The transfer of transaction data in real time to an off-site facility is called ____.
A. off-site storage
B. remote journaling
C. electronic vaulting
D. database shadowing
Answer: B
Computer Science & Information Technology
You might also like to view...
Which method determines if a JCheckBox is selected?
a. isSelected b. getSelected c. selected d. None of the above
Computer Science & Information Technology
Using computer systems to launch a terrorist attack is an example of which of the following?
A) Computer-based espionage B) Information warfare C) Cyber terrorism D) Hacktivism
Computer Science & Information Technology
______________ is a tool that can help in visualizing and structuring data
Fill in the blank(s) with correct word
Computer Science & Information Technology
What term describes one or more characters following the last period in a filename, such as .exe, .txt, or .avi?
A. File name B. File extension C. File version D. File path
Computer Science & Information Technology