A(n) ____________ is a step-by-step description of the methods used to secure data against disaster and a set of guidelines for how an organization will recover lost data and resume operations if and when a disaster occurs.
Fill in the blank(s) with the appropriate word(s).
disaster recovery plan
Computer Science & Information Technology
You might also like to view...
Because Office Web Apps use the standard file formats of the desktop version of Office 2010, you will have ________ viewing of documents.
a. high-fidelity b. low-resolution c. restricted d. pixelated
Computer Science & Information Technology
With ____________, as soon as the value of the entire expression is known, evaluation stops.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology