What type of backups are kept on site at the computer center for immediate recovery purposes?

Answers

Answer 1
They are known as working copy backups

Working copy backups also sometimes known as shadow copies are full or partial backups kept at the computer center for immediate recovery purposes. This type of backup uses Journaled Filing Systems (JFS) that consist of a log file of all transactions and changes that have happened within a set period of time. If a crash happens, the OS can refer to the log files to see the transactions.

 







Related Questions

Terry is building a web site and wants to have three main links called home, product info, and contact us. she will create a hierarchy of page elements and revise the styles sheets. terry has decided to display the text of all h1 headings found within the page header in green. the style rule applied is _____.

Answers

Final answer:

To style the <h1> headings in the page header in green, Terry would apply a CSS rule similar to 'header h1 { color: green; }'.

Explanation:

Terry is in the process of creating a website and has decided to apply a specific style rule to her site. The rule she wants to apply will make all <h1> headings within the page header appear in green. This can be done by targeting the <h1> elements within the header element in her Cascading Style Sheets (CSS). The style rule will look similar to this:

header h1 { color: green; }

This CSS rule will select all <h1> elements that are children of the header element and apply the color green to them. Using this rule, Terry will be able to clearly highlight her main headings in a distinct color, which can help increase both the usability and aesthetic appeal of the site. Headings, such as home, product info, and contact us, will stand out on the page and align with her design hierarchy.

A bluetooth network consists of _____ primary device(s) and up to ____ secondary devices.

Answers

Master (Primary Device(s)), Slave (Secondary device)

Positioning images in a document will move the object as text is added.
a. True
b. False

Answers

if you move the image over the words or the letters than yes the words will fit around the picture.

Adobe indesign is an example of ________ software.

Answers

the answer is desktop publishing.

A type of specialty processor devoted exclusively to protecting your privacy.

Answers

 Cryptoprocessor would be it.

What type of rock is formed from other rocks being subjected to great heat and pressure?
A: Both igneous and sedimentary
B: Metamorphic
C: Igneous
D: Sedimentary

Answers

Hi,

I believe the best answer would be B, Metaphoric. 

And also, just for future reference, you might want to put questions like this in the "Science" category. I guarantee it will be answered faster, and by users who specialize in that particular subject.☺

~Elisabeth

Peter’s Father wants to buy a new computer for his office use on word processing tasks. He wants to bring his computer to and from his workplace and home. He also wants to lower the cost as much as possible

Answers

A good option for Peter's father's computer needs would be a laptop or a notebook.  It is handy so he can bring it to and from the office.  It is also has the specifications needed for his word processing tasks as long as he installs a work processing software.
The best computer to use is a laptop computer.
A laptop is a personal computer that can be easily carried to a number of locations.It runs the same set of software and set of files as that of a desktop computer.
Advantages of using a laptop computer is that it is highly portable and allow you to use your computer almost everywhere.So you get more work done and no time is wasted.He can also use it during travelling where he can attend to his clients anytime..
The other advantage is that it lowers  power consumption .This is beneficial for it lowers the cost.
so i will recommend a laptop computer.

which of the following careers is part of the Printing Technology pathway?
Composer
Proofreader
Textile designer
Lithographer

Answers

textile designer i think

Answer:

Textile?

Explanation:

What are the three primary components of an Inbox?

Answers

Three Primary Components of an Inbox:( 8 Components of an effective Email.).

Answer: 

1: From Label

2: Subject Line

3: Pre- Header

4: Content

5: Call to action

6: Images'

7: Social Media Buttons

8. Unsubscribe Option

Answer:

C- the message header, the Folder Pane, and the Reading Pane

Explanation:

What do file management utilities do?
A. make it possible for you to change the way text files are displayed on the screen

B. make it possible for you to permanently remove deleted files from the computers

C. make it possible for your computer to play movies and podcasts

D. make it possible for your OS to save, maintain, and access files

Answers

D. make it possible for your OS to save, maintain, and access files.

What element will you include to present numerical data visually on a slide?

Answers

Hi!

The correct elements you would use is a Graph or Chart of some kind. This could mean a simple bar graph or a pie chart.

Answer: Charts, Graphs, and Diagrams.

When presenting numerical data on its own, it may overwhelm your audience. The use of Charts, Graphs, and Diagrams WILL definitely make it more understandable and less overwhelming to your audience. The use of these also make it easier to understand the overall output of your findings.

With the help of these visuals, the presentation will also make the presentation more pleasing. A presentation containing only numerical data will disengage your audience as there will be too much information presented to them.  

How does an internet content filter stop traffic based on the fact that it contains the word 'drugs'?
a. malware inspection
b. text filtering
c. content inspection
d. url filtering?

Answers

Hello

The best answer is C

Have a nice day

List the correct order of steps necessary to using usmt to migrate files from an old computer to a new computer.

Answers

The USMT (User State Migration Tool) is designed to assist IT professional migrate files to the windows OS. An example is a step by step migration of files and settings from a windows XP environment to windows 8 using USMT. At the end of the day, you will have used LoadState a ScanState to complete this end to end migration. The correct order is as follows;


1.      Gather Data Using the ScanState Tool

a)      Install USMT

b)      Run ScanState to Create a Migration Store on the Server

2.       Install Windows

a)      Install Applications

3.       Apply Data Using the LoadState Tool

a)      Install the USMT

b)      Run LoadState






You have a hard disk that is formatted with the fat32 file system. you would like to implement file and folder permissions on the design folder that apply when files are accessed both locally and remotely. what should you do?

Answers

make sure the file system is working, for example try putting a file into it, make sure to left click and press public 

"when a user clicks "submit" on a web-based survey"

Answers

What's the rest of the question so I can help.

When a user clicks submit, then their answers are turned in.
I’m not sure if this was the answer you were looking for, but I’m guessing.

The main reason to set a field size in access is to:

Answers

The main reason to set a field size in access is to limit the lengths of value in the table.
Field size determines the limits or determines the maximum of text that can be input in the text or number field. Also, it may reduce data entry errors in changing the field size in access.

The ___ is the core of the operating system that is loaded into memory when the system boots up. it is responsible for controlling security, managing the file system, and providing a platform for applications to run on. the user rarely interacts directly with this part of the operating system.

Answers

I think the system unit

Amy wants to controls the overall process of creating digital designs. Which career is Amy pursuing?
sound producer
photographer
art director
game designer

Answers

Game designer

I hope this helped

Which of the following is NOT a fixed expense?

A. Rental payment
B. Movie tickets
C. Cell phone bill
D. Internet service

Answers

Movie tickets because you might not go to the same amount of movies every month

When creating an HTML document, you would use the tag:

Question 1 options:


<HTML>

<HEAD>

<body>

</html/>









/>

Answers

HTML> : is usually the beginning syntax of the html document
<HEAD>: head defines the meta information for the html document, used to define css to include, javascript to include
<body>: contains main elements and design tags such as p, div etc 
</html/>: </html> is the closing element of an html document but </html/> is not valid.
Hence all of them are used except the last one.

A DTP firm has published and printed flyers for an upcoming fundraising event. In which section of the flyer would you find the contact details of the DTP firm?
A.)body
B.)credits
C.)navigation
D.)title

Answers

Answer:

Just say credits.

Explanation:

.

A laptop computer communicates with a router wirelessly, by means of radio signals. the router is connected by cable directly to the internet. the laptop is 8.7 m from the router, and is downloading text and images from the internet at an average rate of 252 mbps, or 252 megabits per second. (a bit, or binary digit, is the smallest unit of digital information.) on average, how many bits are downloaded to the laptop in the time it takes the wireless signal to travel from the router to the laptop?

Answers

The answer would be 2500 Bits

Approximately 7.446 megabits of data are downloaded to the laptop during the time it takes for the wireless signal to travel from the router to the laptop.

How to solve

To find the number of bits downloaded to the laptop in the time it takes for the wireless signal to travel from the router to the laptop, we can use the formula:

Total bits downloaded = Download speed (in bits per second) x Time (in seconds)

First, we need to convert the download speed from megabits per second (mbps) to bits per second by multiplying it by 1,000,000 (since 1 megabit = 1,000,000 bits).

So, the download speed in bits per second = 252 mbps x 1,000,000 = 252,000,000 bits per second.

Now, we need to calculate the time it takes for the wireless signal to travel from the router to the laptop. The distance is 8.7 meters.

The speed of light, which is the speed at which wireless signals travel, is approximately 299,792,458 meters per second.

Time (in seconds) = Distance (in meters) / Speed of light (in meters per second)

Time = 8.7 meters / 299,792,458 meters per second ≈ 2.9006 x 10^(-8) seconds

Now, we can calculate the total bits downloaded:

Total bits downloaded = 252,000,000 bits/second x 2.9006 x 10^(-8) seconds ≈ 7.446 megabits

So, on average, approximately 7.446 megabits of data are downloaded to the laptop during the time it takes for the wireless signal to travel from the router to the laptop.

Read more about bits here:

https://brainly.com/question/1989676

#SPJ3

A loop that repeats a specific number of times is known as a(n):

Answers

A loop that repeats a set number of times is a for loop.

Python example:
for x in range(1, 10, 1):
     #logic

C example:
for (int i = 0; i < 5; i++)
{
     //logic
}


Symbols can enhance your text. You can add mathematical or currency symbols, geometric shapes, and even smiley faces. Under which menu would you find the Symbols box?

a) Insert menu
b) Format menu
c) View menu
d) Symbols menu

Answers

The answer is D. Hope this helped.

