Question 2 (6.67 points)
According to many experts, how often should files be backed up?
Once a week
Once a month
Once a year
Daily

Answers

Answer 1
ANSWER
Once a week
ExPLNATION
Because in one month or more everything can happen and in on day you can not use your file for a day so the correct answer is Once a week

Related Questions

You are configuring shared storage for your servers and during the configuration you have been asked to a supply a LUN. What type of storage are you configuring

Answers

The type of storage you are said to be configuring is storage area network (SAN).

What is SAN storage?

A SAN is known to be a kind of block-based storage that is known to often bring about a high-speed architecture that links servers to their counterparts which are the logical disk units (LUNs).

Note that in the above case, The type of storage you are said to be configuring is storage area network (SAN).

Learn more about configuration from

https://brainly.com/question/24847632

#SPJ1

You are the computer specialist in a small business. Your company server is named FS1 and has an IP address of 10.0.0.2. The hardware in your company server started to experience intermittent failures, so you transferred the shares on the server to a spare server and took the main server offline. The spare server has an IP address of 10.0.0.3. You edit the existing A record for FS1 on your company's DNS server and redirect the hostname to the spare server's IP address of 10.0.0.3. Afterward, most users are able to access the shares on the spare server by hostname, but several users cannot. Instead, they see an error message indicating that the FS1 server could not be found. Enter the command you can run from the command prompt on these workstations that will allow them to access the shares on FS1 without performing a full restart.

Answers

The command for the above case is:

ipconfig /flushdns

Deletes local DNS name cache

What is  system command?

This is known to be a form of a user's instruction that is often given by the computer and it is one that requires for action to be done by the computer's executive program.

Note that The command for the above case is:

ipconfig /flushdns

Deletes local DNS name cache

Learn more about  IP address from

https://brainly.com/question/24930846

#SPJ1

Which type of input devices used in big hero 6 movie

Answers

The  Input Devices Used in Movie Big Hero are:

A joystick medical robot Armored exoskeleton Jet-boots.

What are input device?

This is known to be a is a piece of instrument that helps gives or provide data to any information processing system.

Note that the Input Devices Used in Movie Big Hero “6”  are  a medical robot made by by Tadashi Hamada., Armored exoskeleton and others.

Learn more about input device from

https://brainly.com/question/24455519

#SPJ1

When adopting and implementing a software as a service (saas) platform such as salesforce for your business, which responsibility falls on you, as the client company? managing the platform feature roadmap installing software updates and bug-fixes hosting data storage and backups complying with governance obligations i don't know this yet.

Answers

When adopting and implementing a software as a service (saas) platform such as salesforce for your business, the responsibility falls on you in Hosting data storage and backups.

What is  data storage?

Storage is known to be the  method used in keeping one's data in a secure location that one can be able to access readily.

Hence, When adopting and implementing a software as a service (saas) platform such as salesforce for your business, the responsibility falls on you in Hosting data storage and backups.

Learn more about saas from

https://brainly.com/question/24852211

#SPJ1

Please compose an email back to your client mr. smith, letting him know we are unable to secure the requested reservation at eleven madison park tonight for a party of 2 at 6pm.

Answers

The compose an email back to your client Mr. smith is written above,

Mr Smith,

Manager Venus PLC.

Dear sir,

Issue with requested reservation

I wish to inform you concerning the requested reservation for the eleven Madison park tonight for a party of 2 at 6pm.

The place has been taken by another person as at that time and our request was said to be made too late but there are other options that have been given for  that time but in a letter date.

We are sorry for the inconveniences this may have cause you and we hope to meet you to discuss the way forward.

Thanks for your continuous patronage,

Mr. Rolls.

Manager Madison park

Learn more about Email from

https://brainly.com/question/24688558

#SPJ1

Which web-authoring software enables users to create sophisticated web pages without knowing any html code?.

Answers

Answer: One of the best software

Explanation: Dreamweaver!

