You are considering implementing a backup scheme for a server. After researching options, you decide on a method that does not reset the archive bit after a backup. Which method have you chosen?

Answers

Answer 1

Answer:

C. A cold site is a leased facility that contains only electrical and communications wiring, air conditioning, plumbing, and raised flooring. No communications equipment, networking hardware, or computers are installed at a cold site until it is necessary to bring the site to full operation.

Explanation:


Related Questions

Primary functions of lighting are sufficient light to...

make things sound good
power the cameras
feed the crew
create 3 dimensional on 2 dimensional tv screens

Answers

Answer:

I would say, a guide to use for studying.

rebecca smith was the top scorer in a women’s professional basketball league

Answers

Answer:

awesome

Explanation:

is it okay if i call you my prada bae?

(take me serious :3)

Answers



yeah ofc! sounds perfect

how are you going to preserve cultural heritage you social practices even when using ICT ?

Answers

Answer:

Cultural heritage is central to protecting our sense of who we are.

It gives us an irrefutable connection to the past – to certain social values, beliefs, customs and traditions, that allows us to identify ourselves with others and deepen our sense of unity, belonging and national pride.

Answer:

In Slovenia, an interactive geographic information system shows information about important natural areas. Since 2008, the system is available online also via an interactive map. The Slovenian Register is one of the most comprehensive and advanced tools in the EU, and can serve as an inspiration for other countries and regions aiming to improve digitisation of natural and cultural heritage.

Source: CD-ETA E-bulletin

Cheers! :)

in Kakegurui at the end of the what happens

Answers

Answer:

ok

Explanation:

မင်းငါ့ကိုငိုနေတာကိုမလိုချင်တဲ့လူငယ်များရဲ့ဆူနာမီကိုမကြည့်ချင်ဘူး

Answer:

me tiamo kisses me ddeee

Explanation:

Fill in the blank: PMML, PFA, and ONNX are __________________. 1 point Open standards for predictive model serialization, exchange, and deployment. Codes for getting rid of undesired data or models. Robots that are plotting to take over the planet. Passwords for some super-secret system. Abbreviations for machine learning algorithm names.

Answers

Answer:

Option A: Open standards for predictive model serialization, exchange, and deployment.

Explanation:

PMML which is also known as Predictive model markup language, is basically an open interchange format for predictive models.

ONNX which is also known as the Open Neural Network Exchange Format is simply an open format that is used to support the storing and porting of predictive models spanning across libraries and languages.

PFA which is also known as Portable format for Analytics is used to provide a platform for analytic applications to explain and exchange predictive models that are produced by analytics and also machine learning algorithms.

From the definitions of PMML, PFA, and ONNX above, we can see that they are all used for predictive model arrangement and exchange.

Thus, the correct answer is option A.

Which of the following best describes the purpose of an IP address?

Answers

To locate somebody. Mabey to send mail to.

Answer: C

Explanation:

Each connected device has its IP address. However, all the connected devices are included under your main public IP address for your network.

Your ISP (Internet Service Provider) provides a public IP address via your router. The ISP will have a sizeable pool of IP addresses they have bought. They distribute these to their various customers.

true false.
(c) In Animate, only one layer
can be activated at a time. ( )
PLZ HELP ME IN MY STUDY​

Answers

Answer: true

Explanation:

Ans: Answer is true...

what is low level language​

Answers

Answer:

The language which is spoken by low aged people is called as low level language

Answer:

A low level language is a language with few layers between itself and actual machine code.

Assembly is an example of a very low level language, where you're giving direct instructions to the processor.  C is often called a fairly low level language as it gets compiled very directly into machine code.

By contrast, high level languages have many more layers between themselves and the processor.  Java would be an excellent example, as you have a full object oriented language that gets parsed, linked and assembled to run on a virtual machine which itself runs on the hosting system.  Javascript is another, as it in precompiled and executed by the browser, which itself is running on the platform.

Which best describes the Quick Access toolbar and the ribbon tabs?

Answers

Answer: D

Explanation: The Quick Access Toolbar is customizable, and the Ribbon tabs are collapsible.

Answer:

d

Explanation:

Josh is searching for information online about the conservation status of blue jays. He enters the phrase blue jays and most of the results are about the baseball team. What can he do to get the specific results he wants?

