Describe a disaster that would require database recovery

Assignment Help Computer Engineering
Reference no: EM131132204

Database Backup & Recovery Discussion

Natural and man-made disasters can completely destroy a database.

1. Describe a disaster that would require database recovery and discuss your thoughts on preparing for and recovering from that disaster.

You may use a disaster that you have read about in recent years, or you may describe a hypothetical, but possible, disaster. (150-300 words)

Respond to each discussion post below (50-150 words each)

2. I work for a government agency that has back ups for the back ups. I know of one disaster that happened and it did affect the network but did not stop the work that was being done. It was a severe snow storm that put strain on the generators that kept the computer servers cool. When that happened on of the back ups kicked in. What happened is all the data was sent to a remote site to continue the work so the mission would not stop. Once the storm had passed the data was passed back to main post and worked continued on. Going back to the discussion you have to have a back up for anything that might happen. I like to plan for the worse case at all times and hopefully it all works out.

3. From my military point of view we always try to have a plan for almost every outcome that there is when protecting our assets. Not to long ago information of millions of federal employees was obtain by people that had no business on having that information, all due to bad security of our information. The damage that this cause was huge mostly because some of the information was release and posted on websites were people can grab that information from and ultimately create false identities. Security of our data is super important both physically and on-line because attacks like this can happen. I was on that list so I will forever will be using services to monitor irregular activity on my accounts.

Reference no: EM131132204

Questions Cloud

Illustrate the effect of such a policy mix on output : In 2001, the Fed pursued a very expansionary monetary policy. At the same time, President George W. Bush pushed through legislation that lowered income taxes.
Erikson theorized that a negative identity is one that : Erikson theorized that a negative identity is one that: - is based on little exploration of choices- represents the opposite of what is valued by one's parents - is in ìtime-out.
What surprised you about your use of technology : What surprised you about your use of technology and the kinds of technology you use? From the moment you wake up until you go to bed, you interact with helpful machines.
Solve for the equilibrium interest rate : Set M/P equal to its initial value of 1,600. Now suppose that government spending increases to G = 400. Summarize the effects of an expansionary fiscal policy on Y, i, and C.
Describe a disaster that would require database recovery : Describe a disaster that would require database recovery and discuss your thoughts on preparing for and recovering from that disaster.
How are decision trees utilized in healthcare management : How are decision trees utilized in healthcare management? Discuss the three key parts of any decision and provide at least one specific example of how decision trees relate to healthcare management decisions. Your response should be at least 200 word..
Relationship between salesperson and customer : Describe the typical relationship between salesperson and customer looking for life insurance . Describe the appropriate salesperson’s attitudeand appearance. Describe the methods used to strengthen a long-term relationship for repeats and referrals ..
How would you measure the value of work at home in gdp : Calculate measured employment and unemployment and the measured labor force for each economy. Calculate the measured unemployment rate and participation rate for each economy. In which economy is measured GDP higher?
What is strategic outsourcing : What is strategic outsourcing? Describe why a company would explore this as an alternative to vertical integration, as well as any potential advantages.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Problem regarding the good biometric indicator

1. Suppose the password file of a system is available to a cracker. How much extra time does the cracker need to crack all passwords if the system is using the Morris-Thomp- son protection scheme with n-bit salt versus if the system is not using t..

  What capability vp mode in windows 7 operating system

what are the pros and cons of upgrading an operating system versus installing a new image of OS? Describe some of your own experiences at work or at home.

  Questionevery spring you looking forward to buying a box of

questionevery spring you looking forward to buying a box of caramel delites girl scout cookies.the troop provides an

  Dns within a windows server 2008 environment

Write three pages about DNS and how we use DNS within a Windows Server 2008 environment. In your paper , please focus on the two items. First, focus on DNS and how it functions.

  Describing the lcg

Provide the value of a? Specify the restrictions that are required on the seed?

  Refined version of the multiplication hardware

Do the given multiplication of two 4-bit numbers (the leftmost bit is sign bit) by using the refined version of the multiplication hardware, and use decimal arithmetic to verify your results.

  For this discussion respond to the followingdiscuss the use

for this discussion respond to the followingdiscuss the purpose of subnetting.discuss the use of arp tcp udp ftp http

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  How to create an online account

A database would store the student's login name, class list, and number of registered credits. Furthermore, the database will store the administrator's login information and the classes listed in the online catalog. Add error handling to the appli..

  How to compare and contrast the two systems

In San Jose, CA, Riordan Manufacturing Company is in the procedure of upgrading all computers. Windows 2K is the network operating system. IT has decided to upgrade the network operating system, and your team is tasked with evaluating both Windows..

  Describe any environmental conditions or for evidence room

How should the items you collected as evidence be stored in your evidence room. Describe any environmental conditions or concerns for your evidence room (digital evidence can require some unique considerations!), as well any security procedures t..

  By using various internet sources find an article or

using various internet sources find an article or website about website security. show your personal content mastery by

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd