data backup should be based on a(n) ____ policy that specifies how long log data should be maintained .

Answers

Answer 1

Data backup should be based on a D. retention policy that specifies how long log data should be maintained.

A data retention policy outlines the specific types of data that an organization should retain and for how long. This is usually based on legal, regulatory, or business requirements. Data backup is a critical component of any data retention strategy.

Backup data is usually stored in a secure, offsite location that is protected against natural disasters and other threats. The backup schedule should be designed to ensure that all critical data is backed up on a regular basis, with more frequent backups for mission-critical data.

The retention policy should specify how long backup data should be maintained, which is usually based on the recovery time objectives (RTO) and recovery point objectives (RPO) of the organization. This ensures that the organization can recover from any data loss event, such as a natural disaster or cyber-attack, within an acceptable timeframe.

Data retention policies should be reviewed and updated on a regular basis to ensure that they are still relevant and effective. A well-designed retention policy can help organizations to minimize the risk of data loss and ensure that they are in compliance with any legal or regulatory requirements that apply to them.

Therefore the correct option is D. retention

Learn more about data retention policy:https://brainly.com/question/30923705

#SPJ11

Your question is incomplete but probably the full question is:

Data backup should be based on a(n) ____ policy that specifies how long log data should be maintained.

A. replication

B. business resumption

C. incident response

D. retention


Related Questions

__________ are a part of big data analytics that allow a company the opportunity to analyze location data from mobile phones of employees.

Answers

Location analytics are a part of big data analytics that allow a company the opportunity to analyze location data from mobile phones of employees.

What is location analytics?

Location analytics is the process of adding a layer of geographic data to a company's data assets to extract more valuable insights. It is sometimes called "geoanalysis". Across industries, business data, including data about people, events, transactions, assets, and more, often includes a geographic component that, when added to performance analytics, can be unlocked. new relevant information. This allows for more context when asking about different business processes, providing new insights into patterns and relationships in the data.

Learn more about location analytics brainly.com/question/29422971

#SPJ4

When staff member is resistant to change, but is open to factual information to support the need for change, what type of behavioral change strategy should the manager use to implement change

Answers

The type of behavioral change strategy that the manager can use to implement change is Positive reinforcement.

What is Positive reinforcement?

This is known to be the introduction of a good or pleasant stimulus after a behavior is said to be displayed.

Note that The type of behavioral change strategy that the manager can use to implement change is Positive reinforcement as desirable stimulus empowers the behavior, making it more likely to occur.

Learn more about Positive reinforcement from

https://brainly.com/question/8517742

#SPJ4

what is your opinion on gaming? do you think it has more positive or negative impacts

Answers

Answer:

positive bc you can learn from them wwhat to do what not to do mistakes that you wont make in. real life

Answer

Positive Impacts

Enhances the Cognitive Functions – The online gamers can improve their cognitive functions by playing online games. The combination of focus and the surges of neurotransmitters will strengthen the neural circuits that make the brain.

Decision-Making and Accuracy – The online gamers can able to make the quick decision. Online gaming trains the brain to take quick decisions without losing the precision. Without any doubt, you can play these games in order to make quick & accurate judgments.

Hand and Eye Function – It is needless to mention that, the online gamers will play their games with the utmost coordination of their hand and eyes. Every online game requires the players to use their hand and eye for the game to be successful.

Enhance the Teamwork – Multiplayer online games will enhance the teamwork among the gamers. The gamers will use the most of their skills to win the game for their team. The gamers will learn about winning the game as a team.

Negative Impacts

Aggressive Behavior – Every player would like to win the game and hence they develop aggressive behavior. The shooting games will induce bad vision to the gamers and the gamers see the society in the same vision.

Loner – Of course, the gamers that spend most of their time in playing online games cannot spend time with their friends and families. If the same thing continues, they want to be alone all the time.

Wrong Values – Certain online games teaches wrong values to the gamers. The online games depict women as weaker characters and sexually provocative characters. The gamers will take that and they do behave badly with the women in reality.

Impact on Health – Yes, the gamers that take part in playing the online games would not like to participate in any such activities that make them fit and fine. Not taking part in the fitness activities leads to health disorders like video induced seizures, obesity, skeletal and postural disorder, never compression, muscular disorder, numbness in shoulders, hands and elbows.

Bad Academic Performance – Playing online games for a long time will create a negative impact on your child’s academic performance. The more your children spend in playing online games, the sooner they fall asleep. Lack of concentration will be an issue to the children that spend more time in playing online games. Some children would fall to the online games and a kind of addiction will happen to them.

Explanation:

Now, I hope that you might have understood the optimistic and pessimistic effects of playing online games. Playing is not a bad one, but you should stick to your limits.

question 2 what are some types of software that you'd want to have an explicit application policy for? check all that apply.

Answers

The types of software that you'd want to have an explicit application policy are:

Filesharing softwarevideo games

Explicit application policy are simply refered to as legal rights that are stated regarding ownership or company. It is actual substance of an agreement

Video games and filesharing software is of not really important in som business. So therefore, having explicit policies showing why or not this type of software is permitted on systems is okay.

Conclusively, we can say that Filesharing software and video games can require an explicit application policy.

Learn more from

https://brainly.com/question/12730075

Assume that in the middle of a transaction, the system crashes,
how can the database contents are recovered? Justify your answer
with any one recovery methods.

Answers

In the event of a system crash during a transaction, the database contents can be recovered using a technique called database rollback and transaction log.

During a transaction, a system crash can occur due to various reasons such as power failure, hardware malfunction, or software issues. When a crash happens, it is crucial to ensure the integrity and consistency of the database contents. One of the recovery methods that can be employed is the use of database rollback and transaction logging.

Database rollback involves undoing any incomplete or uncommitted transactions that were in progress at the time of the crash. This ensures that the database is brought back to a consistent state.

Transaction logging, on the other hand, involves recording all the changes made to the database during a transaction. The log contains a record of all the actions performed, including updates, deletions, and insertions.

When a system crash occurs, the recovery process utilizes the transaction log to determine the state of each transaction at the time of the crash.

The log is analyzed to identify any incomplete or uncommitted transactions, and these transactions are rolled back, effectively undoing their effects on the database. Once the rollback is complete, the database is restored to a consistent state.

Learn more about Transaction log

brainly.com/question/31418102

#SPJ11

There are advantages and disadvantages to using digital media in marketing and advertising. Briefly explain two advantages and one disadvantage.

Answers

Answer:In today’s digital business landscape with the ability to be social across multiple digital platforms, country borders and language barriers, social media has introduced a new method to marketing.

Social media marketing is one of the fastest changing areas of marketing the world has ever seen. The methods used and developed within social media marketing have come a very long way in the past few years. It’s also created serious opportunities for businesses around the world, but there are certain aspects you have to be aware of when you make use of social media marketing for business.

Social media is the fastest (real-time) advertising and tracking marketing mediums there is available. Just as there are advantages for marketing on this medium, there are disadvantages that you as the business owner and you as the marketer (or maybe you are running a small business and are both) should be aware of and not only take notice, but know and understand how it can influence your business in all aspects positively and or negatively.

The analysis

One of the problems with writing and or explaining some of the overall or general advantages and disadvantages of social media marketing is that most of it is different dependent on your business. Some of the key differentials you need to be aware of that will influence the advantages and the disadvantages are:

Your type of business and or service,

Your marketing niche and specialization,

The social media channels used for your marketing and engagement,

Your target market – type, age, demographic, etc.

Demographic and economic in differences in consumers

Explanation:

A blockchain is formed by linking together blank______, data structures containing a hash, previous hash, and data. multiple choice question. blocks genesis blocks cubes

Answers

A blockchain is formed by linking together blocks, data structures containing a hash, previous hash, and data. The correct answer to your multiple-choice question is "blocks." Each block in the blockchain contains a unique hash, which is a cryptographic representation of the data contained within the block.

Additionally, each block also contains the hash of the previous block, which creates a chain-like structure. This linking of blocks ensures the integrity and immutability of the data stored in the blockchain. The first block in a blockchain is called the "genesis block," and subsequent blocks are added in a sequential manner, forming a chain of blocks. So, to summarize, a blockchain is formed by linking together blocks, which are data structures containing a hash, previous hash, and data.

