If the disaster requires actions offsite from the primary infrastructure, it is under the jurisdiction of__________.

Answers

Answer 1

Answer:

Business continuity

Explanation:

The disaster is affecting business functions and needs to be urgently remedied.


Related Questions

we are unable to process your request at this time. if you continue to receive this error, please contact cardholder services by calling the number on the back of your card.

Answers

Answer:

is this a sim chip card replacement card for Electronics ?

Explanation:

We use the keyboard to point, click, and select menus and icons, and for onscreen navigation. True or False

Answers

Answer:

False.

Explanation:

Hope I could help. Hey, have a nice study time.

Answer:

false

Explanation:

we use our keyboard to type not click icons or point.

Which process refers to the process of translating between a set of private addresses inside a network and a set of public address outside the network

Answers

Answer:

The process of translating between a set of private addresses inside a network and a set of public addresses outside the network is called

IP pulling through use of a subnet mask bypass

1. Which software is used mostly for typing text? a) Word b) Excel O c) PowerPoint o d) Paint​

Answers

Answer:

a. Word

Explanation:

Microsoft Word is the most widely used word processing software according to a user tracking system built into the software.

Answer: a) Word

Explanation: Microsoft Word is the most widely used word processing software.

The implementation stage of the SDLC is when the system is moved into operation where it can be used. What stage PRECEDES the implementation stage and what happens in this preceding stage

Answers

The stage that precedes the implementation stage of SDLC is testing and it involves checking the functionality of the system.

System design involves the process of determining an overall system architecture, which typically comprises the following:

Hardware.End users.Physical processing components.Software.Communication channel.

Generally, there are seven (7) main stages in the systems development life cycle (SDLC) model and these include:

1. Planning.

2. Analysis.

3. Design.

4. Development.

5. Testing.

6. Implementation.

7. Maintenance.

From the above, we can deduce that the stage which precedes the implementation stage of SDLC is testing.

During the testing stage of SDLC, a quality assurance (QA) expert checks the system to determine whether or not it is functioning properly before it is deployed for operation, which is where the system can be used.

Read more: https://brainly.com/question/20813142

poob bn vbyfcfgxfc jghjg jhgh

Answers

Answer:

Ploob was a monster employed at Horville's Hut of Horrors. He looked like a small green ball with a long tube-like nose and hair along his spine.

Explanation:

As a game designer, your goal in game design is to get your players to fell like your game is the whole world. You want your players to obtain a state of deep engagement with the game that allows them to fully invest their imagination in the game's artificial world. If you successfully accomplish this, what have you mastered?

roguelike state

second person perspective

player immersion

seamless movement

Answers

My Answer:

Player Immersion

Explanation:

I love video games, so this is something I am also looking for. Player Immersion will successfully draw the player into the game, seamlessly hooked to it. In order to make this possible, focus on the big details, like the setting, the music, and the plot.

Setting: Must be immersive, big, and beautiful.

Music: Must be beautiful, grand, and can possibly get stuck in your head.

Plot: Must be plausible. Don't make a plot that doesn't tie into the game.

These are things that will definitely draw in your player, hence, the answer is player immersion.

Hope this helps!

Player immersion because it tells u right there

NFPA 780, Standard for the Installation of Lightning Protection Systems provides information on the installation of _____ for lightning protec-tion systems [250.4(A)(1)].

Answers

Answer:

a and b. 250.4(A)(1) Note

Explanation:

Power Supply

Description :

Answers

A device that supplies power to electronic equipment which; is sometimes called A, B, or C according to its purpose of heating vacuum tube cathodes, producing electron current flow in plate circuits, or applying a direct voltage in grid circuits.

Explanation:

Not exexactly sure on what your asking

In high-tech fields, industry standards rarely change.
True
False

Answers

Answer: false

Explanation:

How to square a number in java.

Answers

Answer:

num**2

Explanation:

To square a number in Java, you just take the number and use two asterisks (**) to denote an exponent, and then connect a 2 to it.

For example, if your number is 5:

5**2 in Java means 5^2, which is 25.

Just like how 5**3 in Java means 5^3.

Hope this helps.

When should you close the socket python tcp server client.

