1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
stealth61 [152]
1 year ago
3

you are working as a cybersecurity expert in an enterprise. while examining the newly established enterprise network, you found

that when a request to write data to the drive is made, the controller sends that request to each drive. when a read action is required, the data is read twice, once from each drive. which type of raid is used in the newly established network?
Computers and Technology
1 answer:
Zolol [24]1 year ago
6 0

Based on the information provided, it appears that the enterprise network uses a RAID 1 configuration.

<h3>What is RAID 1?</h3>

RAID 1 is a type of RAID (Redundant Array of Independent Disks) configuration in which data is mirrored across two or more drives, so that the same data is written to each drive.

This provides redundancy and improved data availability, since the data can still be accessed even if one of the drives fails.

In a RAID 1 configuration, when a request to write data to the drive is made, the controller sends the request to each drive, and the data is written to both drives simultaneously.

When a read action is required, the data is read from both drives and compared to ensure that the data is consistent and accurate.

The description of the enterprise network's behavior matches the characteristics of a RAID 1 configuration, so it is likely that this is the type of RAID used in the newly established network.

To Know More About Data redundancy, Check Out

brainly.com/question/13438926

#SPJ4

You might be interested in
Analyze the given word pattern and choose the correct option.
frozen [14]

Answer:

The code for DOOR would be <u>3775</u>.

Explanation:

WORD - 9753

W - 9

O - 7

R - 5

D - 3

DOOR: 3775

5 0
2 years ago
What task did the u.s. government undertake that many people identify as the birth of the internet
blsea [12.9K]
The answer is a. the government developed a computer system to be used in military communications. It started in the 1960s and was developed and used to serve as communication without experiencing disturbances from bombs and gain security for military purposes. This was the time when ARPANET (Advanced Research Projects Agency Network) came into the picture. Soon it was opened to people starting from the 70s when emails were used and became more popular. It then paved for further development and largely contributed to technology and communication.
8 0
3 years ago
Read 2 more answers
Assume that ip1, ip2, and ip3 have already been declared to be of type "pointer to int". Assume further that each of these point
kaheart [24]

Answer:

void main(){

int *ip1,*ip2,*ip3;

printf("Enter values for ip1 and ip2\n");

scanf("%d\n",ip1);

scanf("%d\n",ip2);

*ip3=*ip1+*ip2;

}

Explanation:

*ip3=*ip1+*ip2;

this statement is used to add the values of two pointer variables and storing it in third pointer variable.

*ip1 --->ip1 gives address location of the variable and *ip1 gives the value stored at that address location

5 0
4 years ago
Which act requires financial institutions to ensure the security and confidentiality of customer data and mandates that data mus
Shalnov [3]

Answer:

Gramm-Leach-Bliley Act is the correct answer.

Explanation:

8 0
3 years ago
Which dialog box enables you to customize how Word automatically changes and formats items in a document as you type
ddd [48]
N the Track Changes dialog box, you can control how you want markup to appear in your document.
7 0
3 years ago
Other questions:
  • Which of the following are options when using the Select tool in Paint? (Select all that apply.)
    8·1 answer
  • If someone were unable to pay cash right now, which financing option would be best for the laptop and for the refrigerator?
    10·2 answers
  • Which routine is configured to execute first when the program runs?
    7·1 answer
  • From the standpoint of the governing bodies of .com, why is it important that owners of individual domains maintain authoritativ
    5·1 answer
  • Which of the following is an individual’s social equals?
    6·1 answer
  • What are procedures that help keep a data base current
    7·2 answers
  • Will Give Brainliest
    10·1 answer
  • What is the purpose of exploring data?
    6·2 answers
  • Why does 5G mmWave require more cells to achieve a better signal?
    10·1 answer
  • Why do we buy new asset​
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!