____ seek to ensure that the enterprise will continue to function in the face of a wide range of potential occurrences.
A. Emergency plans
B. Preparedness plans
C. Hazard plans
D. Recovery plans
Answer: B
Computer Science & Information Technology
You might also like to view...
Public-key cryptography is asymmetric, involving the use of two separate keys, in contrast to ___________ encryption, which uses only one key.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
To add a node to the the first row and second column in a GridPane pane, use ________.
a. pane.getChildren().add(node, 1, 2); b. pane.add(node, 1, 2); c. pane.getChildren().add(node, 0, 1); d. pane.add(node, 0, 1); e. pane.add(node, 1, 0);
Computer Science & Information Technology