1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sweet [91]
3 years ago
11

Businesses sometimes achieve uninterruptible service by using a technology known as ____ to keep a mirror copy of all their data

.
a) RFID
b) RAID
c) WPA
d) OnTrack
Computers and Technology
1 answer:
crimeas [40]3 years ago
6 0

Answer:

Option b is the correct answer for the above question.

Explanation:

RAID is a data storage technology that is used to store the data virtually. It keeps a copy of all data so that the data can be recover when it lost from the physical storage. Generally, logical storage is also physical for the computer system. It means that the disk is divided into two parts some parts of the system are physical and some are logical.

The question asked about the technology which solves the problem of interrupting the service. The technology can be RAID as described above . hence Option b is the correct answer while other is not because--

  • Option 'a' states about RFID technology which use in an electromagnetic field.
  • Option c states about WPA which is a protection mechanism.
  • Option d states about OnTrack which is not a technology.
You might be interested in
Please, ignore
Komok [63]
Abhheoorioooooohhhhh omg
3 0
3 years ago
Read 2 more answers
Assume that word is a variable of type String that has been assigned a value. Assume furthermore that this value always contains
Valentin [98]

Answer:

   String word = "George slew the dragon";

   

   int pos = word.indexOf("dr");    

   String drWord = word.substring(pos, pos+4);

   

   System.out.println(drWord);

Explanation:

Assuming dr is always there, we don't have to check the validity of 'pos'. Normally, you would!

5 0
4 years ago
Read 2 more answers
The World Wide Web Consortium enforced a stricter set of standards in a different version of Hypertext Markup Language (HTML) ca
Eva8 [605]

Answer:

Option B is the correct answer for the above question

Explanation:

XHTML is an advanced version of HTML language which is recommended by W3C. It set the standard in 26-JAN-2000 for the XHTML which belongs to the family of HTML. XHTML is made with the help of XML and also used like XML. It used to create more secure websites.

The Above question asked about the W3C recommendation but the above paragraph described that XHTML is a W3C recommendation. Hence Option B is the correct choice answer. while the other is not because--

  • Option A suggests HTML 4.01 which is the updated version of HTML only.
  • Option C suggests XML which is used to data transfer only.
  • Option D suggests about DHTML but XHTML is a W3C recommendation
5 0
3 years ago
Which of the following things would you access from the Program & Courses page? Course descriptions Tutorial videos Account
Paraphin [41]

Course descriptions.

5 0
3 years ago
Plz show working for binary addition. please solve. 11000 + 110101 + 101011​​
IrinaVladis [17]

Answer:

thats would be 222112 <3

Explanation:

t

5 0
3 years ago
Read 2 more answers
Other questions:
  • What bus carries a status signal back to the CPU?
    14·1 answer
  • What is an apprenticeship
    7·1 answer
  • The chief reason that family and friends are frequent targets of aggression is that
    6·1 answer
  • Name 3 examples of operating system software that are not Windows based.
    5·1 answer
  • dr. olson likes to conduct research on the nature of prejudice and its effect on behavior. dr olson is probably a (n) - psycholo
    8·2 answers
  • What can a scientist do if he repeats and experiment and gets diffrent results?
    5·1 answer
  • What is keylogging attack?
    13·2 answers
  • Wanna song to vibe to? Listen to Streets by Doja cat
    11·1 answer
  • Many digital libraries have much more information than traditional libraries
    13·1 answer
  • ________ is the art of manipulating people into breaking normal security procedures or divulging confidential information.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!