Answers

Answer: specify the bluejay bird

Explanation:

by specifically mentioning it is birds he wants that Is the results he will get

If Josh wants to get the specific information in the context of the  conservation status of blue jays, then  in that case can add birds in the search bar along with the name of  blue jays.

What are blue jays?

Eastern North America is home to the beautiful  blue jay, a bird of prey that belongs to  the Corvidae family. It inhabits the majority of eastern and central America; some eastern populations might be migratory.

Breeding populations can be found all over southern Canada; resident populations can also be found in Newfoundland, Canada. Blue Jays are renowned for their brilliance, intricate social structures, and strong familial ties.

It is believed that their love of acorns contributed to the proliferation of oak trees following the last glacial period.

Learn more about blue jays from here:

https://brainly.com/question/3034695

#SPJ2

What is one disadvantage of transmitting personal data using digital signals?
A. The data cannot be accessed by other computers.
B. The data could be accessed or stolen.
C. The data are easily changed into different data.
D. The data can be changed by being transmitted.

Answers

Answer: The answer to your question is B i hope this helps

the reason for this is because useing digital signals can be hac,ked or accessed by another person so there for you maybe have to use another way.

Explanation:

i hope this helps if it does have a brilliant day and have a smile

B I think I’m not sure but I hope it helps

which member of the Jackson family was the spokesperson for the Psychic Friends Network.​

Answers

Answer:

La Toya Jackson

Explanation:

After running the following pseudocode, what will the value of VARIABLE be? 1. Set value of VARIABLE to 5 2. Increase the value of VARIABLE by 3 3. If the value of VARIABLE is odd, increase its value by 1 4. If the value of VARIABLE is even, increase its value by 1 5. If the value of VARIABLE is odd, increase its value by 1​

Answers

Answer:

10

Explanation:

you start with 5       5

you add 3                8

the variable is not odd so skip         8

the variable is even so add 1            9

the variable is odd so add 1              10

10

hope this helps <3

Which of the following statements is true?
O Secondary storage stores data for short periods of time.
O A hard drive is an example of secondary storage.
O The CPU holds instructional data for programs.
Audio data is saved to a computer's CPU.

Answers

C is the answer I think not sure

The statement true for the secondary storage device, is that hard drives are the example of secondary storage. Thus, option B is correct.

What is a secondary storage?

A secondary storage in the computer system is given as the non-volatile form of the storage media that has the ability to form the storage without being connected to power.

The secondary storage can be of solid state, optical and magnetic storage devices. Hard drive is the example of magnetic secondary storage devices. Thus, option B is correct.

Learn more about secondary storage, here:
https://brainly.com/question/86807

#SPJ2

Write a program that uses a while loop to calculate and print the multiples of 3 from 3 to 21. Your program should print each number on a separate line. Expected Output:
3
6
9
12
15
18
21

Answers

Code:

num = 3

while num <= 21:

   print(num)

   num+=3

Output of code:

3

6

9

12

15

18

21

Explanation:

The condition num <= 21 will ensure that the program will only print multiples of 3 up to 21. We set num as 3 since we want to start printing from 3, and we add 3 each time to get the multiples.

Hope this helps :)

Who finds the exact web server that hosted the website by looking in a huge database of internet addresses

Answers

Answer:

The ISP - Internet service provider

Explanation:

The internet service provider ISP finds the exact web server that hosted the website by looking in a huge database of internet addresses.

An internet service provider (ISP) is a company that provides internet connection and services to individuals and organizations.

Ziad tells his son Marc: " This year my age is triple yours, but in 10 years, it will be the double". Find their ages.​

Answers

Answer:

Ziad age would be like 30

Explanation:

10x3=30

Why won't my Brainly let me make an account? I have shut my computer down, closed the tab, and opened it, I have tried EVERYTHING!!!HELP PLZ!!

Answers

Explanation:

You may try opening the Brainly website using your browser's incognito mode. In other words,

Go to the Brainly website on Incognito mode > click Join and then follow the process to create an account.

However, if the issue persists you may then click the Contact Us button on the Homepage of the website and fill the accompanying form to send in your complaints.

__________ are organizations of special interest groups that solicit contributions from donors and fund campaigns to help elect (or defeat) candidates based on their stances on specific issues. Group of answer choices

Answers

Answer:

The appropriate approach is "Political action committees".

Explanation:

Committees created among moneyed interests to donate to presidential campaigns that are inclined to endorse whose stance regarding controversial factors. Due to various established campaign finance laws, Campaign contributions or PACs have been permitted to make contributions that are far greater just like groups of people would.

What is output? x = 10 if (x > 10): print(1) elif (x = 10): print(3) else: print(4)

Answers

Answer:

There are three logical operators: and, or, and not. The semantics (meaning) of these operators is similar to their meaning in English. For example, x > 0 and x < 10 is true only if x is greater than 0 and less than 10.

n % 2 == 0 or n % 3 == 0 is true if either of the conditions is true, that is, if the number is divisible by 2 or 3.

Finally, the not operator negates a boolean expression, so not(x > y) is true if (x > y) is false, that is, if x is less than or equal to y.

Explanation:

want some points you get some also stay away from people

Answers

Answer:

lol

Explanation:

thank YOUUUUUUUuuuuuuu

The internet and intranet have many different uses.
Explain what is meant by the intranet.

Answers

Answer:

Intranet is a local or restricted communications network, especially a private network created using World Wide Web software.

Answer:

internet-The Internet is a vast network that connects computers all over the world. Through the Internet, people can share information and communicate from anywhere with an Internet connection.

Intranet- A system of computers inside an organization that makes it possible for people who work there to look at the same information and to send information to each other.

The material (text, pictures) to be put into a document is called________________

Please help me

ME ARMY HALPPP!

Answers

Answer:

Inline (my guess)

Hope this may help u

what is the size of 4th generation of computer and what language does they use?​

Answers

Answer:

Computers of fourth generation used Very Large Scale Integrated (VLSI) circuits. VLSI circuits having about 5000 transistors and other circuit elements with their associated circuits on a single chip made it possible to have microcomputers of fourth generation.

Fourth-generation language (4GL), Fourth-generation computer programming language

(brainliest please)

Explanation:

The period of fourth generation was from 1971-1980. Computers of fourth generation used Very Large Scale Integrated (VLSI) circuits. VLSI circuits having about 5000 transistors and other circuit elements with their associated circuits on a single chip made it possible to have microcomputers of fourth generation.

Fourth generation computers became more powerful, compact, reliable, and affordable. As a result, it gave rise to Personal Computer (PC) revolution. In this generation, time sharing, real time networks, distributed operating system were used. All the high-level languages like C, C++, DBASE etc., were used in this generation.

Fourth Generation

The main features of fourth generation are −

VLSI technology used

Very cheap

Portable and reliable

Use of PCs

Very small size

Pipeline processing

No AC required

Concept of internet was introduced

Great developments in the fields of networks

Computers became easily available

Some computers of this generation were −

DEC 10

STAR 1000

PDP 11

CRAY-1(Super Computer)

CRAY-X-MP(Super Computer)

7.
A videographer wants a fast computer to use to edit video files. What does this customer need to
consider when selecting RAM?

Answers

Answer:

16GB RAM

Explanation:

Users on your network report that they have received an email stating that the company has just launched a new website. The email asks employees to click the website link in the email and log in using their username and password. No one in your company has sent this email. What type of attack is this

Answers

Answer:

Phishing

Explanation:

A phishing attack may be defined as a attack made on social platform that is used to steal the data, which includes the credit card details or credentials of individuals, etc. It is a fraudulent attempt to collect important information.

In the context, the employees receives an email asking them to click on the link and login using their credentials. It is a fraud email which no one in the company has sent. So this is a phishing attack.

HELLLLLLLLLLLLLLLLLLLLP PLSSSSSSSSSSS HELLLLLLLLLP
Which of the following is an example of a Boolean Operator?
A. HTML
B. SEO
C.
D. BUT

c is
TITLE

Answers

Answer:

HTML?

Explanation:

That looks like the best answer, correct me if I'm wrong ^^U

The following image is the basic syntax for a python function definition

def fuctionname( arguments ) :

statement1

statement2

statement3


A. True
b.False

LMK ASAP PLEASE

Answers

Answer:

A. True

Explanation:

You didn't post the image, but if the statements on your image are indented, the answer to this problem is A.

Answer:

This is true, the python language follows these syntax orders.

Nilsu is attempting to train a new administrative assistant on using a word processing program. Since the program is fairly complex and has many independent components (e.g., creating mail merge documents is very different from formatting a letterhead), she should:

Answers

Answer:

teach the assistant bits and pieces of the program.

