A(n) ____________ is a step-by-step description of the methods used to secure data against disaster and a set of guidelines for how an organization will recover lost data and resume operations if and when a disaster occurs.

Fill in the blank(s) with the appropriate word(s).

disaster recovery plan

Computer Science & Information Technology

You might also like to view...

Because Office Web Apps use the standard file formats of the desktop version of Office 2010, you will have ________ viewing of documents.

a. high-fidelity b. low-resolution c. restricted d. pixelated

Computer Science & Information Technology

With ____________, as soon as the value of the entire expression is known, evaluation stops.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology