The needs and policy relating to backup and archive should be determined ______.

a. as a final step
b. during the system planning stage
c. during security testing
d. after recording average data flow volume


b. during the system planning stage

Computer Science & Information Technology

You might also like to view...

A computer forensics examiner is about to conduct a forensics examination of a computer’s hard drive and anticipates that he will be cross-examined in a deposition. What should the examiner do to ensure that the image he takes of the computer’s hard drive is an exact copy of the hard drive?

a. Reconcile the numbers of files and directories on the original and copied image b. Perform SHA-1 and MD5 checksums of the original drive and the copied image c. Use a write blocker when making a copy of the original drive d. Make a copy of the hard drive and perform forensics on the original

Computer Science & Information Technology

Briefly describe some common CSS style tools that developers have handy so that they do not need to recreate the same CSS for each Web site they build.

What will be an ideal response?

Computer Science & Information Technology

Many word processing documents use ____________________ character fonts, where some characters are wider than others.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

F2 is the shortcut for Dreamweaver Help.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology