The bulk batch transfer of data to an off-site facility is known as __________.

Fill in the blank(s) with the appropriate word(s).


electronic vaulting

Computer Science & Information Technology

You might also like to view...

Between the Structure and End Structure clauses, you define the ____ included in the structure.

A. members B. objects C. parameters D. structs

Computer Science & Information Technology

Dynamic text can receive text in the form of _____ from a Web server or from an expression in ActionScript.

A. characters B. numbers C. characters or numbers D. characters but not numbers

Computer Science & Information Technology

What two types of attacks are VoIP call managers and VoIP phones most likely to be susceptible to?

A. DoS and malware B. Worms and Trojans C. DoS and host OS attacks D. Host OS attacks and buffer overflows

Computer Science & Information Technology

What does it mean to extrude an object?

What will be an ideal response?

Computer Science & Information Technology