Write a program that lists all ways people can line up for a photo (all permutations of a list of strings). The program will read a list of one word names (until -1), and use a recursive method to create and output all possible orderings of those names, one ordering per line.
When the input is:
Julia Lucas Mia -1
then the output is (must match the below ordering):
Julia Lucas Mia Julia Mia Lucas Lucas Julia Mia Lucas Mia Julia Mia Julia Lucas Mia Lucas Julia ------File: main.cpp------
#include
#include
#include
using namespace std;
// TODO: Write method to create and output all permutations of the list of names.
void AllPermutations(const vector &permList, const vector &nameList) {
}
int main(int argc, char* argv[]) {
vector nameList;
vector permList;
string name;
// TODO: Read in a list of names; stop when -1 is read. Then call recursive method.
return 0;
}

Answers

The code that lists all the possible permutations until -1 that corrects the problem in your code is:

#include <algorithm>

#include <iostream>

#include <vector>

int main() {

   std::vector<std::string> names{

       "Julia", "Lucas", "Mia"

   };

   // sort to make sure we start with the combinaion first in lexicographical order.

   std::sort(names.begin(), names.end());

   do {

       // print what we've got:

       for(auto& n : names) std::cout << n << ' ';

       std::cout << '\n';

       // get the next permutation (or quit):

   } while(std::next_permutation(names.begin(), names.end()));

}

Read more about permutations here:

https://brainly.com/question/1216161

#SPJ1

What should the status of your cpt application be in order for a student to be e-verified and eligible work?.

Answers

The status of your cpt application be in order for a student to be e-verified and eligible work are:

Applied statusApproved status

What is CPT?

Curricular Practical Training (CPT) is known to be a legal off-campus employment that is known to be linked to one's major and an integral part of one's degree program.

Therefore, The status of your cpt application be in order for a student to be e-verified and eligible work are:

Applied statusApproved status

Learn more about cpt application from

https://brainly.com/question/17216580

#SPJ1

Write a method reverse that takes an array as an argument and returns a new array with the elements in reversed order. Do not modify the array.

Answers

Answer:

public class ArrayUtils

{

//function to reverse the elements in given array

public static void reverse(String words[])

{

//find the length of the array

int n = words.length;

//iterate over the array up to the half

for(int i = 0;i < (int)(n/2);i++)

{

//swap the first element with last element and second element with second last element and so on.

String temp;

temp = words[i];

words[i] = words[n - i -1];

words[n - i - 1] = temp;

}

}

public static void main(String args[])

{

//create and array

String words[] = {"Apple", "Grapes", "Oranges", "Mangoes"};

//print the contents of the array

for(int i = 0;i < words.length;i++)

{

System.out.println(words[i]);

}

//call the function to reverse th array

reverse(words);

//print the contents after reversing

System.out.println("After reversing............");

for(int i = 0;i < words.length;i++)

{

System.out.println(words[i]);

}

}

Explanation:

What technology uses mathematical algorithms to render information unreadable to those lacking the required key

Answers

Data encryption is the name of the technology that uses mathematical algorithms to render information unreadable to those lacking the required key.

What is Data encryption technology?

This is a technology that helps to secure data by applying a technique known as cryptography. What this basically means is that a secret code (or key) is generated which would provide access to the cryptographically stored information, and failure to provide the correct key makes the data or information unreadable.

You can learn more about how data encryption works here https://brainly.com/question/9238983

#SPJ1

As part of your regular system maintenance, you install the latest operating system updates on your Windows 10 computer. After several days, you notice that the system locks up and reboots from time to time. You suspect that a recent update is causing the problem. How can you quickly restore the computer to its state before the updates

Answers

Answer is restore the system using a restore point.
Explained: System Restore lets you roll your system settings back to a specific date when everything was working properly.