To know more about blockchain visit:

https://brainly.com/question/32952465

#SPJ11

Write a paragraph of 7-10 sentence explaining how a user can navigate throughout ms excel​

Answers

The  paragraph of 7-10 sentence explaining how a user can navigate throughout MS excel​ is:

In an an spreadsheet, click on View > Navigation. The Navigation view will open on the right side of the window. The Navigation view can also be opened from the status bar under the screen.

How do you navigate in Excel?

To move about in between the key areas or places in Excel for the web,  the key to press is  Ctrl+F6 (forward) and also Ctrl+Shift+F6 (backward).

Therefore, The  paragraph of 7-10 sentence explaining how a user can navigate throughout MS excel​ is: In an an spreadsheet, click on View > Navigation. The Navigation view will open on the right side of the window. The Navigation view can also be opened from the status bar under the screen.

Learn more about MS excel​ from

https://brainly.com/question/25879801

#SPJ1

Which do you think is more important: Motorized vehicles like cars and airplanes or computers?

Answers

Answer:

I think computers are more important

Explanation:

The average person drives a vehicle to work to go and work on a computer.

James wants to buy a pair of pants for $60.
When he went to the store he found that the
price was marked down by 20%. How much do
they cost now?

Answers

They cost 48. Used a calculator

If you want to open the Navigation pane to do a Find, what should you first click on the Home tab? Paragraph, Editing, Styles, or View

Answers

Answer:

You would first click view.

Explanation:

hope this helps

Answer:

editing (b)

Explanation:

Based on your answer in task 3, identify skills and competencies required for a
programmer.

Answers

The field of programming requires a range of skills and competencies to be successful like Coding Skills,  Problem-Solving Skills, Logical and Analytical Thinking and many more.

Here are some key skills and competencies that are important for programmers:

Proficient Coding Skills: Strong programming skills in languages such as Python, Java, C++, or JavaScript are crucial. This includes understanding syntax, data structures, algorithms, and problem-solving techniques.Logical and Analytical Thinking: Programmers need to possess strong logical and analytical thinking abilities to break down complex problems into smaller, manageable components and develop efficient solutions.Attention to Detail: Programming often involves working with intricate code, and even minor errors can lead to significant issues. Attention to detail is essential to catch bugs, troubleshoot problems, and ensure code accuracy.Problem-Solving Skills: Programmers are constantly faced with challenges and need to be adept at problem-solving. This involves analyzing problems, identifying solutions, and implementing effective strategies to overcome obstacles.Collaboration and Communication: Programmers often work in teams and need to effectively communicate and collaborate with others. This includes sharing ideas, discussing requirements, and providing clear documentation.Continuous Learning: The programming field is dynamic, with new technologies and frameworks emerging regularly. Programmers should have a thirst for learning and staying updated with the latest trends to adapt to changing requirements.Debugging and Testing: Identifying and fixing errors in code is an essential skill for programmers. They need to be proficient in debugging techniques and conducting thorough testing to ensure the quality and functionality of their programs.These are just a few of the key skills and competencies required for programmers. The field is broad, and different programming roles may require additional specialized skills based on specific technologies or industries. Continuous self-improvement and a passion for coding are also crucial traits for success in programming.

For more such questions on programming

https://brainly.com/question/23275071

#SPJ8

A(n) Blank______ database model stores data in the form of logically related two-dimensional tables. Multiple choice question. warehouse relational real-time

Answers

Answer:

relational database model

Explanation:

Which software is used to play, create, and modify audio and video files?
software is used to play, create, and modify audio and video files.

Answers

Answer:

Adobe premiere pro, Maya.

Explanation:

There are many programs that do the following. I have listed two of the most well known softwares that can do this.

Where do charts get the data series name

Where do charts get the data series name

Answers

Answer:

the answer is row labels

Explanation:

I click a random answer got it correct first try

Answer:

B) Row labels

Explanation:

HELP ASAP WILL GIVE BRAINLY Question 19 Multiple Choice Worth 5 points) (05 03 MC) Network technologies specialist Hannah has been asked allow several machines on different subnets to communicate with each other using broadcasts What does she need to configure? RIP version 1 using Internet Protocol Version 4 (TCP/IPv4) O RIP version 1 using Internet Protocol Version 6 (TCP/IPV6) RIP Version 2 using internet Protocol Version 4 (TCP/IPv4) RIP Version 2 using internet Protocol Version 5 (TCP/IPV6)​

Answers

Network technologies specialist Hannah would need to configure: C. RIP version 2 using Internet Protocol Version 4 (TCP/IPv4).

What is RIP?

RIP is an acronym for Routing Information Protocol and it can be defined as an intradomain routing protocol which is typically designed and developed based on distance vector routing.

The types of RIP.

In Computer networking, there are two main types of Routing Information Protocol (RIP) and these include:

RIP version 1.RIP version 2.

RIP version 2 are generally designed and developed to include subnet masks unlike RIP version 1. Thus, Hannah would need to configure RIP version 2 using Internet Protocol Version 4 (TCP/IPv4) allow several machines on different subnets to communicate with each other using broadcasts.

Read more on routing protocol here: https://brainly.com/question/24812743

In comparing two computers, we execute a benchmark on each and measure the resulting execution times: Computer A: 846 Computer B: 462 How many times faster is Computer B than Computer A

Answers

Answer:

Double faster

Explanation:

It can vary on your options.

After securing your space at the end of the day, you should try to badge back in to ensure it is locked.a. Trueb. False

Answers

Answer:

True

Explanation:

If you need seamless access to the OS, ________ is better.

Answers

i'm sorry i do not know the answer to the question

which mode allows an intrusion detection system (ids) to inspect a copy of every packet on a network?

Answers

The mode that allows an intrusion detection system (IDS) to inspect a copy of every packet on a network is known as promiscuous mode.

How to determine the mode that allows an intrusion detection system?

The mode that allows an intrusion detection system (IDS) to inspect a copy of every packet on a network is known as promiscuous mode.

In this mode, the IDS is connected to a network tap or a switch span port, which allows it to capture and analyze all the packets passing through the network.

By inspecting every packet, the IDS can detect and alert on any suspicious or malicious activity, such as unauthorized access attempts, network scanning, or data exfiltration.

This helps to enhance the security posture of the network and protect against various types of cyber threats.

Learn more about mode

brainly.com/question/30891252

#SPJ11

INTRODUCTION TO JAVA​

Answers

Answer:

INTRODUCTION TO JAVA​

Explanation:

Java is one of the most popular programming languages out there. Released in 1995 and still widely used today, Java has many applications, including software development, mobile applications, and large systems development. Knowing Java opens a lot of possibilities for you as a developer.

Answer:

INTRODUCTION TO JAVA​

Explanation:

Java is one of the most popular programming languages out there. Released in 1995 and still widely used today, Java has many applications, including software development, mobile applications, and large systems development. Knowing Java opens a lot of possibilities for you as a developer.

How does a 3D environment affect the audience's media experience ?

Answers

A 3D media environment simply describes a media production in a 3 dimensional space, with length, width and depth of the object being fully represented.

There is a vast difference between the visual offered by a 3D and 2D media as the depth of the object is missing in the 2D representation.

Hence, 3D media environments are more immersive as it produces much more realistic representation of images, hence increasing entertainment and the level of details.

Hence, the 3D environment offers more in terms of visual effects and pleasure.

Learn more : https://brainly.com/question/20380753

How do you find scope in Python?
I'm sitting here, eating soup and being confused while an assignment's problem stares me in the face.

Answers

Answer:

Variables can only reach the area in which they are defined, which is called scope. Think of it as the area of code where variables can be used. Python supports global variables (usable in the entire program) and local variables.

Explanation:

and lol ..........Local (or function) scope is the code block or body of any Python function or lambda expression. This Python scope contains the names that you define inside the function. ... If the local scope is an inner or nested function, then the enclosing scope is the scope of the outer or enclosing function.

multiprogramming systems are not necessarily timesharing systems. true or false

Answers

The given statement "multiprogramming systems are not necessarily timesharing system" is true because multiprogramming systems refer to a computer system that is capable of running multiple programs simultaneously.