Explanation:

Given that the program is fairly complex and has many independent components, the most ideal way Nilsu should train a new administrative assistant on using a word processing program is by "teaching the assistant bits and pieces of the program."

This will make the administrative assistant understand and operate the program at a gradual pace without anhthing looking confusing.

Other Questions
What universal theme does this selection suggest? As each had been a Bride, And each one had a little wicket basket Made of fine twigs entrailed curiously , In which they gathered flowers to fill their flasket: And with fine Fingers cropped full feateously The tender stalks on high Of every short which in the Meadow They gathered some, the Violet pallid blew, The little Daisy that at evening closes The virgin Lilyand the Primrose true With a store of vermeil Roses, To deck their Bridegrooms ' posies Against the Bridal day, which was not long Sweet Thames run softly, till end my song What universal theme does this selection suggest? A Weddings are joyous occasions. B. Falling in love too quickly can be dangerous C Respecting nature is an important aspect of life D. The nature of love is fleeting help asapppp!!!Which of these statements in the Declaration of Independence can be found in the List of Grievances section?A. For quartering large bodies of troops among usB. We hold these truths to be self evident, that all men are created equal.C. We therefore, the Representatives of the United States...ought to be free and independent D. When in the course of human events it becomes necessary... Part AWhat is the central idea in the Newsela article "Joseph Campbell and the Hero's Journey"?Campbell's theories have made an impact on artists and musicians.Campbell has several famous friends in Hollywood.Campbell has the ability to predict the end of a story.Campbell's theories have had a strong effect on film and TV.Question 2Part BWhich quote best supports the answer to Part A?"The book ["The Writer's Journey"] adapts Campbell's 17-stage monomyth into a 12-stage model for writing the hero's journey in film.""The journey usually includes a symbolic death and rebirth of the character.""Campbell's writing was influenced by many historical figures. Among them were James Joyce, Thomas Mann, Pablo Picasso, Sigmund Freud and Carl Jung.""In 1983, Lucas invited Campbell to California to watch his 'Star Wars' trilogy." Laura had 32 dollar off coupons for mini golf course but every buddy else had to pay nine dollars per person the full price what was the total cost of their group of eight to play mini golf Write the equation, in slope-intercept form, of the line that passes through (-2,0) and is parallel to the line represented by 5x-3y=-17 . The graph shows the solution to which system of inequalities? What does the quote He could feel it on his neck, still, like a hot paw reveal about Mr. Hadleys memory of the veldt (Paragraph 65)? (see paragraph below). Think about how this foreshadowing plays an event on Mr. Hadley's thoughts and feelings During social studies, the students discuss the collapse of the Roman Empire. The teacher tells the students that everyone must respond to at least one comment that a speaker in their group makes. What should Saj do to help him prepare for his turn to respond? Listen carefully and take notes about what others are saying. Continue reading as others speak to search for new ideas. Find someone with whom he agrees and repeat his or her idea. Change the subject to something he can more easily discuss. *Required1 - In lines 314-316 (page 531), Danforth says, I cannot pardon these when 3 pointstwelve are already hanged for the same crime." Based on this statement,you can conclude that he ... *is unwilling to admit his mistakes.is unkind but completely fair.feels compassion for the victims.understands human nature. Plz read then answer. Dont waste my points if u dont know dont answer. what is the effect of the Renaissance on modern thought Match each influence to its correct category A farmer must transport a fox, goose and bag of beans from one side of a river toanother using a boat which can only hold one item in addition to the farmer, subject tothe constraints that the fox cannot be left alone with the goose, and the goose cannotbe left alone with the beans. What is the fewest number of trips the farmer has to takein order to transport all three safely to the other side of the river?Show working using any appropriate mathematical representation(s) When is the next election in Arizona? What type of election is it? What do you need to bring to the polls to vote? what is the most dangerous work you did in your whole life?explain it briefly A car is moving at 20 m/s. The driver steps on the gas pedal and accelerates the car for 4 seconds at an acceleration of 4 m/s2. How fast is the car moving after it accelerates? What machine changes electrical energy into light and sound energy?batteryo lightbulbalarm dockapple write any two method for identification of fossils? Under Cleisthenes reforms, who could participate in Athenian government? Graph a line with a slope of 4 that contains the point (3,0)