Describe and list advantages and disadvantages of each of the following backup types:

full, differential, incremental, selective, CPD, and cloud. ​

Answers

Answer 1

Answer:

Full back up

It creates complete copy of the source of data. This feature made it to the best  back  up with good speed of recovery of the data and  simplicity.However, because it  is needed for backing up  of  a lot of data, it is time consuming process,Besides it also  disturbs the routine application of  the technologist infrastructure. In addition large capacity storage is needed  for the  storage of  the large volume of back up with each new creation.

Incremental back up: back up work at high speed thus saves time, Little storage capacity is needed. This type of back up can be run as  many time as wished.

However, the restoration of data takes time, due to the time spent for restoration of initial back up and the incremental.

Differential Back up has very fast back up operation, because it only requires two pieces of back up.This is however slower compare to the Incremental.

The selective back up enable selection of certain type of file or folders for back up.

it can only be used to back up folders only when important data  are needed only.Thus the  storage capacity is low.

CPD eliminates back up window and reduces the recovery point objective.However, it has issue of compatibility with the resources to back up.,it is also expensive because its solutions are disk based.

Cloud based is affordable and save cost,It is easier to access. it is efficient,it can be access remotely for convenience.

However, Internet sources and some bandwidth must be available for access., always depends on third party providers,There is also problems encountered when switching providers.

Explanation:


Related Questions

Private BLANK are cloud services available to members of a particular organization.

Answers

Answer:

A private cloud is a set of applications and resources that are available only to individuals within a specific organization. These resources may be owned by the organization itself or by a third party, and may be hosted inside or outside

Explanation:

.

1. By design, intersections are risky because:
a. Traffic signals might not always work.
b. Drivers pay close attention to other
road users.
c. Vehicles cross one another's paths of
travel at various angles.
d. Pedestrians typically cross roads and
streets quickly.

Answers

By design, intersections are risky because vehicles cross one another's paths of travel at various angles. Thus, the correct option is C.

What are Intersections?

In traffic, intersections may be defined as a point where two or more roads link, split, meet or cross at the exact height, as objected to an interaction, which operates bridges or tunnels to isolate distinct roads.

Intersections are the point of junctions that initiates convergence or divergence of roads at the same height. These are built in order to reduce the effect or load of high traffic in big cities or states.

Therefore, the correct option for this question is C.

To learn more about Intersections, refer to the link:

https://brainly.com/question/24945907

#SPJ1

Assume you have bought a new mother board. It has 4 DIMM sockets with alternating colors. Slot 1 is blue, slot 2 is black, slot 3 is blue and slot 4 is black. How do you fix two 512 MB RAM modules to your motherboard to get the best performance

Answers

To fix two 512 MB RAM modules to the motherboard to get the best performance, one must follow these steps:

1. First of all, check the documentation of the motherboard to see the supported RAM.

2. After confirming the compatibility of the RAM with the motherboard, locate the RAM slots on the motherboard.

3. Make sure that the computer is turned off and unplugged.

4. Insert one of the 512 MB RAM modules into the first slot (blue) by lining up the notches on the RAM module with the slot and pressing down until it clicks into place.

5. Next, insert the second 512 MB RAM module into the third slot (blue) by lining up the notches on the RAM module with the slot and pressing down until it clicks into place.

6. Now, turn on the computer and check if the RAM has been detected by the system.

7. To check, right-click on My Computer, select Properties, and navigate to the System Properties window. Check the Installed Memory (RAM) entry to see if it shows the correct amount.

8. If the RAM has been detected, then the system should now be running with 1024 MB of RAM installed and will provide the best performance possible.

For more such questions on motherboard, click on:

https://brainly.com/question/12795887

#SPJ8

How do advertisers use data to know which products would most likely appeal to you

Answers

Answer:

it gives children or adults something to think about

Explanation:

Which part of a powertrain control module retains diagnostic trouble codes (DTCs), freeze-frame data, and learned data

Answers

Answer:

Memory and storage section

Explanation:

helen has n dollars budgeted to purchase math notebooks. there are m stores that stock unlimited supplies of notebooks in bundles, but the size and price of the bundles vary from store to store. helen can purchase as many bundles as she wants from as many stores as necessary until she depletes her budget, but her goal is to purchase a maximal number of notebooks. for example, if helen has n

Answers

Helen is unable to purchase any additional notebooks, so we return the total number of notebooks she was able to purchase: 10 + 10 = 20.