Timesharing systems, on the other hand, refer to a specific type of multiprogramming system that allows multiple users to access the computer system at the same time, with each user having the illusion of having the system to themselves. Therefore, while timesharing systems are a type of multiprogramming system, not all multiprogramming systems are timesharing systems.

On the other hand, timesharing refers to a specific type of multiprogramming system where multiple users can access the same computer system at the same time. In a timesharing system, the CPU switches rapidly between different user sessions, giving the illusion that each user has exclusive access to the system.

Learn more about multiprogramming systems: https://brainly.com/question/14611713

#SPJ11

What message did vera mukhina convey in her work entitled the worker and the collective farmworker?

Answers

Answer:

She glorified the communal labor of the Soviet people

Write a JavaScript program in an HTML document to ask user to enter a class of math marks
(0 – 100) by using a while loop, then when the user enters a negative number, your program
should display the class average to one decimal place.

Answers

Here is a sample JavaScript program depicted in an HTML document that utilizes a while loop to ask the user to enter math marks and thereby compute the class average:

The Program

The calculateAverage() function can be triggered when the user presses "Calculate". It consists of a while loop, within which three variables - sum (total marks), count (number of marks entered) and mark (the current mark being analyzed) are set up.

The cycle continues until a negative number is inserted; it encompasses marks between 0 and 100 (inclusive). As soon as the user inserts an integer below zero, the cycle halts and the average is obtained by dividing the summation by the amount.

The class average is sent to one decimal place through the usage of the toFixed() procedure on the average variable. Lastly, the conclusive result is shown in the HTML record by setting the innerHTML of the segment "result" to a string that involves the class median.


Read more about JavaScript here:

https://brainly.com/question/16698901

#SPJ1

Write a JavaScript program in an HTML document to ask user to enter a class of math marks(0 100) by using

Please any ine help me that what is the fullform of html​

Answers

Explanation:

hypertext markup language

Clunker Motors Inc. is recalling all vehicles from model years 2001-2006. A bool variable named norecall has been declared . Given an int variable modelYear write a statement that assigns true to norecall if the value of modelYear does NOT fall within the recall range and assigns false otherwise. Do not use an if statement in this exercise!

Answers

Answer:

The statement (in Python) is as follows:

recalled = modelYear >=2001 and modelYear <=2006

Explanation:

Required

A statement without an if statement to assign true or false to recalled

Using an if statement, the comparison is

if modelYear >=2001 and modelYear <=2006:

    recalled = True

else:

    recalled = False

To rewrite the statement without using the "if" keyword, we simply equate variable recalled to the stated condition i.e.

recalled = modelYear >=2001 and modelYear <=2006

Note that, we assume that there is an input fo variable modelYear

Question 9 of 10
Which pair of devices work together to allow incoming and outgoing
communications between a predefined set of users?

Answers

The pair of devices that work together to allow incoming and outgoing communications between a predefined set of users are a router and a firewall.

What is a Router?

A router is a network device that connects multiple networks together and forwards data packets between them. It is responsible for directing incoming and outgoing traffic between networks.

A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on a set of predetermined rules. It filters and blocks unauthorized access to the network and allows only authorized users to access the network.

Together, the router and firewall work to ensure that only authorized users can communicate with each other over the network. The firewall filters incoming and outgoing traffic based on the predetermined rules, while the router forwards the allowed traffic to its destination.

Read more about communications here:

https://brainly.com/question/25645043

#SPJ1

What are web protocols.

Answers

Answer:

Web protocols are a set of standards used to exchange information. It ensures that code can be modular and portable.

Answer:

The standard network protocol of the Internet, TCP/IP, stands for Transmission Control Protocol/Internet Protocol. The Internet Protocol part of the standard refers to the addressing of data message packets. Additional protocols that operate within the TCP/IP framework include UDP, HTTP and FTP. Each has different functions and purposes that ultimately work together to provide assorted capabilities through what's currently known as the World Wide Web.

Explanation:     i hope this helps

Other Questions
Read the excerpt from Act III, scene iii of Romeo and Juliet. Friar Laurence: Go hence; good-night; and here stands all your state: Either be gone before the watch be set, 175 Or by the break of day disguis'd from hence: Sojourn in Mantua; I'll find out your man, And he shall signify from time to time Every good hap to you that chances here. Give me thy hand; 'tis late: farewell; goodnight. 180 The dark of night motif used in this excerpt creates a sense of urgency. anxiety. romance. confusion. Katelyn dresses up as a vampire and wants to try out her scare tactics on her roommate, Joan, who has no idea about Katelyn's plans. Katelynapproaches Joan as she is sleeping and whispers menacingly, "I want to suck your blood!" Joan wakes up screaming and crying, terrified that theretruly is a vampire in her room.- battery-assault- intentional infliction of emotional distress Describe the function of the mammalian skin How does the Accenture myNav green cloud integrate sustainability? Between what two whole numbers is the length of thediagonal from M to N in the rectangular prism?HELP ASAP I put a pic. Two cyclists leave towns 105 miles apart at the same time and travel toward each other. One cyclist travels slower than the other. If they meet in hours, what is the rate of each cyclist the more resources to be scheduled in conjunction to perform a service, the the complexity and the likely that an optimum schedule can be achieved. multiple choice question. greater/more less/more greater/less What does Curley's wife think happened to curleys hand What year will it be in 500 years? economic value added (eva) is a means of evaluating corporate performance. true false question. true false Find the value of the expressionj 16.35for j = 20. A composite figure is shown.A five-sided figure with two parallel sides. The shorter one is 16 feet. The height of the figure is 22 feet. The portion from the vertex to the perpendicular height is 6 feet. The portion from a point to a vertical line created by two vertices is 6 feet.Which of the following represents the total area of the figure? 968 ft2 616 ft2 484 ft2. 352ft2 calculator. ( 71) x=2 (a) Select the correct choice below and, if necessary, fill in the answer box to complete your choice. A. The solution set is . (Type an exact answer. Use integers or decimals for any numbers in the expression.) B. The solution is the empty set. (b) Select the correct choice below and, if necessary, fill in the answer box to complete your choice. A. The solution set is (Do not round until the final answer. Then round to the nearest thousandth as needed.) a cold canned drink is left in a warmer room where its temperature rises because of heat transfer. is this a reversible process? explain you are entering a prescription for xeljanz for mrs. robinette into the computer. a message appears stating the prescribed medication is not covered and more information is needed from the prescriber before the drug is covered. what is this an example of? Where does it say when you help someone someone helps you in cesca reward What opera, by Giuseppe Verdi, told a surface story about the plight of the Jews in Babylon, but was really about the Milanese crusade for freedom from Austrian rule After learning about active listening in Unit 3, it is time to put your active listening skills to the test and try them out! For this lab, you will be exploring two different pieces of music using the listening checklist described in the unitand your active listening skills, of course!Start by finding and selecting two pieces of music online. You are free to choose whatever type of music you like: pop, rock, rap, classical, instrumental, etc. Do your best to select something that is as appropriate as possible (i.e., as free as possible from curse words and inappropriate content) as your teacher will be listening to your selections too.Create a word processing document and copy/paste a link for each musical selection in it. Below each music selection, copy/paste or recreate this chart (seen below).Listen carefully to your first musical selection at least twice. Then, fill out the chart based on your listening. Repeat the process for the second musical selection.Download this chart to analyze each piece of music:RTF (Edit) PDF (Print)After you have listened to each music selection and filled out the listening chart for each, its time to do some comparing and contrasting.Write a one- to three-paragraph essay that compares and contrasts the two pieces of music that you listened to. If you need some help with what specific things to compare/contrast, refer to the listening charts that you filled out or the questions below:How do the two musical pieces differ?How are the two musical pieces similar?Were the instruments featured in the two pieces different from each other?What differences or similarities were there in tempo, or speed, of the music?Were there any differences in what you were imagining as you listened to each piece? Did you hear a story in either piece? What emotions were evoked from listening to each song?For information on how you will be graded, please refer to the rubric below. How do I build a successful Uber company? How much to consume less than and ideally less than percent of you calories from saturated fats?