Answers

f socket refers to an open TCP connection, the connection is closed. If a stream socket is closed when there is input data queued, the TCP connection is reset rather than being cleanly closed. The descriptor of the socket to be closed

To close the socket you need to call shutdown() first and then close(), and shutdown takes an argument

with which type of satellite is there a propagation delay?

Answers

Geostationary satellites have a high propagation delay.

What is the difference between the dom api and the html dom api.

Answers

The DOM-core is the object model that is common for all XML documents (including HTML) with elements and attributes. The HTML-DOM is an extension of the core DOM with more specific interfaces for the various HTML elements.

PLEASE HELP! (NO LINKS)

The US Copyright Act gives computer programs the same status as what kinds of work?

Answers

Answer:

C.

Explanation:

In image below.

                                        Have a wonderful day and mark brainliest if I helped,

                                                                   starkitty052010 of Brainly

                                       

I need help with this question.

Fill in the blank with the correct response.
When an app seems to have a personality, we say it has ____

Answers

The answer is persona

Write a program to output 3 lines of text with the following information:
Student's first and last name:
Class:
Born in:
Answer

Answers

Answer:

C LANG

#include <stdio.h>

// function main begins program execution

int main( void )

{

printf( "student's first name" );

} // end function main

PYTHON

student's name=''

born_date=''

class=''

print ('')

Explanation:

create an sql database rows and Columns then use sql commands to call any specific data if so :

(you have a complet database of students data)

SELECT born_date

FROM students

//(Call all students born_date )

//you can specify

********,*********

to create an sql table

CREATE TABLE students (

name char,

born_date int,

class int,

);

Would my phone still work if I snapped it in half?

Answers

Probably not
Not a good idea my friend

Depends on if you wanna get it repaired or not

PLEASE HELP ME

(b) When a computer systems RAM becomes full it can use virtual memory.
Explain what happens if the computer does not have any virtual memory.

Answers

Answer:

it won't be able to run

Explanation:

because computer runs on physical memory

If a computer does not have any virtual memory, the consequences of running out of physical RAM can be quite problematic.

When the RAM becomes full, the operating system relies on virtual memory as a way to supplement the physical memory shortage. Without virtual memory, the system would have no way to manage or accommodate the excess data that needs to be stored temporarily.

As a result, the computer would likely start experiencing severe slowdowns, freezing, or crashing when attempting to run applications that require more memory than is available.

In extreme cases, the system might even become unresponsive or display error messages indicating a lack of memory. Virtual memory acts as a safety net, allowing the computer to continue functioning by utilizing a portion of the hard drive as temporary memory storage when physical RAM is exhausted.

Without this essential feature, the computer's ability to multitask and handle memory-intensive tasks would be severely hindered.

Learn more about virtual memory, click;

https://brainly.com/question/30756270

#SPJ3

Create an application that prompts the user for a number and then displays the numbers 1 through the number entered, each on a separate line. Below the numbers, the sum is displayed.

Answers

Answer:

In Python:

start = num(input("Enter a number: "))

sum = 0

for x in range(1, start+1):

sum += x

print (x)

print ("Final Sum: " + sum)

Answer:

import java.util.Scanner;

public class NumberSum {

public static void main(String[] args) {

// TODO Auto-generated method stub

int num, sum=0,num1=0;

Scanner input=new Scanner(System.in);

 

System.out.println("Enter a number");

num=input.nextInt();

input.close();

 

do{

System.out.println(num1);

num1+=1;

sum+=num1;

}while(num1<=num);

System.out.println(sum);

}

}

What is the largest integer that can be represented with 4 bits?.

Answers

Answer:

15

Explanation:

You can calculate the maximum number using a simple formula:

2^N (Where N is the number of bits) - 1

So 2^4 - 1 = 16 - 1 = 15

a steep reduction is memory available on the heap to the poiont where it is completly exhausted is known as a

Answers

Based on the information that is given, a steep reduction in the memory that's available is known as a memory leak.

A memory leak simply means a form of resource leak which occurs when a computer program manages memory allocations incorrectly in such a way that the memory that isn't needed anymore aren't released.

It should be noted that a memory leak is also a steady reduction in memory available on the heap to the point where it's exhausted. It can also be when an object that is stored in memory can't be accessed by the running code.

Read related link on:

https://brainly.com/question/25820385

What are web protocols.

Answers

Answer:

Web protocols are a set of standards used to exchange information. It ensures that code can be modular and portable.

Answer:

The standard network protocol of the Internet, TCP/IP, stands for Transmission Control Protocol/Internet Protocol. The Internet Protocol part of the standard refers to the addressing of data message packets. Additional protocols that operate within the TCP/IP framework include UDP, HTTP and FTP. Each has different functions and purposes that ultimately work together to provide assorted capabilities through what's currently known as the World Wide Web.

Explanation:     i hope this helps

________ is a group meeting-based process for requirements collection. a. Reverse engineering b. Joint application design c. Human-computer interface d. Computer-aided design e. Total ownership

Answers

Answer:

a) reverse engineering

Read what is in the commets.

Answers

Answer:

I'm a little confused on what you are asking, could you please explain.

it literALLY HAS NOTHING TO DO WITH MY ASSIGNMENT

Answers

Ansgokublue

Explanation:

The Internet provides access to Internet information through documents including text, graphics, audio, and video files that use a special formatting language called HTML.

Answers

Answer:world wide wev

Explanation:

Can you make a phone app with angular?.

Answers

Answer:

yes

Explanation:

What access-point feature allows a network administrator to define what type of data can enter the wireless network?

Answers

Traffic filtering. It’s name is self-explanatory!

A business is having trouble keeping up with the competition. They cannot
respond to their customers like the competition. Which type of system will
likely be able to help them solve this issue?
A. Transaction processing system
B. Management communication system
C. Decision support system
D. Management information system

Answers

Answer:

Decision support system is the answer

Explanation:

Other Questions
Which equations represent circles that have a diameter of 12 units and a center that lies on the y-axis? Select two options.x2 + (y 3)2 = 36x2 + (y 5)2 = 6(x 4) + y = 36(x + 6) + y = 144x2 + (y + 8)2 = 36 6. Challenge: Based on the weathering patterns, guess the rock type shown in each photo. The melting point of HO(s) is 0 C. Would you expect the melting point of HS(s) to be 85 C, 0 C or -85 C.? Justify your choice Can someone remake this song (Gorillaz Dirty Harry) into a new song? In order to get full credit you need to keep the melody very close to the original, I need this for a project, thanks in advance! NO LINKS. PLZZ HELP WILL MARK BRAINLIEST AND 55 POINTS!Which nucleic acid moves the code for protein synthesis from the nucleus to the ribosomes?A. dRNAB. tRNAC. rRNAD. mRNA Find the perimeter. Simplify your answer. Find the equation of a line that passes through the point (2,5) and has a gradient of 2. Leave your answer in the form y = m x + c Help me please quickly Basal bodies are most closely associated with which of the following cell components?. Anyone know some editorial cartoons made in 2020? The brain waves associated with REM sleep are most similar to those ofa. NREM-1 sleep.b. NREM-2 sleep.c. NREM-3 sleep.d. waking beta.e. waking alpha. Rewrite the following equation in slope-intercept form. 20x 11y = 17 tell me what u think of this edit. be honesthttps://www.canva.com/design/DAEvhu4Z4k8/aBnd2_pTqvSH-NiEyhcVIQ/watch?utm_content=DAEvhu4Z4k8&utm_campaign=designshare&utm_medium=link&utm_source=publishsharelink 3: A farmer keeps cows and pigs on his farm. The ratio of cows to pigs on the farm is 2:3 (a) What percentage of the animals on the farm are cows? (b) What percentage of the animals on the farm are pigs? Does anaerobic respiration produce atp. GEOMETRY PROOF!!!! please do fast as possible Explain how the required interactions of the house and the senate would be required to move hr 5048 into law. You may use a calculator for this item,Zach, Kolby, and Peyton are investing a total of $360,000 to open a cottee shop Their investments are in the radio1:2:0.5, respectivelyHow much has Zach invested, in dollars?Enter your answer in the space provided humans tend to obey when asked to do something by an authority figure. which of the following factors makes obedience even more likely? 10.What do you think is the overall message of this movie?Hotel rwanda