What is array?

In computer science, an array is a data structure that consists of a collection of items, each of which is identifiable by at least one array index or key. A mathematical method is used to determine the location of each member in an array based on its index tuple. An array is a collection of items, images, or numbers that are organized in rows and columns. An array is a collection of related data types.For example, if we want to store the names of 100 people, we can create a string array that can hold 100 names. new String[] array String[100]; In this case, the above array can only hold 100 names.

Here,

One bundle of ten notebooks from Shop 0 costs $2 and includes n = 4 − 2 = 2 dollars left.

One package of ten notebooks from Shop 0 costs $2 and contains two notebooks − 2 = 0 dollars left.

Helen can't afford any more notebooks, so we return the total number of notebooks she was able to purchase: 10 + 10 = 20.

To know more about array,

https://brainly.com/question/13950463

#SPJ4

What can a programmer expect when writing a modular program for a game

Answers

Answer:

That it's gonna be hard.

Need an answer in Python

Write a program for. checking the truth of the statement ¬(X ⋁ Y ⋁ Z) = ¬X ⋀ ¬Y ⋀ ¬Z for all predicate values.

Answers

Using the knowledge in computational language in python it is possible to write a code that checking the truth of the statement ¬(X ⋁ Y ⋁ Z) = ¬X ⋀ ¬Y ⋀ ¬Z for all predicate values.

Writting the code:

def conjunction(p, q):

    return p and q

print("p    q    a")

for p in [True, False]:

    for q in [True, False]:

        a = conjunction(p, q)

        print(p, q, a)

def exclusive_disjunction(p, q):

    return (p and not q) or (not p and q)

print("p    q    a")

for p in [True, False]:

    for q in [True, False]:

        a = exclusive_disjunction(p, q)

        print(p, q, a)

See more about python at brainly.com/question/18502436

#SPJ1

Need an answer in PythonWrite a program for. checking the truth of the statement (X Y Z) = X Y Z for

The document ____ provides a systems developmental lifecycle approach to security assessment of information systems.
A) SP 800-53 A, Jul 2008: Guide for Assessing the Security Controls in Federal Information Systems: Building Effective Security Assessment Plans
B) SP 800-53 Rev. 3: Recommended Security Controls for Federal Information Systems and Organizations
C) SP 800-41 Rev. 1: Guidelines on Firewalls and Firewall Policy
D) SP 800-14: Generally Accepted Principles and Practices for Securing Information Technology Systems

Answers

The document that provides a systems development lifecycle approach to the security assessment of information systems is B) SP 800-53 Rev. 3: Recommended Security Controls for Federal Information Systems and Organizations.

The SP 800-53 Rev. 3 document is a comprehensive set of security controls and assessment procedures for Federal information systems and organizations. This document provides a systems development lifecycle approach to security assessment, which covers all phases of the systems development lifecycle, from conception to disposal. The focus is on assessing and implementing security controls that protect information systems and the data they process, store, and transmit.

The SP 800-53 Rev. 3 document provides recommendations for security controls that should be implemented in information systems to protect against potential threats. The security controls are organized into families, such as access control, awareness and training, audit and accountability, security assessment and authorization, etc. This document also explains how to assess the effectiveness of security controls and how to implement them.

Learn more about The SP 800-53 Rev. 3 document here: https://brainly.com/question/14859626.

#SPJ4

Activity
Perform an online search and identify the tools for system management. Describe the features/functions of any three system management tools

Answers

The three system management tools

Hardware inventories.Software inventory and installation.Anti-virus and anti-malware

What are the function of hardware features?

The feature and functions of inventory management is that they are  said to be tools that are used to tell or know the right amount and type of input products, as well as the products in process and those that are finished products.

Note that it helps in the facilitating of any production and sales operations.

Therefore, The three system management tools

Hardware inventories.Software inventory and installation.Anti-virus and anti-malware

Learn more about  management tools from

https://brainly.com/question/24662469
#SPJ1

use terms of interection model and norman model for ATM?

Answers

Answer:

ther you are

Explanation:

. HCI Technology Application in ATMHuman computer interface (HCI) is a term used todescribe the interaction between users and computer-s; in other words, the method by which a user tellsthe computer what to do, and the responses which thecomputer makes. Even more, HCI is about designingcomputer systems to support people’s use, so that theycan carry out their activities productively and safely.All of this can be summarized as ”to develop or im-prove the safety, utility, effectiveness, efficiency andusability of systems that include computers” [1].

MAKE ME BRAINLIEST PLEASE I NEED IT TO PASS AMBITIOS STAGE ON HERE THANKS

What is the best scenario to use a display font?

for quickly read messages, such as a highway sign
for important, dense information, such as a nutrition label
for small type, such as in body copy
for large type, such as a title

Answers

Answer:

For large type, such as a title

Explanation:

i tried all of the answer's til i got the right one

The best scenario to use a display font is that it makes the requirement to type large, such as a title. Thus, the correct option is D.

What is a Display font?

A display font may be defined as the arrangement of words with respect to the requirement that makes the writing more attractive, effective, and understandable.

Display font is utilized in order to determine how a font face is represented based on whether and when it is downloaded and ready to use.

Display fonts generally include large types of texts which are used to frame a title. This makes the title more attractive, effective, and ready to read from a long distance as well.

A title is the main characteristic that influences the readers about the writing.

Therefore, the best scenario to use a display font is that it makes the requirement to type large, such as a title. Thus, the correct option is D.

To learn more about fonts, refer to the link:

https://brainly.com/question/14052507

#SPJ2

Infringement Less than 13km/h over the speed limit At least 13km/h but not more than 20km/h over the speed limit More than 20km/h but not more than 30km/h over the speed limit More than 30km/h but not more than 40km/h over the speed limit More than 40km/h over the speed limit Penalty amount $177 $266 $444 $622 $1.245 Demerit points 1 3 4 6 8 Note: the way the government website has written this (and we've copied it) is NOT efficient in terms of decision structures. This written for each condition to stand alone (if, if, if) but we can tell its mutually exclusive and so know a better tool for the job don Avoid a 6-month suspension by writing a program to ask for the user's: • speed and the • speed limit
program in python?​

Answers

The example of the program in Python to help one to calculate the penalty amount as well as the demerit points based on the speed and speed limit provided by the user is given in the code below

What is the program?

python

def calculate_penalty(speed, speed_limit):

   penalty_amount = 0

   demerit_points = 0

   if speed <= speed_limit:

       return penalty_amount, demerit_points

   overspeed = speed - speed_limit

   if overspeed <= 13:

       penalty_amount = 177

       demerit_points = 1

   elif overspeed <= 20:

       penalty_amount = 266

       demerit_points = 3

   elif overspeed <= 30:

       penalty_amount = 444

      demerit_points = 4

   elif overspeed <= 40:

       penalty_amount = 622

       demerit_points = 6

   else:

       penalty_amount = 1245

       demerit_points = 8

   return penalty_amount, demerit_points

# Get user input

speed = int(input("Enter the recorded speed (in km/h): "))

speed_limit = int(input("Enter the speed limit (in km/h): "))

# Calculate penalty and demerit points

penalty, points = calculate_penalty(speed, speed_limit)

# Display the results

print("Penalty amount: $", penalty)

print("Demerit points: ", points)

Read more about python here:

https://brainly.com/question/30113981

#SPJ1

You are working as a marketing analyst for an ice cream company, and you are presented with data from a survey on people's favorite ice cream flavors. In the survey, people were asked to select their favorite flavor from a list of 25 options, and over 800 people responded. Your manager has asked you to produce a quick chart to illustrate and compare the popularity of all the flavors.

which type of chart would be best suited to the task?
- Scatter plot
- Pie Chart
- Bar Chart
- Line chart

Answers

In this case, a bar chart would be the most suitable type of chart to illustrate and compare the popularity of all the ice cream flavors.

A bar chart is effective in displaying categorical data and comparing the values of different categories. Each flavor can be represented by a separate bar, and the height or length of the bar corresponds to the popularity or frequency of that particular flavor. This allows for easy visual comparison between the flavors and provides a clear indication of which flavors are more popular based on the relative heights of the bars.

Given that there are 25 different ice cream flavors, a bar chart would provide a clear and concise representation of the popularity of each flavor. The horizontal axis can be labeled with the flavor names, while the vertical axis represents the frequency or number of respondents who selected each flavor as their favorite. This visual representation allows for quick insights into the most popular flavors, any potential trends, and a clear understanding of the distribution of preferences among the survey participants.

On the other hand, a scatter plot would not be suitable for this scenario as it is typically used to show the relationship between two continuous variables. Pie charts are more appropriate for illustrating the composition of a whole, such as the distribution of flavors within a single respondent's choices. Line charts are better for displaying trends over time or continuous data.

Therefore, a bar chart would be the most effective and appropriate choice to illustrate and compare the popularity of all the ice cream flavors in the given survey.

for more questions on Bar Chart

https://brainly.com/question/30243333

#SPJ8

Convert the following decimal numbers into their binary equivalent: a. 13
b. 32 or 42
c. 292
d 12
e. 61
f. 120
g.29
h. 44
67
98

Answers

Answer: a. 1101 b. 10000 or 101010 c. 100100100 d. 1100 e. 111101 f. 1111000 g. 11101 h. 101100 1000011 1100010

the device that store data and program for current purpose​

Answers

Answer:

A computer, what you are using. smh.

Answer:

Podría ser el teléfono porque puedes almacenar imágenes de datos depende del almacenamiento interno que pueda contener el dispositivo no.

Explanation:

Por ejemplo en este tiempo depende mío puede almacenar la clases miércoles y 3 cosas de aprendizaje y la formación de nuevas personas con valores y virtudes en el ámbito social político y económico.

Gracias.

#cuidemonosdesdecasa.

helllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllo

Answers

Hi, I have to make this at least 20 characters long

15. What are programming languages used for other than to build application software, systems software, embedded systems, and Web sites?

Answers

Answer:

Well you have python (AI), SQL, C++, and probably Java.

Application software is widely used in business to complete specific tasks. These programs are designed for the users by the application developers. An example of Applications software is Microsoft Offices (Word, Excel, PowerPoint).

Which software controls the interaction between the user and the hardware?

The function of the Operating system (OS) is that it is a kind of a software that helps to controls as well as handle  and coordinates the computer hardware devices and it also function by helping to runs other software as well as applications on a computer.

The system software controls the interactions between hardware and user applications. Application Programming Interface (API) is a set of commands, functions, protocols, and objects that programmers can use to create software or interact with an external system. It provides developers with standard commands for performing common operations so they do not have to write the code from scratch.

Therefore, Application software is widely used in business to complete specific tasks. These programs are designed for the users by the application developers. An example of Applications software is Microsoft Offices

Learn more about  Application software on:

https://brainly.com/question/29353277

#SPJ2

What are the difference between data and information?​

Answers

Answer

The terms data and information can mean different things in different contexts, but the main differences between them are: Data is a collection of facts. Information is how you understand those facts in context. Data is unorganized, while information is structured or organized.


Select the correct answer.
For her homework, Annie has added the picture of a fruit in a document. She wants to enhance it to give a cut-out look. Which feature or menu
option should she use?

ОА SmartArt
OB. Clip Art
OC Charts
OD Shapes

Reset
Next

PLEASE HELP!!

Answers

Answer: B- Clip art

Explanation:

Answer:

Clip Art

Explanation:

what are the three types of styles in ms word explain each type
Need ko po help please

Answers

Answer:

There are five different types of styles in Word 2007 — paragraph, character, linked, table, and list — and each of them serves a different purpose. Paragraph: The paragraph style contains any formatting: paragraphs, indents, tabs, font, text size, attributes — you name it.

Give me good answers

1- what is the money?

2- what is the wealth?

How can it be used for good

Answers

Answer:

Money is currency

Explanation:

Is is how you pay for items

The firewall protects a computer or network from network-based attacks along with _____________ of data packets traversing the network.

Answers

Answer:

Save of data is the answer

Discuss the decidability/undecidability of the following problem.
Given Turing Machine , state of and string ∈Σ∗, will input ever enter state ?
Formally, is there an such that (,⊢,0)→*(,,)?

Answers

Note that in the caseof the problem described, there is no algorithm that can determine with certainty whether   a given Turing machine, state, and input string will ever enter a specific state.

How is this so?

The problem of determining whether a given Turing machine, state, and string will ever enter a specific state is undecidable.

Alan Turing's   halting problem proves that thereis no algorithm that can always provide a correct answer for all inputs.

Due to the complex and unpredictable   behavior of Turing machines, it is impossible todetermine if a state will be reached in a general case.

Learn more about Turning Machine at:

https://brainly.com/question/31771123

#SPJ1

How can you ensure that the website you are using is secured?
A.
website begins with http://
B.
website begins with https:// and has a green padlock
C.
website doesn’t have any padlock icon
D.
website has a red padlock icon

Answers

The answer is B: website begins with https:// and has a green padlock


When using VLOOKUP we can search for information from more than one spreadsheet.
True or False

Answers

heyy man it's true for sure

A collection of related data points is called a ?

Answers

Answer:

collection of related data points in a chart is called a. data series.

Stem assessment 4: divisible by

Answers

Explanation:

4 IS DIVISIBLE BY 2,4,1

IF MY ANSWER IS USEFUL MARK ME AS BRILLINT

list the tools that could probably be used in building the 3D Isometric drawing (mine shaft head gear) grade 8​

Answers

Drawing a cube using isometric projection is extremely easy. You will need a scrap of paper, ruler, pencil and protractor

What are isometric drawing instruments?

Isometric tools permit the users to create drawings on isometric dot paper. It is a dynamic drawing that uses boundaries, cubes, or faces. It also has an opportunity to rotate, shift and you can view them in 2D or 3D.

What are the 3 isometric drawings?

The views are created by using three axes. The three axes are formed from the predetermined vertical line and the associated horizontal lines. The three dimensions shown in an isometric drawing are width, height, and depth. Two-dimensional pictures only display width and height

To learn more about Isometric drawing , refer

https://brainly.com/question/1664205

#SPJ9

Use the drop-down menus to complete the steps for using Gind and Replace commands?

Answers

Using the drop-down menu we can complete the case like this

Home

Cells

Replace

Replace all

Define cells.

The cells are a place where a row and a column meet or the intersection of those two. A, B, and C serve as column identifiers, whereas digits serve as row identifiers (1, 2, 3). Depending on the column and row, each cell has a unique name (or the cells address).

You may make your formulas considerably simpler to understand and manage by giving them names. You can give the cells range, function, constant, or table a name.

To learn more about a cell, use the link given
https://brainly.com/question/28435984
#SPJ1

Other Questions
HELP ME WITH THIS IF U PLEASE Is the process of drawing a conclusion from evidence within the logical framework of an argument? The Dark Age of Greece was marked byeach of the following EXCEPT whichone?A. small, isolated communitiesB. a boost in tradeC. the absence of written languageD. lack of organized government what is 3(x + 3) equal to A ureterostomy (or urostomy for short): ______________. Ana is planning to give her informative speech in a few days. Prior to speech day, she visits the room in which she will give the speech to check out the size and layout of the room, as well as if the projector is working properly. Ana is concerned with the __________ dimension of communication. the defining characteristic of chronic obstructive pulmonary disease is dementia. what is the vertex for y = x2 - 4x Using the __________ system, kingdoms are grouped based on cell structure and type, while the __________ system groups major taxonomic groups into three major domains.whittakerWhoese-fox Q15) I CAN COMPUTE THE MEAN, MEDIAN, AND MODE OF A SET OF DATA The data represent a number of texts received over an 8-day period: 5, 6, 8, 13, 9, 1, 8, 4 Find the mean, median, and mode. Mean = Median = Mode = Place these waves in order from shortest wavelength to longest. sound waves, light waves, ocean waves When an objective lens is 20x and the ocular lens is 10x, the total magnification of a specimen will be:_________. Which of the following is not true regarding control charts? control charts can be used to monitor a process for the existence of special cause variation the major components of a control chart are the lower control limits, and the center line, and the upper control limits control charts alone can determine the source of problems control charts are similar to run charts in that data is plotted versus time Factorise the following:a) x + 3x - 4b) x-2x-3c) x +2x-8 help asap plzzzzz still so s t u p i d it have to be 20 letters What case caused state legislatures and the federal government to pass statutes addressing computer theft and crime? In what way are maps andglobes similar? Which are the correct measures for WXZ, UZY, and VYX? What is the probability distribution if X \sim B(3, 0.82)? What is 26 out of 100 expressed as a ratio in simplified form?