________ is an integral part of business continuity planning, but BCP is much broader

Fill in the blank(s) with correct word


Disaster recovery

Computer Science & Information Technology

You might also like to view...

Match each item with a statement below.

A. software installed on a computer that produces pop-up ads using your browser B. a code used to identify and authenticate a person or organization sending data over a network C. A program that is potentially harmful or potentially unwanted D. type of spyware that tracks your keystrokes, including passwords E. an attack that can be used to crack a long password by trying words and word combinations F. the practice of tricking people into giving out private information or allowing unsafe programs into the network or computer G. when someone who is unauthorized follows the employee through a secured entrance to a room or building H. A type of malware that tricks you into opening it by substituting itself for a legitimate program I. a computer that has been hacked, and the hacker is using the computer to run repetitive software in the background without the user's knowledge J. an infestation designed to copy itself repeatedly to memory, on drive space, or on a network

Computer Science & Information Technology

When you decide on the correct instructions for a program, you are developing the program's ____.

A. logic B. syntax C. data file D. data entities

Computer Science & Information Technology

When you begin with the individual facts and save your conclusions until the end of your presentation, you are using _____ organization.

A. sequential B. inductive C. deductive D. spatial

Computer Science & Information Technology

The hostname command will show you the NetBIOS names of the other computers on your network.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology