1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liraira [26]
3 years ago
14

All drives in a computer have how many connections.

Computers and Technology
1 answer:
Lorico [155]3 years ago
7 0

Answer:

 The oldest of the hard drive connections are the SCSI (Small Computer System Interface) types.  The 50 pin flat ribbon cable connectors were found in all sorts of computers and servers from their introduction in 1986 until the mid 1990's.  

They are still in use today, albeit in their updated Ultra SCSI form which uses either 68 or 80 pin connectors along with a pinless plug that is similar to a USB connection.  Up to 16 drives/devices can be connected through SCSI connections.  {The common alternative to SCSI connectors is the IDE connection.  Also known as ATA or PATA, IDE drives use a 40 pin flat ribbon cable and are limited to just two drives per cable.  These drives were initially developed for IBM PCs. }

Introduced in 2005 as a replacement for Ultra SCSI, SAS drives, or Serial Attached SCSI, share many common features with regular SCSI but offer many improvements. While SCSI drives can only run a single communication in the order it's received, SAS drives allow for multiple simultaneous communications through less numbers of pins and higher speeds.  SAS plugs look similar to those found on SATA devices but have seven additional pins for a total of 29 (14 for data, 15 for power). SAS systems can also handle upwards of 66,000 devices per controller.  

SATA, or Serial ATA, drives are similar to SAS but have a simplified plug with 15 power and seven data connections.  SATA drives can technically plug directly into any cable that accepts a SAS drive but it may not been by the computer it is connected too if it doesn't support SATA drives on a SAS system.

Finally, FC or Fibre Channel drives are designed for larger storage systems that use fiber optic interconnects between the server and drive enclosures.  The connections on Fibre Channel drives typically prevent them from being used with other drive types due to their specialty nature but since they are based on SCSI technology, they work easily with many different server systems.

You might be interested in
how can cindy collaborate with mallory in order for cindy to be able to decrypt all subsequent encrypted messages that are sent
Olenka [21]

Cryptography, like digital signatures, is used to accomplish nonrepudiation, which also includes services for authentication, auditing, and logging.

Digital signatures in online transactions make assurance that a party cannot later dispute the sending of information or the validity of its signature. Alice can encrypt the communication using her own Private Key. As a result, only her public key, which she is aware Bob (and everyone else) has access to, may be used to decrypt her message. Bob receives the message, and he uses Alice's public key to decrypt it. Secret key cryptography (symmetric encryption): To encrypt and decrypt given messages, both the sender and the receiver must use the same key.

Learn more about information here-

brainly.com/question/15709585

#SPJ4

6 0
1 year ago
Why we need to measure the amperage of an electric current?​
Romashka [77]

Answer:

Explanation:It is very important to have a way to measure and quantify the flow of electrical current. When current flow is controlled it can be used to do useful work. The flow of electrons is measured in units called amperes. The term amps is often used for short

5 0
3 years ago
A broadcast network is one in which a transmission from any one attached station is received by all other attached stations over
love history [14]

Answer:

In a broadcast network such as radio network for example a walkie talkie, the broadcasted transmission is received equally by all receivers indiscriminately which may lead to dissemination of classified information to an unauthorized receiver, therefore, the network layer is required is needed to ensure proper routing of the information

Similarly, when the all the broadcasters in one location are each trying to send messages to different receivers at another given location, there would be potential for network congestion and it would be difficult to send information through the network

When there is need for priority service the presence of a network layer is needed in the network

However, when the above functions performed by the network layer is not required, then, the network layer can be excluded, such as the communication between layers 4 - 7 of the OSI model

Explanation:

8 0
3 years ago
What are the two types of disks that make up tiered storage?
Andrej [43]
Tiered storage is an underlying principle of ILM (<span>information lifecycle management</span>). It is a storage networking method where data is stored on various types of media based on performance, availability and recovery requirements. For example, data intended for restoration in the event of data loss or corruption could be stored locally -- for fast recovery -- while data for regulatory purposes could be archived to lower cost disks.
6 0
3 years ago
What are some industries of aerodynamics and hydrodynamics? explain each one in detail.
maria [59]
Aerodynamic- Wind turbine, computational fluid dynamics, and Wind power

Hydrodynamics- Computational Fluid Dynamics, Hydraulics, and Microfluidics
3 0
2 years ago
Read 2 more answers
Other questions:
  • Digital art is created by using
    6·1 answer
  • Jerry suspects that information about his internet usage was sent to external websites without his knowledge. He is wary about t
    9·1 answer
  • again assume that each of the resistors in the circuit shown above has a resistance value of 100k(question in the picture above)
    9·1 answer
  • Using bearings will cause more friction. Group of answer choices True False
    10·1 answer
  • What is database design?
    6·1 answer
  • Assume variables SimpleWriter out and int n are already declared in each case. Write a while loop that printsA. All squares less
    11·1 answer
  • Write one line Linux command that performs the required action in each of the problems given below: (a) Find the difference in t
    12·1 answer
  • Subscribe to my you tube channel to get all your questions answered
    8·1 answer
  • What is the purpose of a format painter in Word?
    15·2 answers
  • In computer science what are the methods used to protect the information stored by a piece of software called?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!