____ seek to ensure that the enterprise will continue to function in the face of a wide range of potential occurrences.

A. Emergency plans
B. Preparedness plans
C. Hazard plans
D. Recovery plans

Answer: B

Computer Science & Information Technology

You might also like to view...

Public-key cryptography is asymmetric, involving the use of two separate keys, in contrast to ___________ encryption, which uses only one key.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

To add a node to the the first row and second column in a GridPane pane, use ________.

a. pane.getChildren().add(node, 1, 2); b. pane.add(node, 1, 2); c. pane.getChildren().add(node, 0, 1); d. pane.add(node, 0, 1); e. pane.add(node, 1, 0);

Computer Science & Information Technology