Business Driven Technology
7th Edition
ISBN: 9781259567322
Author: Paige Baltzan Instructor
Publisher: McGraw-Hill Education
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter B, Problem B4.2MBD
Explanation of Solution
Back up period:
- A company should choose strategies of back-up and recovery based on goals and operational needs.
- The period of backup depends on volume of critical information.
- The period may be hourly, daily or weekly.
- The most important files should be backed up at least once a day.
Back up storage:
- The backup should be moved to a secure location on a regular basis.
- It can be a fireproof cabinet or an offsite storage area.
- Scheduled backups could be accomplished using backup services or online tools.
- It can automatically detect and save changed data to back up storage location.
Type of disasters:
- The types of disasters the company includes:
- Application failure:
- It denotes failure of an application.
- VM failure:
- It denotes failure of virtual machine.
- Host failure:
- It denotes failure of a host machine.
- Rack failure:
- It denotes failure of a rack.
- Communication failure:
- It denotes failure in network.
- Data center disaster:
- It denotes failure in data center.
- The data storage location may get affected...
- Application failure:
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
What security software do you have on your computer(s)? How successfully did it keep your system secure? Have any of your family members or you ever contracted a virus or another kind of malware? How did you get rid of the virus you had, and what sort did it look like?
On your computer(s), what security software do you have? How well has it worked to keep your system safe? Have you or any members of your family ever been infected with a virus or other kind of malware? What kind of virus did you have and how did you get rid of it?
The goal of backups and how to avoid losing data or having your computer break down are talked about?
Chapter B Solutions
Business Driven Technology
Ch. B - Prob. B1.1MBDCh. B - Prob. B1.2MBDCh. B - Prob. B1.3MBDCh. B - Prob. B1.4MBDCh. B - Prob. B1.5MBDCh. B - Prob. B1.6MBDCh. B - Prob. B2.1MBDCh. B - Modeling a Business Process Do you hate waiting in...Ch. B - Prob. B2.3MBDCh. B - Prob. B2.4MBD
Ch. B - Prob. B2.5MBDCh. B - Prob. B3.1MBDCh. B - Prob. B3.2MBDCh. B - Prob. B4.1MBDCh. B - Prob. B4.2MBDCh. B - Prob. B4.3MBDCh. B - Prob. B4.4MBDCh. B - Prob. B4.5MBDCh. B - Prob. B4.6MBDCh. B - Prob. B4.7MBDCh. B - Prob. B4.8MBDCh. B - Prob. B4.9MBDCh. B - Prob. B4.10MBDCh. B - Prob. B4.11MBDCh. B - Prob. B5.1MBDCh. B - Prob. B5.2MBDCh. B - Prob. B5.3MBDCh. B - Prob. B5.4MBDCh. B - Prob. B5.5MBDCh. B - Prob. B5.6MBDCh. B - Prob. B6.1MBDCh. B - Prob. B6.2MBDCh. B - Prob. B6.3MBDCh. B - Prob. B6.4MBDCh. B - Prob. B6.5MBDCh. B - Prob. B7.1MBDCh. B - Prob. B7.2MBDCh. B - Prob. B7.3MBDCh. B - Prob. B7.4MBDCh. B - Prob. B7.5MBDCh. B - Prob. B7.6MBDCh. B - Prob. B7.7MBDCh. B - Prob. B7.8MBDCh. B - Prob. B7.9MBDCh. B - Prob. B7.10MBDCh. B - Prob. B7.11MBDCh. B - Prob. B8.1MBDCh. B - Prob. B8.2MBDCh. B - Prob. B9.1MBDCh. B - Prob. B9.2MBDCh. B - Prob. B9.3MBDCh. B - Prob. B9.4MBDCh. B - Prob. B9.5MBDCh. B - Prob. B9.6MBDCh. B - Prob. B9.7MBDCh. B - Prob. B9.8MBDCh. B - Prob. B9.9MBDCh. B - Prob. B9.10MBDCh. B - Prob. B10.1MBDCh. B - Prob. B10.2MBDCh. B - Prob. B10.3MBDCh. B - Prob. B10.4MBDCh. B - Prob. B10.5MBDCh. B - Prob. B11.1MBDCh. B - Prob. B11.2MBDCh. B - Prob. B11.3MBDCh. B - Prob. B11.4MBDCh. B - Prob. B12.1MBDCh. B - Prob. B12.2MBDCh. B - Prob. B12.3MBDCh. B - Prob. B12.4MBDCh. B - Prob. B12.5MBDCh. B - Prob. B12.6MBD
Knowledge Booster
Similar questions
- What would you do if a virus invaded your mobile device, such as a smartphone or tablet? Identify the kind of malicious software with which you are dealing, if any. What actions did you take to clear the virus from your computer and ensure it was safe to use again? In the event that you do not have access to such information, you are welcome to download and inspect a malicious piece of mobile software before reporting it in this thread.arrow_forwardDefine backup. Explain what it means to back up a file. Define restore. Mention media used to store backups. Tell why backup copies often are kept offsite. Virus protection is important in the backup process. If the primary data source is infected, the mirror-image backups also will be contaminated. Explain how a full backup (sometimes called an archival backup) is different from a selective backup. Describe a three-generation backup policy. Define grandparent, parent, and child. Point out where backup and restore programs are available. Describe an online backup service.arrow_forwardDefintion of the term "backup" is required. Explain what a file backup is and why it's important. Defintion of restoration. Make mention of backup storage media. The reason for keeping backups off-site is to ensure that they are safe and secure. There is a need for virus protection throughout the backup procedure. The mirror-image backups will likewise be affected if the original data source is compromised. Explain the differences between a selective backup and a complete backup (also known as an archival backup). A three-generation backup strategy is described. To what extent are you related to your grandparents? Show where backup and restoration applications may be found. ' Describe a service that provides online backup.arrow_forward
- What if a virus attacked your smartphone or tablet? Determine the kind of malware, if any, you're dealing with. What procedures did you take to ensure that the virus was completely removed from your computer? If you do not have such access, you may download and test mobile malware before reporting it in this thread.arrow_forwardPrepare for an emergency by taking some time to think about it. What are the key differences between a traditional computer backup system and a mobile backup solution?arrow_forwardWhat characteristics define a solid backup plan? The process of backing up your desktop computer is distinct from backing up your mobile device.arrow_forward
- Computer science Why do you believe backups are vital in system management, and how can you do this?arrow_forwardvConsider the information that is kept on the hard disc of your computer. Do you need rapid access to confidential data that is saved on your computer? How catastrophic would it be if you couldn't access those records? What kinds of precautions can you take to safeguard your device?arrow_forwardConsider what steps you can take to protect yourself in the event of an emergency. What are the primary distinctions between a computer backup solution that is fixed in one location and one that can be moved around?arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Enhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning