Very large storage system that protects data by constantly making backup copies of files moving across an organization's network is known as ...

Answers

Answer 1

Answer:

RAID is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.

Explanation:

Answer 2

RAID is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.

What is File system failure?

File system failure refers to disk-related errors that may be due to corrupt files,  disk integrity corruption, file execution policies, bad sectors, etc. These errors may prevent be causing users from accessing or opening files. The first line of defense against a file system failure is a well-defined set of proper system backup and file maintenance procedures.

These errors can be encountered in files such as images, documents, PDFs, movies, etc. In order to protect and provide defense against file system failure, it is important to manage proper backup and file maintenance procedures.

Therefore, RAID is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.

You can learn more about file system at:

brainly.com/question/14312784

#SPJ2


Related Questions

Under which menu option of a word processing program does a star appear?
A star appears under the
menu of the word processing program.

Answers

UNDER THE MENU OPTION INSERT.

Answer:

shapes

Explanation:

Plato got it correctly

9. Which of the following is the
leading use of computer?​

Answers

Complete Question:

What is the leading use of computers?

Group of answer choices.

a. web surfing.

b. email, texting, and social networking.

c. e-shopping.

d. word processing.

e. management of finances.

Answer:

b. email, texting, and social networking.

Explanation:

Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties. One of the most widely used communication channel or medium is an e-mail (electronic mail).

An e-mail is an acronym for electronic mail and it is a software application or program designed to let users send texts and multimedia messages over the internet.

Also, social media platforms (social network) serves as an effective communication channel for the dissemination of information in real-time from one person to another person within or in a different location. Both email and social networking involves texting and are mainly done on computer.

Hence, the leading use of computer is email, texting, and social networking.

When machining rotors, what is the reason for setting the indexing collars to zero?

A. To know how much metal was taken off of each side.

B. To make sure that no cut exceeds .010 inch

C. To determine the proper cut speed of the Brake Lathe.

D. To measure the depth of the grooves on the rotor surface.

Answers

Answer:

To determine the proper cut speed of the brake lathe

To determine the proper cut speed of the brake lathe reason for setting the indexing collars to zero.

What is indexing collars?

Thus, they can have a maximum of 256 colors, which is the amount of colors that 8 bits of information can specify (28 = 256). Fewer colors are produced by lower bit depths, which also result in smaller files. At the conclusion of this chapter, in Section 19.8, this is covered.

"Indexed color" refers to the fact that a color table contains the palette—the collection of colors—of the image. A reference (or "index") to a table cell containing the pixel's color is present in each pixel of the image.

By choosing Image Mode Color Table in Photoshop, you can view the table for an indexed color image.

Therefore, To determine the proper cut speed of the brake lathe reason for setting the indexing collars to zero.

To learn more about indexing collars, refer to the link:

https://brainly.com/question/12608731

#SPJ2

A video game character can face toward one of four directions: north, south, east, and west. Each direction is stored in memory as a sequence of four bits. A new version of the game is created in which the character can face toward one of eight directions, adding northwest, northeast, southwest, and southeast to the original four possibilities. Which of the following statements is true about how the eight directions must be stored in memory?
A. Four bits are not enough to store the eight directions. Five bits are needed for the new version of the game.
B. Four bits are enough to store the eight directions
C. Four bits are not enough to store the eight directions. Sodeen bits are needed for the new version of the game.
D. Four bits are not enough to store the eight directions. Eight bits are needed for the new version of the game.

Answers

Answer:

B. Four bits are enough to store the eight directions

Explanation:

The summary of the question is to determine whether 4 bits can store 8 directions or not.

To understand this question properly, the 8 bits will be seen as 8 different characters.

In computer memory, a computer of n bits can store 2^n characters.

In this case:

[tex]n = 4[/tex] i.e. 4 bits

So:

[tex]2^n = 2^4[/tex]

[tex]2^n = 16[/tex]

This implies that the memory can store up to 16 characters.

Because 16 > 8, then (b) answers the question.

Fyroff consultants, a leading software consulting firm in the United States, decides to launch an Enterprise Resource Planning (ERP) solution. The company chooses the brand name Fyroff Enterprise for the new solution. However, when the company attempts to register the domain name, it finds that a small unknown firm is already registered under the same domain name. The small firm is now attempting to sell the domain name to Fyroff. Which of the following terms refers to this practice of buying a domain name only to sell it for big bucks?
a. cybersquatting
b. logic bombing
c. cyberbullying
d. bot herding
e. cyberstalking

Answers

Answer:

The correct answer is a. cybersquatting

Explanation:

Cybersquatting is the registration of a domain name that corresponds to the denomination of a brand or name, with the main objective of obtaining some economic benefit from its sale to the owner and legitimate owner of the brand. Cybersquatting can range from making money by parking domains (buying names that are then "parked", that is, left unused but generating advertising revenue based on the visits they receive) to redirecting users to another website In order for it to get more traffic, that is, with cybersquatting it is generally intended to sell the registered domain names to the legitimate owners or interested parties, at a price well above the cost of registration or also to use the domain taking advantage of the recognition associated with the legitimate owner to obtain commercial advantages, as clients in the network.

((PLEASE HELP ME)) i need to get all my school work done before thursday
------------- are used to navigate between pages and Web sites.

Question 1 options:

Transitions


Animations


Hyperlinks


None of the above

Answers

Answer:

none of the above

Explanation:

Web navigation refers to the process of navigating a network of information resources in the World Wide Web, which is organized as hypertext or hypermedia. The user interface that is used to do so is called a web browser.

how can we achieve an effective communication with other people​

Answers

Just be yourself!
Explanation.......

With contention:_______.
a. computers wait until the circuit is free before they send data
b. the server or front end processor works consecutively through a list of clients to determine who should have access to the media
c. the front end processor must wait for a response from the polled client or terminal
d. one computer starts the poll and passes it to the next computer on the multipoint circuit
e. there is never a chance for collision, or two computers trying to send data at the same time

Answers

Answer:

a. computers wait until the circuit is free before they send data.

Explanation:

In Computer science, controlled access (X-ON/X-OFF) is typically the opposite of contention.

Controlled access is mainly used by computer networks that are being managed by a host mainframe computer system. X-ON is ready to receive while X-OFF isn't ready to receive.

With contention, computers wait until the circuit is free before they send data. It generally prevents collision between computer systems.

When gathering the information needed to create a database, the attributes the database must contain to store all the information an organization needs for its activities are _______ requirements.

Answers

Answer:

Access and security requirements

solve x + 4 / x - 3 = 4 , step by step explanation will mark as brainliest ​

Answers

Answer:

I didn't get the exact answer..but hope this help

What is a key consideration when evaluating platforms?

Answers

Answer:

The continuous performance of reliability data integrity will lead to the benefit and profit of the platform's regular structure changes. Cleanliness in the platform whereas addresses the straightforward structure of task performance and adequate data integrity.

Consider any tasks performed in real life, for example, driving a taxi. The task you pick involves many functions. Driving a taxi involves picking up customers, and quickly and safely transporting them to their destination. Go through the components of the AI cycle to automate the problem you choose. List the useful precepts available. Describe how you will represent your knowledge. Based on that, describe how you will use reasoning to make and execute a plan expected to achieve a goal or obtain maximum utility. (this is for artificial intelligence, but they did not have that option)​

Answers

The taxi came at night so you go

List 3 clinical tools available in the EHR and discuss how those benefit the patient and/or the practice

Answers

Thor Odin and Aries the threes listed powerful

What is not a type of text format that will automatically be converted by Outlook into a hyperlink?
O email address
O web address
O UNC path
O All will be automatically converted.

Answers

Answer:

UNC path seems to be the answer

Answer:

UNC path

Explanation:

NO LINKS OR I WILL DELETE YOUR FORTNITE ACCOUNT
What can you do with the free version of the splice editor

Answers

Answer:

can i have ur fortnite account if u hav one and dont use it :) i only say that cuz u mentioned fortnite

Explanation:

with the free version you can add effects (cheap effects) cut the video, crop some parts. and posting leaves a watermark until u buy money

Answer:

It has a 7 day free trial while your using the free version

Explanation:

In matlab how would this specific code be written and how could I ask the user to enter a vector of coefficients for the polynomial model. Verify that the entry has an even number of elements (an odd number of elements would mean an even order polynomial). If an invalid vector is entered, prompt the user to re-enter the vector until an acceptable vector is entered. If the user does not enter an acceptable vector after 5 attempts (including the first prompt), display a warning and remove the last element of the last vector entered. (For example, if the last user input is [1 2 3 4 5], the vector becomes [1 2 3 4]).
my code
[1,2,3,4];

Answers

Answer:

Explanation:

that is correct 1234

Which option in a Task element within Outlook indicates that the task is scheduled and will be completed on a later
date?
O Waiting on someone else
O In Progress
O Not started
O Deferred

Answers

I think it’s in progress

Answer: D: Deferred

Explanation:

took test

Write a Python program (rainfall.py) to collect data and calculate the average rainfall over a period of years. The program should first ask for the number of years. Then for each year, the program should ask twelve times, once for each month, for inches of rainfall for that month. At the end, , the program should display the number of months, the total inches of rainfall, and the average rainfall per month for the entire period.

Your program should contain two functions:

(1) rainfall(year): This function takes in a year (integer) as a parameter, and returns two values (totalMonths and totalRainfall). In this function, you need to use nested loop. The outer loop will iterate once for each year. The inner loop will iterate twelve times, once for each month. Each iteration of the inner loop will ask the user for inches (float) of rainfall for that month. After all iterations, the function should return the number of months (totalMonths) and the total inches of rainfall (totalRainfall). (Submit for 4 points)

(2) __main__: In the main, you do the following: (Submit for 6 points)

a. Prompt the user to input the number of years. Reprompt the user if the number of years is 0 or less. Hint: use a while loop.
b. Call rainfall(year) and pass to it the value entered above.
c. Calculate the average based on the returned values from rainfall function.
d. Display the number of months, the total inches of rainfall, and the average rainfall per month for the entire period.

Answers

Answer:

def rainfall(year):

   totalMonths = totalRainfall = 0

   for y in range(year):

       for month in range(12):

           rainfall = float(input(f"Enter inches of rainfall for month #{month+1}: "))

           totalRainfall += rainfall

   totalMonths = year * 12

   return totalMonths, totalRainfall

def __main__():

   while True:

       year = int(input("Enter the number of years: "))

       if year > 0:

           break

   numberOfMonths, totalRainfall = rainfall(year)

   averageRainFall = totalRainfall / numberOfMonths

   print(f"\nTotal number of months: {numberOfMonths}")

   print(f"The total inches of rainfall: {totalRainfall}")

   print(f"The average rainfall per month for the entire period: {averageRainFall}")

if __name__ == '__main__':

   __main__()

Explanation:

Create a function named rainfall that takes year as a parameter

Inside the function:

Create a nested for loop. The outer loop iterates for each year (The range is from 0 to year-1) and the inner loop iterates for each month of that year (The range is from 0 to 11). Inside the inner loop, ask the user to enter the rainfall for that month. Add the rainfall to the totalRainfall (cumulative sum)

When the loops are done, calculate the totalMonths, multiply year by 12

Return the totalMonths and totalRainfall

Inside the main:

Create a while loop that asks user to enter the number of years while it is greater than 0

Call the rainfall function, passing the year as parameter. Set the numberOfMonths and totalRainfall using the rainfall function

Calculate the averageRainFall, divide totalRainfall by numberOfMonths

Print the results

What is your favorite LEGO set

Answers

Answer:

star wars death star....

i like any of them they are all so cool lol

hy plzz help me friends​

Answers

Answer:

Ok so RAM is Random-Access-Memory.

RAM can store data just like in a hard drive - hdd or solid state drive - ssd

but the thing is that ram is really fast and data is only stored when RAM chips get power. On power loss your all data will be lost too.

ROM thanslates to Read-Only-Memory - so data in ROM chips can't be modifyed computer can just read the data but not write.

Read-only memory is useful for storing software that is rarely changed during the life of the system, also known as firmware.

Have a great day.

Explanation:

Answer:

Ram which stands for random access memory, and Rom which stands for read only memory are both present in your computer. Ram is volatile memory that temporarily stores the files you are working on. Rom is non-volatile memory that permanently stores instructions for your computer

A musician has recorded some initial ideas for new songs which she wishes to share with her bandmates. As these are initial ideas she is not too concerned about the quality of the audio files she will send, but does wish the size of the files to be as small as possible so they can be easily downloaded by her bandmates, including using mobile data. Which of the following should she do to meet these requirements? Select two answers.
Save the audio using a high sampling rate.
Save the audio using a low sampling rate.
Save the audio using a low bit depth.
Save the audio using a low amplitude (volume).

Answers

Answer:

1.save the audio using a low sampling rate

2.save the audio using a low bit depth

Explanation:

1. if the quality of the audio is low then the size of the audio will also be low and which will make the size of the data to be less and also easier to download

Your co-worker who went to UCLA tells you that DHCP is not enabled at your new job, so you should just use the same IP address that you have at home to connect to the internet. He told you it should work because your computer is communicating with a unique public IP address at home, so no other computer in the world would have it. When you try this, your computer does not have internet access. Give two reasons why?

Answers

Answer:

1. internet connection is not enabled on the computer.

2. The DHCP server in the company is not enabled as well.

Explanation:

For a user to access the internet, the computer must have a public IP address that is either assigned to it by a service provider or dynamically from the DHCP server in the computer. In the case of the former, the user just needs to enable the internet connection to obtain the unique IP address.

If the DHCP server or the internet connection is not enabled, the user would not have access to the internet.

Where can the Field Service Manual containing Critical Callout, Disassembly and Reassembly instructions be found?

Answers

Answer:

Somewhere

Explanation:

See the lseek_example.c file. Modify the lseek_example.c, such that it reads from an input file (named "start.txt") and will print to an output file (named "end.txt") every (1+3*i)th character, starting from the 1st character in the input file. In other words, it will print the 1st character, then skip 2 characters and print the 4th one, then skip 2 characters and print the 7th one, and so on.
For instance, for input file:
ABCDEFGHIJKLM
It will output:
ADGJM
Iseek_example.c file contant:
// C program to read nth byte of a file and
// copy it to another file using lseek
#include
#include
#include
#include
void func(char arr[], int n)
{
// Open the file for READ only.
int f_read = open("start.txt", O_RDONLY);
// Open the file for WRITE and READ only.
int f_write = open("end.txt", O_WRONLY);
int count = 0;
while (read(f_read, arr, 1))
{
// to write the 1st byte of the input file in
// the output file
if (count < n)
{
// SEEK_CUR specifies that
// the offset provided is relative to the
// current file position
lseek (f_read, n, SEEK_CUR);
write (f_write, arr, 1);
count = n;
}
// After the nth byte (now taking the alternate
// nth byte)
else
{
count = (2*n);
lseek(f_read, count, SEEK_CUR);
write(f_write, arr, 1);
}
}
close(f_write);
close(f_read);
}
// Driver code
int main()
{
char arr[100];
int n;
n = 5;
// Calling for the function
func(arr, n);
return 0;
}

Answers

Answer:

See the lseek_example.c file. Modify the lseek_example.c, such that it reads from an input file (named "start.txt") and will print to an output file (named "end.txt") every (1+3*i)th character, starting from the 1st character in the input file. In other words, it will print the 1st character, then skip 2 characters and print the 4th one, then skip 2 characters and print the 7th one, and so on.

For instance, for input file:

ABCDEFGHIJKLM

It will output:

ADGJM

Iseek_example.c file contant:

// C program to read nth byte of a file and

// copy it to another file using lseek

#include

#include

#include

#include

void func(char arr[], int n)

{

// Open the file for READ only.

int f_read = open("start.txt", O_RDONLY);

// Open the file for WRITE and READ only.

int f_write = open("end.txt", O_WRONLY);

int count = 0;

while (read(f_read, arr, 1))

{

// to write the 1st byte of the input file in

// the output file

if (count < n)

{

// SEEK_CUR specifies that

// the offset provided is relative to the

// current file position

lseek (f_read, n, SEEK_CUR);

write (f_write, arr, 1);

count = n;

}

// After the nth byte (now taking the alternate

// nth byte)

else

{

count = (2*n);

lseek(f_read, count, SEEK_CUR);

write(f_write, arr, 1);

}

}

close(f_write);

close(f_read);

}

// Driver code

int main()

{

char arr[100];

int n;

n = 5;

// Calling for the function

func(arr, n);

return 0;

}

Explanation:

Arnie is planning an action shot and wants the camera to move smoothly alongside his running characters. He is working on a tight budget and can’t afford expensive equipment. What alternatives could you suggest?

Mount the camera on a wagon, wheelchair, or vehicle and move it next to the characters.
Rearrange your script so you don’t need to capture the motion in that way.
Try running next to the characters while keeping the camera balanced.
See if you can simulate the running with virtual reality.

Answers

Camera and wagon are answer

Which statement about the Weather Bar in the Outlook calendar is true?

A.It displays weather for the current location for five days.
B.It does not require an internet connection to update.
C.Additional cities can be added for travel needs.
D.It sends pop-up alerts about severe weather.

Answers

Answer:

C

Explanation:

Libby’s keyboard is not working properly, but she wants to select options and commands from the screen itself. Which peripheral device should she use?
A.
voice recognition
B.
microphone
C.
mouse
D.
compact disk

Answers

C. mouse is the answer

When text is used as a Hyperlink, it is usually underlined and appears as a different color.

Question 3 options:
True
False

Answers

True it usually shows up with a blue underline

please help me faster plzzz
correct plzz​

Answers

Answer:

a. A numeric keypad.

b. An interpreter.

c. A 3D printer.

d. A speaker.

Explanation:

An output device can be defined as a hardware device that typically receives processed data from the central processing unit (CPU) and converts these data into information that can be used by the end user of a computer system.

Also, an input device can be defined as any device that is typically used for sending data to a computer system.

Generally, all of the output and input device of a computer are known as peripheral (external) devices and they provide data (informations) to the end users in various formats such as video, audio, texts, images etc.

Since output and input devices are peripheral (external) devices, they can be connected to the computer system wirelessly or through a wired-connection (cable).

Some examples of peripheral (external) devices are monitor, speakers, keyboard, printer, mouse, scanner, projector etc.

Basically, the three (3) key element of a computer system are: a set of memory modules, processor and a set of input-output (I/O) modules. Each of the input-output (I/O) module interfaces to the central switch or system bus and are used to control one or more peripheral (external) devices.

a. A numeric keypad is a device used to input a PIN. It comprises of numbers ranging from 0 to 9.

b. An interpreter analyses and executes a program line by line.

c. A 3D printer produces output in the form of solid objects. It is typically used for inscribing or printing textual informations or graphic images on an object in three dimensions.

d. A speaker produces output in the form of sound. It is an electronic device that converts electrical signals into sound energy (waves).

Can i get any information on this website i'd like to know what its for ?
https://www.torsearch.org/

Answers

Explanation: torsearch.org is a safe search engine mainly used for dark wed purposes. It does not track your location nor give any personal information.

Other Questions
Define the following terms:1. Shadow2. Pinhole camera3. Screen Keiko deposits $3000 into an account that pays simple interest at a rate of 2% per year. How much interest will she be paid in the first 5 years? 5(2 + (9)) + (25) :( SUN : RADIANT ::a. warm : hotb. glowing : moonc. star: smalld. perfume : fragrant Do you think using figurative language to convey the theme is more effective than using direct statements? Why or why not? Please help Meals are cooked in a process with two resources. The first resource has a capacity of 28 meals per hour. The capacity of the second resource is 24 meals per hour. The first resource has 9 workers and the second resource has 8 workers. Demand for this process is 31 meals per hour. Wages are $24 per hour. Instruction: Round your answer to four decimal places. What is the cost of direct labor (in $s)? _____________ per unit hi did i even send this Monochromeis a word that would be used to describe _______.the environmentfarm animalsa photograph or paintingmachine or mechanics In the diagram, R, S, and T are all points of tangency. What is the perimeter of TriangleXYZ? help help help help help help help help how is climate change affecting the life of antarctica's sea animals? 13.2 inches is 27.5% of what number? Imaginary numbers. What is (-i)^5? On January 1, 2019, Tonika Company issued a four-year, $10,700, 7% bond. The interest is payable annually each December 31. The issue price was $10,018 based on an 8% effective interest rate. Tonika uses the effective-interest amortization method. Rounding calculations to the nearest whole dollar, which of the following journal entries correctly records the 2019 interest expense?A. Interest expense 1,052 Bond discount 205 Cash 847 B. Interest expense 847 Cash 847 C. Interest expense 805 Bond discount 42 Cash 847 2 sin^2 (x) + 3 sin (x) + 1 = 0help me find the solution Which postulate, if any can be used to prove the triangles congruent the eye is a delicate organ, which is formed from multiple_____?AHHHH please helpp!!! A. The number of dollars is always more than the number of dimes.B. The number of dimes will always be an even number.C. The number of dollars must be even to follow the rule.D. The number of dimes will always be less than the number of dollars. Which quadratic function in vertex form can be represented by the graph that has a vertex 3.-7) and possesthrough the point (1.-10)A-y=3/4(x+3)^2+7B-y=-3/4(x+3)^2-7C-y=3/4(x-3)^2+7D-y=-3/4(x-3)^2-7 Transpiration is the loss of oxygen through a plants leaves true or false