1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sweet [91]
3 years ago
11

Businesses sometimes achieve uninterruptible service by using a technology known as ____ to keep a mirror copy of all their data

.
a) RFID
b) RAID
c) WPA
d) OnTrack
Computers and Technology
1 answer:
crimeas [40]3 years ago
6 0

Answer:

Option b is the correct answer for the above question.

Explanation:

RAID is a data storage technology that is used to store the data virtually. It keeps a copy of all data so that the data can be recover when it lost from the physical storage. Generally, logical storage is also physical for the computer system. It means that the disk is divided into two parts some parts of the system are physical and some are logical.

The question asked about the technology which solves the problem of interrupting the service. The technology can be RAID as described above . hence Option b is the correct answer while other is not because--

  • Option 'a' states about RFID technology which use in an electromagnetic field.
  • Option c states about WPA which is a protection mechanism.
  • Option d states about OnTrack which is not a technology.
You might be interested in
A keyboard, mouse, and microphone are examples of ________.
kykrilka [37]

Answer:

A keyboard, mouse, and microphone all are examples of <u>peripheral devices.</u>

Explanation:

hope this helps

5 0
3 years ago
Read 2 more answers
What does "ttyt" stand for?
EastWind [94]
TTYT stands for "talk to you tomorrow".
6 0
4 years ago
Read 2 more answers
Computer professionals known as software engineers, or Blank______, use the software development life cycle to create software r
Aloiza [94]

Answer:

Computer professionals known as software engineers, or programmers use the software development life cycle to create software required for information systems.

Explanation:

Computer professionals are called software engineers and programmers because they develop and program software. Some additional titles for computer professionals are hardware engineers and iOS/Android developers.

5 0
2 years ago
If u reading this ,DO THAT WORK
Ivenika [448]
I am.


Explanation


Characters
7 0
2 years ago
Public-key cryptography (a form of asymmetric cryptography) is an encryption method that's widely used because: 1) it is computa
rosijanka [135]

Answer:

C.

Explanation:

7 0
3 years ago
Other questions:
  • convert the following c code to mips. assume the address of base array is associated with $s0, n is associated with $s1, positio
    14·1 answer
  • 1. To type a capital "C", you would use the ring finger of your left hand.
    15·2 answers
  • Please help!! Even if you help a little I will be very thankful!
    7·1 answer
  • Air circulation is caused by ... A Earth's rotation around the sun B winds that move vertically C moving air between hot and col
    11·1 answer
  • A(n) _____ describes your core values and highest career goals. A. résumé B. objective statement C. qualifications profile D. pe
    7·2 answers
  • Program ____ use graphical symbols and relational operators (such as &lt; for "less than" and = for "equal to") to portray the s
    8·1 answer
  • All computer systems have
    14·2 answers
  • When clients connect to a web server using the _________ method, the server logs them on using the iusr account, by default?
    14·1 answer
  • Zack sees an online contest. He could win $10,000 instantly! On the sign-up form he enters his name and email address. He is als
    9·1 answer
  • Imagine that you are a professional white hat hacker, testing a company’s system to make sure they are ready for attacks. What m
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!