1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
NeX [460]
3 years ago
10

You are concerned about fault tolerance for the database server you manage. You need to ensure that if a single drive fails, the

data can be recovered. What RAID level would be used to support this goal while simultaneously distributing parity bits?
A) RAID 0
B) RAID 1
C) RAID 3
D) RAID 5
Computers and Technology
1 answer:
Fiesta28 [93]3 years ago
5 0

Answer:

D. RAID 5

Explanation:

Raid ( Redundancy array of inexpensive disk or drives) levels are used to boost performance and reliability of storage devices. They consist of hard drives or solid state drives working parallel to each other.

There are different levels of RAID, they are;

Raid 0, 1, 2, 3, 4, 5 and 10. Raid 2, 3, 4 and 7 are not really is use, so, we pay attention to 0, 1, 5 and 10.

Raid 0 only splits data to not list two drives and are not redundant. Raid 1 mirrors or reflects data on at least two drives and are also not redundant.

Raid 5 is redundant as it share data and parity bits between 16 or more drives.

Unlike Raid 5, Raid 10 does not have parity bits.

You might be interested in
George has a set of software programs installed on his computer to create a digital portfolio. He is not sure what each program
d1i1m1o1n [39]

Explanation:

I thinkcreating and edditing Images matchs to adobePhotoshop

Microsoft word is for adding and Creating text document

Creating andeditingpage layout -Adobe In Design

Desktop Publication-QuarkQuark Xpress

I hope thishelp and If wrong Inform me

Good luck

8 0
2 years ago
Read 2 more answers
Suppose we have a relation schema R(A, B, C) with FD A rightarrow B. Suppose also that we decide to decompose this schema into S
4vir4ik [10]

Answer:

Check the explanation

Explanation:

A relation schema is the fundamental schema for a table. Which is In a relational kind of database (what individuals naturally refer to when they talk about database) each take can be referred to as a "relation" . therefore a relational schema is the design for the table.

kindly check the attached image below to see the step by step solution to the question.

7 0
3 years ago
Which issue of computer ethics is concerned about the technological division in the society?​
Molodets [167]

Answer:

There are many legal and ethical issues with computers that can be exploited by bad people to do bad things. Some of those issues include illegal music and video file downloading, spyware, identity theft, phishing, keystroke logging, packet sniffing and cyberbullying

7 0
3 years ago
Read 2 more answers
See the lseek_example.c file. Modify the lseek_example.c, such that it reads from an input file (named "start.txt") and will pri
andre [41]

Answer:

See the lseek_example.c file. Modify the lseek_example.c, such that it reads from an input file (named "start.txt") and will print to an output file (named "end.txt") every (1+3*i)th character, starting from the 1st character in the input file. In other words, it will print the 1st character, then skip 2 characters and print the 4th one, then skip 2 characters and print the 7th one, and so on.

For instance, for input file:

ABCDEFGHIJKLM

It will output:

ADGJM

Iseek_example.c file contant:

// C program to read nth byte of a file and

// copy it to another file using lseek

#include

#include

#include

#include

void func(char arr[], int n)

{

// Open the file for READ only.

int f_read = open("start.txt", O_RDONLY);

// Open the file for WRITE and READ only.

int f_write = open("end.txt", O_WRONLY);

int count = 0;

while (read(f_read, arr, 1))

{

// to write the 1st byte of the input file in

// the output file

if (count < n)

{

// SEEK_CUR specifies that

// the offset provided is relative to the

// current file position

lseek (f_read, n, SEEK_CUR);

write (f_write, arr, 1);

count = n;

}

// After the nth byte (now taking the alternate

// nth byte)

else

{

count = (2*n);

lseek(f_read, count, SEEK_CUR);

write(f_write, arr, 1);

}

}

close(f_write);

close(f_read);

}

// Driver code

int main()

{

char arr[100];

int n;

n = 5;

// Calling for the function

func(arr, n);

return 0;

}

Explanation:

3 0
3 years ago
Expliquer les règles à respecter quand on fait une recherche sur internet.
Illusion [34]

Answer:

Explanation:

Step one

We must analyze all the possibilities like tools, search engines, and what kind of information we need.

Step two

We must administrate keywords, we can make a keywords research or hire a SEO expert.

Step three

We must study the first search and do notes about it, and get the first data.

Step forth

We can start with the entire research on the internet, we must visit several sites and levels surfing.

8 0
3 years ago
Other questions:
  • Electrical pressure is also called
    5·2 answers
  • A(n) _____ allows a user to choose specific files to back up, regardless of whether or not the files have been changed.
    9·1 answer
  • The various online technology tools that enable people to communicate easily via the Internet to share information and resources
    5·1 answer
  • A _____________ is a piece of information sent to a function.<br> The answer is parameter :)
    12·1 answer
  • The _____ handles the instructions for your computer to start up before the operating system is loaded.
    10·1 answer
  • Plz answer all the questions :)
    5·1 answer
  • Which unit of computer is used to processed data?​<br>Please help!!!!!!
    7·2 answers
  • Do you think JNK should be more ethical?
    6·1 answer
  • Which statement best describes the computers all around us?
    15·1 answer
  • PLEASE ANSWER LAST DAY OF SCHOOL. Discussion Topic
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!