After you set a pin for a domain account on your laptop, that pin can be used only on your laptop. question 17 options:

Answers

This is TRUE

Assume you want to use a PIN LOCK on your Microsoft Account; you can do this without routinely using the account password in your windows machine. A PIN can only be used to unlock the device you activate it on. 

Thus, if someone steals the PIN you used to unlock your laptop with, they will have access to only that one laptop and not your entire Microsoft account. This PIN should only work to the device you set it up on and not to any other devices.






Computer programs that can scan computer disks for virus-like coding are called:

Answers

Computer programs that can scan computer disks for virus-like coding are called: antivirus software

Targeting encourages drivers to scan far ahead and _____________. A. focus their visual attention on the next point on the road B. check the road behind the vehicle C. reach their destination faster D. do not look to the sides

Answers

A. focus their visual attention on the next point on the road.  A driver must have a target, it can be the car in front, a building pr a structure on the road.  Targeting enables the driver to look further ahead on the road and thus be ready for any obstacle on the road.
The answer is (A) Focus their visual attention on the next point on the road.

A fixed object located 12 to 20 seconds ahead of your car on the road should be considered as your visual target. It can be anything from a traffic signal, the crest of a hill, a parked car, or a traffic signal. Your visual target should always be ahead of you on the road and should be at the center of your field of vision. Once a target has been established, a driver should be able to set effective reference points, identify alternative paths, anticipate a number of traffic situations ahead, and notice the presence and changes of traffic flow.

Excel charts are either placed in their own chart sheets or embedded in a worksheet. ____________
a. True
b. False

Answers

Excel charts are used to display data in ways that are meaningful to your audience.
The statement that Excel charts are either placed in their own chart sheets or embedded in a worksheet is true.
When you create a chart, it is embedded in the worksheet that contains the data source.

Commands are organized into tabs on the

A. Ribbon.
B. Status bar.
C. Quick Access toolbar.
D. ruler.

Answers

Answer:

a

Explanation:

An application is software that allows you to perform a specific task true or false

Answers

the answer of the question was true
Other Questions
A ramp is 1.0 m high and 3.0 m long. What is the IMA of the ramp? why does the warm air rise up and over the cold air at a cold front This system has one solution. y=x23x+7y=3x2 What is the y-coordinate of the solution? Enter your answer in the box. A new sidewalk will be 4 ft wide, 280 ft long, and filled to a depth of 9 inches (0.75 ft) with concrete. How many cubic yards of concrete are needed? How old is the moon! Calculate.(10.4)2 =20.16100.16108.1620.8 At Devon's new job he spent $12.99, $10.50, $9.89, $6.90, and $7.58 on lunch the first week.In the second week, he spent $2 more in total for the 5 lunches than the first week.What is the increase in the mean for the second week compared to the first?Round the answer to the nearest penny.Enter your answer in the box. In general, the ex-ante risk-return tradeoffa. slopes upward.b. slopes downwardc. is flatd. is impossible to determine. The constant of proportionality between the circumference and _______ of a circle is equal to which means that for any given circle, the length around the circle _______ by its diameter is a little over _______ , or more exactly Blank 1: Diameter or radiusBlank 2: Divided or multiplied Blank 3: 4, 3, or 5PLEASE ANSWER ASAP a collection of dimes and nickels is worth $4.70 there are 60 coins in all how many of each are there? Evaluate n + 11 for n = 3.31133148 The manager of a sawmill wants to find out what percentage of the boards that the mill produced are defective. Which sampling methods are likely to be biased? Select each correct answer.A.Every 40th board produced over the course of 1 week is selected and examined.B. On 1 day, an hour after the sawmill begins production, 30 boards in a row are selected and examined.C. The manager selects 20 boards at random each day for 5 days and examines them.D. The manager sends an email to 20 customers who buy lumber from the mill, asking each how many of the boards they bought the past week were defective. Results from the first 5 customers to respond are tallied. Which material is the most dense? What is the magnetic force on a proton that is moving at 2.5 107 m/s to the left through a magnetic field that is 3.4 T and pointing toward you? The charge on a proton is 1.6 10-19 C. Use F = qv B sin(). **I know it's between C or D**A. 4.0 10-12 N left B. 4.0 10-12 N right C. 1.4 10-11 N up D. 1.4 10-11 N down, Buddhism was India's dominant religion in 100 BCE and then it A jar lid has a diameter of 42 millimeters. What is the circumference of the lid? Use 22/7 for . A. 924 mmB. 114 mmC. 66 mmD. 132 mm meant to discourage conflict; an agreement between European countries to help one another if attacked by another country When a wave strikes a solid barrier it behaves like a basketball hitting a backboard this wave behavior years called? Kim and her 5 friends hiked over a three day weekend hey hiked the same distance each day how many miles did they hike per day? what is the explicit formula and recursive formula of the numbers 4,7,10,13,16...i don't even know how to start this problem. i just need a bit of help or the answer because I'm running out of time.