1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leokris [45]
3 years ago
9

You have a site (Site1) that has about 20 users. For the last few months, users at Site1 have been complaining about the perform

ance when accessing multiple files at the corporate office, particularly if the files are relatively large. They have no dedicated server to configure DFS replication. Therefore, what else can you do to improve performance when accessing these files?
Computers and Technology
1 answer:
SIZIF [17.4K]3 years ago
6 0
Upgrade Site1's (probably WAN) network connection.
You might be interested in
A _______ object is used for storing data.
Art [367]

I think it would be a hard drive

6 0
3 years ago
Read 2 more answers
Purpose In this lab activity, you will be introduced to the concept of enriching data with SPLUNK. This three-hour course is for
Vikki [24]

A person can enrich data in Splunk by

  • Preparing  to know data that is using Splunk to known the required fields in the data.
  • One need to think of this as if one is seeing pieces in a puzzle, then one can notice their shapes.
  • The next step is that one need to categorize data as a kind of a preamble before the act of aggregation and reporting.

<h3>What is Enriching Your Data?</h3>

Data enrichment is known to be a kind of an augmentation and it is seen as the act or the process of making better an existing information by the use of a  supplementing missing or any kind of incomplete data.

<h3> What is a Lookup?</h3>

Data Lookup is known to be the method used to make plenty any information based on rules.

Hence, A person can enrich data in Splunk by

  • Preparing  to know data that is using Splunk to known the required fields in the data.
  • One need to think of this as if one is seeing pieces in a puzzle, then one can notice their shapes.
  • The next step is that one need to categorize data as a kind of a preamble before the act of aggregation and reporting.

Learn more about SPLUNK from

brainly.com/question/26470051

#SPJ1

8 0
2 years ago
Write the definition of a method printDottedLine, which has no parameters and doesn't return anything. The method prints to stan
Bond [772]

Answer:

public static void printDottedLine()

{

  System.out.println(".....");

}

Explanation:

The above written code is in JAVA and it is the method definition of the method mentioned in the question.Since the method returns nothing hence it's return type is void and it does not have any arguments hence there is nothing written in the parenthesis.In JAVA System.out.println is used for standard output and trminates them by newline.

3 0
3 years ago
The class at the top of exception class hierarchy is ..........................
Lynna [10]

Answer:

<u>B) Throwable</u>

Explanation:

Great question, it is always good to ask away and get rid of any doubts that you may be having.

There are a wide range of classes on the exception class hierarchy. All the way on the top is the Objects Class but since that is not an available answer we will move on to the next one. The next one is the <u>Throwable</u> class. therefore that is the answer.

**Exception is after Throwable , and Arithmetic Exception is at the bottom.... everything is a class so that is not a part of the hierarchy **

I hope this answered your question. If you have any more questions feel free to ask away at Brainly.

6 0
4 years ago
What is a spreadsheet​
Delicious77 [7]
A spreadsheet function that indicates the average of a group of numbers in a range.
8 0
3 years ago
Other questions:
  • Scratch and grinding marks on sedimentary rocks indicate which type of environment?
    6·1 answer
  • Technician A says that a ratio is a comparison between two values. Technician B says that in a compression ratio, the main value
    5·1 answer
  • Match each keyboard command with its result.
    6·1 answer
  • Anthony is responsible for tuning his organization's intrusion detection system. He notices that the system reports an intrusion
    8·1 answer
  • Why might a business choose a server-based network over a peer-to-peer network?
    15·1 answer
  • In the context of computer and network security, a security system is said to possess _____ when it does not allow data to be co
    13·1 answer
  • WILL GIVE BRAINLIEST!!!!!!!
    10·2 answers
  • How does links helped a student like you in navigating the different available websites?
    5·1 answer
  • Which of the following best explains how algorithms that run on a computer can be used to solve problems?
    5·1 answer
  • A software copyright?​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!