The transfer of transaction data in real time to an off-site facility is called ____.

A. off-site storage
B. remote journaling
C. electronic vaulting
D. database shadowing


Answer: B

Computer Science & Information Technology

You might also like to view...

Which method determines if a JCheckBox is selected?

a. isSelected b. getSelected c. selected d. None of the above

Computer Science & Information Technology

Using computer systems to launch a terrorist attack is an example of which of the following?

A) Computer-based espionage B) Information warfare C) Cyber terrorism D) Hacktivism

Computer Science & Information Technology

______________ is a tool that can help in visualizing and structuring data

Fill in the blank(s) with correct word

Computer Science & Information Technology

What term describes one or more characters following the last period in a filename, such as .exe, .txt, or .avi?

A. File name B. File extension C. File version D. File path

Computer Science & Information Technology