Last week I was able to go to see the new Dr. Strange movie. I thought it was pretty awesome. When I was looking at buying tickets I wanted to make sure I got as many discounts as I could get. By default a movie ticket is $15. If you go before 5pm, the ticket price is $12.50. If you plan on buying in bulk (5 or more tickets) you will receive a 10% discount. If you are a student, you get a 15% discount.
Write a program that asks the user if they are going to the movie before 5PM (1 for yes, 0 for no), how many tickets they are going to buy (an integer greater than 1), and if they are a student (1 for yes, 0 for no). Print out the total cost for the amount of tickets you would like to buy.
Sample Case 1:
Are you going to the movie before 5PM? (1 - Yes, 0 - No)
0
How many people are going?
2
Are you a student? (1 - Yes, 0 - No)
0
The group’s price is $30.00.

Answers

The program is an illustration of conditional statements.

Conditional statements can have single condition or multiple conditions

The complete program

The program written in Python is as follows:

price = 15

timeCheck = int(input("Are you going to the movie before 5PM? (1 - Yes, 0 - No)"))

if timeCheck == 1:

   price = 12.5

numPeople = int(input("How many people are going?"))

if numPeople>= 5:

   price = price * 0.90 * numPeople

else:

   price = price * numPeople

student = int(input("Are you a student? (1 - Yes, 0 - No)"))

if student == 1:

   price = price * 0.85

print("The group's price is",price)

Read more about Python programs at:

https://brainly.com/question/13246781

#SPJ1

Think about how you view your emails—either the email service you use yourself or an email service you would choose to use. Describe that email service and then explain whether you use POP3 or IMAP to access your email. How do you know it’s POP3 as opposed to IMAP?

Answers

Answer:

and POP3, followed in later years. POP3 is still the current version of the protocol, though this is often shortened to just POP. While POP4 has been proposed, it's been dormant for a long time.

IMAP, or Internet Message Access Protocol, was designed in 1986. Instead of simply retrieving emails, it was created to allow remote access to emails stored on a remote server. The current version is IMAP4, though most interfaces don't include the number.

The primary difference is that POP downloads emails from the server for permanent local storage, while IMAP leaves them on the server while caching (temporarily storing) emails locally. In this way, IMAP is effectively a form of cloud storage.

Think about how you view your emails is either the email service you use yourself or an email service you would choose to use POP3, followed in later years.

What is POP3?

POP3, followed in later years as the POP3 is still the current version of the protocol, though this is often shortened to just POP. While POP4 has been proposed, it's been dormant for a long time.

IMAP, or Internet Message Access Protocol, was designed in 1986. Instead of simply retrieving emails, it was created to allow remote access to emails stored on a remote server. The current version is IMAP4, though most interfaces don't include the number.

The primary difference is that POP downloads emails from the server for permanent local storage, while IMAP leaves them on the server while caching (temporarily storing) emails locally. In this way, IMAP is effectively a form of cloud storage.

Therefore, Think about how you view your emails is either the email service you use yourself or an email service you would choose to use POP3, followed in later years.

Learn more about emails on:

https://brainly.com/question/14666241

#SPJ2

______ feedback is a technology that sends resistance to the gaming device in response to actions of the user.

Answers

Force feedback is the name of the technology used that sends resistance to the gaming device in response to the actions of the user.

Gaming device

Gaming devices are a piece of hardware used by game players. For example, devices such as gamepads and joysticks all fall under the category of gaming devices. These gaming devices make use of a force feedback technology which sends resistance when users perform certain actions.

You can learn more about force feedback technology from a related question here https://brainly.com/question/1786465


#SPJ1

Assume your organization has 200 computers. You could configure a tool to run every Saturday night. It would query each of the systems to determine their configuration and verify compliance. When the scans are complete, the tool would provide a report listing all systems that are out of compliance, including specific issues. What type of tool is being described

Answers

The tool that would provide a report listing all systems that are out of compliance, including specific issues is Security Compliance Manager.

What are compliance tools?

The Security Compliance Manager is known to be a form of downloadable tool that one can use as it helps a person to plan, ascribe, operate, and manage a person's security baselines for Windows client and other forms of server operating systems.

