information Technology

Internet addiction is the excessive use of the Internet for gaming, video, web surfing, and so on.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When using IAM to control access to your RDS resources, the key names that can be used are case sensitive. For example, aws:CurrentTime is NOT equivalent to AWS:currenttime.

a. true b. false

Computer Science & Information Technology

A ____ specifies the rules for the markup language so browsers can render the content correctly.

A. DTD B. plug-in C. property D. file inspector

Computer Science & Information Technology