Which of the following should be included in the list of contacts in a disaster recovery plan?
A) Customers B) Computer vendor
C) Emergency services D) All of the above
D
Computer Science & Information Technology
You might also like to view...
Bookmarks are typically tagged with descriptive ________
A) buzz words B) keywords C) booktags D) keytags
Computer Science & Information Technology
A CALL statement inside the trigger body enables you to call ______.
A. A stored procedure. B. Another database trigger. C. A stored function. D. A package.
Computer Science & Information Technology