Note that in the case above, The tool that would provide a report listing all systems that are out of compliance, including specific issues is Security Compliance Manager.

Learn more about Security Compliance Manager from

https://brainly.com/question/24338783

#SPJ1

An IEEE 802.11ac radio card can transmit on the _____________________ frequency and uses __________________ spread-spectrum technology.

Answers

An IEEE 802.11ac radio card can transmit on the 5 GHz frequency and uses DSSS spread-spectrum technology.

What is 802.11ac?

A 802.11ac is one of the wireless network standards which was developed by the Institute of Electrical and Electronics Engineers (IEEE) which operates on a 5 GHz microwave bandwidth (frequency) and as a result it is faster and can transmit over a long distance.

In this context, we can logically deduce that an IEEE 802.11ac radio card can transmit on the 5 GHz frequency and uses direct-sequence spread spectrum (DSSS) technology.

Read more on 802.11ac here: https://brainly.com/question/18370953

#SPJ1

Which component of CIA triad ensures that the connectivity and performance are maintained at the highest possible level

Answers

The component of CIA triad ensures that the connectivity and performance are maintained at the highest possible level is Availability.

What is Availability in CIA triad?

Availability is known to be the information that needs to be consistently and one that is said to be readily accessible in times of need by authorized parties.

Note that for a thing to be available, it means that that thing can be accessible at any time and any day. it is an attribute that is not very common and as such, it brings about high performance and easy connectivity.

Hence, in the above case, The component of CIA triad ensures that the connectivity and performance are maintained at the highest possible level is Availability.

Learn more about CIA triad from

https://brainly.com/question/17269063

#SPJ1

A license may limit the use of a software application to a specific device. Group of answer choices True False

Answers

Answer:

true

Explanation:

Write the logical Expression and Draw the Truth table for the
following questions

Answers

The logical expressions are

(X NOR Y ) OR Z ⇒ [tex](\bar X \bar + \bar Y) + Z[/tex](A NAND B) AND NOT C ⇒ [tex](\bar A \bar \cdot\bar B) \cdot \bar C[/tex]

How to determine the logical expressions?

Logical expression 1

X and Y are linked by the NOR gate.

So, we have:

X NOR Y

The X NOR Y is linked to Z by the OR gate.

So, we have:

(X NOR Y) OR Z

Hence, the logical expression is (X NOR Y ) OR Z ⇒ [tex](\bar X \bar + \bar Y) + Z[/tex]

Logical expression 2

A and B are linked by the NAND gate.

So, we have:

A NAND B

The A NAND B is linked to C by the AND gate.

So, we have:

(A NAND B) AND C

Hence, the logical expression is (A NAND B) AND NOT C ⇒ [tex](\bar A \bar \cdot\bar B) \cdot \bar C[/tex]

See attachment for the truth tables

Read more about truth tables at:

https://brainly.com/question/27989881

#SPJ1

9) WAp to display the given series
1 2
1 2 3
1 2 3 4
1 2 3 4 5​

Answers

The program that displays the given series is exemplified below. Also, see the meaning of Java.

What is Java?

Java is a class-based, object-oriented general-purpose programming language.

The programming language is designed so that developers may write code anywhere and run it anywhere, regardless of the underlying computer architecture.

It is also known as write once, run anywhere (WORA)

Sample program:

public class KboatPattern

{

   public static void main(String args[]) {

       for (int i = 1; i <= 5; i++) {

           for (int j = i; j >= 1; j--) {

               System.out.print(j + " ");

           }

           System.out.println();

       }

   }

}

Learn more about Java at;
https://brainly.com/question/26642771
#SPJ1

Which is true about arrays and methods? Group of answer choices Arrays cannot be passed to methods An array is passed to a method as a reference Passing an array to a method creates a copy of the array within the method A programmer must make a copy of an array before passing the array to a method

Answers

Answer:

Correct option is: Arrays are passed to methods by reference.

Explanation:

Arrays are passed to methods by reference. This means that if the content of the array is changed in a method, the change will be reflected in the calling method.

Toni is reviewing the status of his organization's defenses against a breach of their file server. He believes that a compromise of the file server could reveal information that would prevent the company from continuing to do business. What term best describes the risk that Tony is considering

Answers

Due to the fact that Toni is reviewing the status of his organization's defenses against a breach of their file server, the best describes the risk that Tony is considering is Strategic risk.

What is Strategic risk?

This is known to be a form of internal and external events that often render it hard, or lets say impossible, for a firm to achieve their aims and strategic goals.

Note that, Due to the fact that Toni is reviewing the status of his organization's defenses against a breach of their file server, the best describes the risk that Tony is considering is Strategic risk.

Learn more about file server from

https://brainly.com/question/17062016

#SPJ1

Linux drivers may be delivered in an archive format called Stuffit. Group of answer choices True False

Answers

Answer:

False

Explanation:

Answer the following 8-mark question in your book.

Discuss the ethical issues in the growing use of mobile technology.

You may wish to include the following points:

cyberbullying
confidential data stored on the devices
health
social pressure
digital divide
high cost

Answers

Health effects of mobile phones owing to RF radiation include "thermal" effects, which refer to a rise in body temperature.

What is mobile technology?

Technology that travels with the user is called mobile technology. It includes of computer equipment, portable two-way communication devices, and the networking technology that links them.

Currently, internet-capable gadgets like smartphones, tablets, and watches best represent mobile technology

Our culture is experiencing ethical problems as a result of mobile technology. According to research by Archie Carroll, some users of mobile technology disregard personal responsibility.

People are using their cell phones while driving through congested crossings. Carroll claims that mobile phones have caused driving distractions.

A sort of bullying or harassment that uses technology is called cyberbullying or cyber harassment.

There are worries that the RF radiation that mobile phones generate, even at low doses, might result in headaches or brain tumors.

To learn more about mobile technology refer;

https://brainly.com/question/2500723

#SPJ1

(a) What are computer scanning device
(b)Name the type of scanner used:

Answers

Answer
Answer A):- A scanner is a device that captures images from photographic prints, posters, magazine pages and similar sources for computer editing and display. Scanners work by converting the image on the document into digital information that can be stored on a computer through optical character recognition (OCR).

Answer b):-The information will include; cost, and how its used The four common scanner types are: Flatbed, Sheet-fed, Handheld, and Drum scanners.
Hope it Helps!

1.The ____ operator executes one of two expressions based on the results of a conditional expression. conditional expressional comparison

Answers

Answer:

Ternary operator

Explanation:

Example if (a == 1) ? 'execute b' : 'execute c'

The response of the DBMS to a query is the ___________ The response of the DBMS to a query is the ___________ ad hoc response query result set integrated view of the data ad hoc query

Answers

The response of the DBMS to a query is the query result set.

What is a query ResultSet?

A resultset is known to be a form of an object that is made up of the results that are used in the executing of an SQL query.

Note that the data from a resultset is gotten back through the use of the fetch functions in python and as such, The response of the DBMS to a query is the query result set.

Learn more about  Query result from

https://brainly.com/question/19338967

#SPJ1

1. Explain what peer to peer networking is.
2. Describe at least one pro and one con of peer to peer networking.
3. Describe at least one pro and one con of network printer connections.
4. Describe at least one pro and one con of local printer connections.
5. Choose and explain, step by step, one method of backing up student files either manually or using a cloud service.

Answers

Peer-to-peer networking

Peer-to-peer networking is a term used to describe a system of communication that allows a group of computers to exchange information in a permissionless way.

One pro of -peer-to-peer networking is that it decentralizes how information is transferred and secured since files are stored on just a single device.

On the other hand, a con of peer-to-peer networking is the possible exposure to harmful data such as malware. been transferred from another computer.

You can learn more about peer-to-peer networks from a similar question here https://brainly.com/question/1932654

#SPJ1

prototypes remain largely unchanged throughout the design process. true or false?

Answers

Prototypes remain largely unchanged throughout the design process is said to be a false statement.

What is a prototype?

Prototyping is known to be a kind of an experimental process that is where design teams are known to often implement ideas into a kind of tangible forms such as from paper to digital.

It is said to be often prone to a lot of changes and as such, Prototypes remain largely unchanged throughout the design process is said to be a false statement.

Learn more about prototypes  from

https://brainly.com/question/7509258

#SPJ1

why over the course of time have more programming language been developed​

Answers

technology and being able to communicate?
Other Questions
Gasoline and ethanol are substitute fuels. If the government increases taxes on gasoline, this will cause a(n) ________ in deadweight loss in the market for gasoline and a(n) ________. a. increase; decrease in demand for ethanol b. increase; decrease in the price of ethanol c. decrease; increase in the price of ethanol d. increase; increase in the price of ethanol Please explain this. In the mid-1990s, the children of divorced parents were about ____ times more likely to divorce than their peers from intact families. Each of the performers at a circus convention is either a unicyclist, a mime or an aerial artist. The ratio of unicyclists to mimes is 3: 14 The ratio of unicyclists to aerial artists is 9 : 11 There are 88 aerial artists. What percentage of the performers are unicyclists? Give your answer to 2 d.p. opinion, what two moments in Part II best highlight Jackie's love of words and stories? YouPrompt: In Part II, we see early hints of Jackie's interest in language and writing. In yourmay include evidence from anywhere in Part II (pg. 49-128). HEELLLPPMEEEEEEEE PLS 30 pointssSuppose that x0 and y0. We know from our work in this section that 1/x1/y is equivalent to 1/xy. Is it also true that 1/x+1/y is equivalent to 1/(x+y)? Provide evidence to support your answer. find the work done by a person pushing a 40 pound box up an incline that is 30 degrees above the horizontal and 100 feet long (ignore friction forces etc.- also remember Work is the inner product of Force and direction vectors. Furthermore remember gravity is a force acting in the downward direction) Rashaad leans a 22-foot ladder against a wall so that it forms an angle of 65 with the ground. How high up the wall does the ladder reach? Round vour answer to the nearest hundredth of a foot if necessary. Although Rhode Island used the most paper money to deal with its financial problems, __________ refused to accept this type of currency and had to pay steep fines for doing so. At times, latitudes with values higher than ________ degrees can have ~ 24 hours of continuous sunshine. There are also some traits that are negatively related to leadership and being successful in that position. People who are ________, _________, _________, and ________ are less like to be perceived as good leaders. a. Confident, knowledgeable, agreeable, modest b. Good natured, confident, agreeable, avoid conflict c. Agreeable, modest, good natured, avoid conflict d. Agreeable, avoid conflict, conscientious, good natured Assume that Ms. Sawyer's salary is $70,000, up from $60,000 last year, while the CPI is 120 this year, up from 100 last year. This means that Ms. Sawyer's real income has ____________ since last year. D=a/a+12*M. The adult weighs 75 kg. Calculate the adults weight in kilograms to pounds. Round final answer 2 decimal places Escoge la frase que es cierta.No hay mucha influencia de otros pases en Puerto Rico.Antes de ser territorio de los Estados Unidos, Puerto Rico fue territorio de Espaa.A la orden no es una frase muy amable. Is bananas good for female private part? what is the domain of f(x)-(1/4)^x? A. y>0B. x0D. All real numbers In 25 words or fewer, explain why businesses use social media to digitally market their products. Circle the correct option: A, B, C, or D.4. Which of the following is greater than 0.5 yd?A 16.5 inB 1.25 ftC 22.5 inD 1.5 ft how do zoos help protect animals If twice a number, added to 3 is divided by the number plus 5, the result is three halves. Find the number.The number is..