1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Valentin [98]
3 years ago
10

You're trying to decide which disk technology to use on your new server. the server will be in heavy use around the clock every

day, so high performance is a necessity. which technology is the best choice?
Computers and Technology
1 answer:
chubhunter [2.5K]3 years ago
3 0
The correct answer would be "SAS"
You might be interested in
The spreadsheet below shows the age, grade level, major, and minor of four students in college. A purple background in the Major
LiRa [457]

Answer:

apply a filter by age with a value more than 20

Explanation:

First, we must create the spreadsheet with the fields student, age, grade level, major and minor.

For example:

If we want to create a filter, we must mark headings with the left click, then we must go to the tab Home --> at the section Editing, click in Sort & filter then Filter.

We must click in the field Age --> number filters --> greater than 20.

8 0
3 years ago
The picture that graphically since the items you use in windows is called
katrin2010 [14]
Flip board or in some cases it is called a life at a glance
5 0
3 years ago
the easiest and cheapest time to alter the information system is in the ________ phase of the sdlc. a. requirements analysis b.
nignag [31]
I would think its the "<span>requirements analysis" phase.

Because the </span>requirements analysis<span>,</span><span> is the process of determining user expectations for a new or modified product.</span>
7 0
3 years ago
Where is the worlds biggest cookie​
rjkz [21]

I believe the cookie monster has it

3 0
3 years ago
Read 2 more answers
Which is a description of phishing?
kodGreya [7K]

Answer:

C. sending emails impersonating legitimate companies in an attempt to learn a recipient's personal information

7 0
3 years ago
Other questions:
  • If two cars got to a four way stop intersection at the same time which car should be yield the right-of- way
    12·1 answer
  • Which network media uses different regions of the electromagnetic spectrum to transmit signals through air?
    13·1 answer
  • A special type of loans for houses
    9·2 answers
  • 2. How is accessing the Internet through a home network and public Wi-Fi similar?​
    15·1 answer
  • What is a feature of readable code?
    12·2 answers
  • Travis just got promoted to network administrator after the previous administrator left rather abruptly. There are three new hir
    14·1 answer
  • Heeeeeeeelp :)<br> thx<br> jfdyiusjmkdsuiho;dmcvrvho;j
    5·2 answers
  • What are the main security weaknesses of coaxial cable, twisted pair cable, and fiber optic cable? How might the router itself b
    8·1 answer
  • What kind of energy transformation occurs when you call someone on a cell phone?
    11·1 answer
  • Which of the following is not considered essential for an electronic device to be called a computer?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!