__________ is a backup technique that stores duplicate online transaction data along with duplicate databases at the remote site on a redundant server.
Fill in the blank(s) with the appropriate word(s).
Database shadowing
Computer Science & Information Technology
You might also like to view...
MC An exception is__________ ,__________ and__________ (in sequential order).
a) handled, thrown, caught. b) thrown, handled, caught. c) caught, thrown, handled. d) thrown, caught, handled.
Computer Science & Information Technology
A(n) ____ is a single view of the image that can be edited and optimized.
a. clip b. target c. frame d. icon
Computer Science & Information Technology
When your computer is configured to recognize ________ commands even handicapped people may use it.
a. written b. typed c. voice d. mouse
Computer Science & Information Technology
The ______ report style is used to display a master-detail relationship with the master records above the detail records.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology