Which of the following utilities is used to recover in the event of loss or damage?

What will be an ideal response?


Back Up Database

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. Each column in a table must have a name. 2. When you create a database table, you must specify a data type for each column. 3. The table row designated as the primary key must hold a unique value for each column. 4. The table column designated as the primary key must hold a unique value for each row.

Computer Science & Information Technology

The data that you enter into an online form is collected by a program that runs on the Web site's ____________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

A nice performance feature of lazy evaluation is the ability to perform________ evaluation, that is, to stop processing the stream pipeline as soon as the desired result is available.

a. premature b. short circuit c. terminal d. intermediate

Computer Science & Information Technology

All revisions in a Word document fall into one of two categories: ________ and deletions

Fill in the blank(s) with correct word

Computer Science & Information Technology