__________ is a backup technique that stores duplicate online transaction data along with duplicate databases at the remote site on a redundant server.

Fill in the blank(s) with the appropriate word(s).


Database shadowing

Computer Science & Information Technology

You might also like to view...

A(n) ____ is a single view of the image that can be edited and optimized.

a. clip b. target c. frame d. icon

Computer Science & Information Technology

When your computer is configured to recognize ________ commands even handicapped people may use it.

a. written b. typed c. voice d. mouse

Computer Science & Information Technology

The ______ report style is used to display a master-detail relationship with the master records above the detail records.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

MC An exception is__________ ,__________ and__________ (in sequential order).

a) handled, thrown, caught. b) thrown, handled, caught. c) caught, thrown, handled. d) thrown, caught, handled.

Computer Science & Information Technology