1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ipatiy [6.2K]
3 years ago
14

What feature new to Windows Server 2012 provides the ability to find identical sets of data on a SAN based storage array and red

uce the identical sets to a single instance, in order to reduce space
Computers and Technology
1 answer:
igor_vitrenko [27]3 years ago
7 0

Answer:

Data Deduplication

Explanation:

In computing, data deduplication is a technique for eliminating duplicate copies of repeating data. This is also called single-instance storage.

Only applicable to Windows Server 2012 and newer versions, Data deduplication techniques ensure that only one unique instance of data is retained on storage media, such as disk, flash or tape.

Cheers

You might be interested in
your manager asked you to set up a secure network connection at a remote site to move over some back ups. what protocol what do
Ivan

The protocol that should be used to establish a secure network connection for backups is SSH.

<h3>Secure Shell</h3>

SSH stands for <u>Secure Shell</u>. SSH is a <u>protocol that allows users to remotely control and modify servers</u>. SSH is commonly used by administrators to manage certain systems or applications remotely. So the admin can enter the computer via the network, then run various commands to modify or manage files from one computer to another.

SSH has several crucial functions for managing data transfer traffic. Specifically, the following are the functions and benefits of SSH:

  • Securing remote access to SSH-enabled systems or network devices for the user and processing them automatically.
  • SSH will automatically terminate the connection if there is suspicious activity on the connection used. So you can avoid various cyber threats such as IP and DNS spoofing, data manipulation, illegal tracking, and others.
  • Perform automatic and secure file transfers.
  • Launch commands securely on remote devices or systems.
  • Perform secure component management of network infrastructure.

Learn more about Secure network connection: brainly.com/question/28083478

#SPJ4

8 0
1 year ago
Quiz #1: In Fnaf 4 After chris gets bit by Fredbear what animatronic does he start to possess and how does he die?
GalinKa [24]

Answer:

He starts to posess freddy and he dies in his sleep Which is in Fnaf 4. Freadbear crushed his skull.

Explanation:

4 0
3 years ago
Read 2 more answers
Describe Mr. Digby, the principal. ​
Gennadij [26K]

Answer:

stinky

Explanation:

7 0
3 years ago
How do headphones work? (From pc)
____ [38]
<span>Large headphones are essentially just two loudspeakers mounted on a strap that clamps firmly over your head. Earbuds work the same way but, as you would expect, everything inside them (the magnet, the coil of wire, and the diaphragm cone that makes sound) is shrunk down to a much smaller size.</span>
5 0
3 years ago
How many fixes are available for Adobe Photoshop CS4 (64 Bit)?
arsen [322]

Answer:

There are three (3) fixes in adobe cs4.

Explanation:

Adobe photoshop cs4 is a version of the creative cloud's professional graphic applications used to edit pictures, design interfaces, make graphical illustrations, draw and animate the drawings, etc.

It can be installed in several computer operating system platforms like linux, mac and windows. The adobe photoshop cs4 doesn't support the windows installation and might run into several issues. There are other issues in other supported platforms, but unlike for windows, there are three fixes for these problems.

4 0
3 years ago
Other questions:
  • Interpretations of​ Moore's law assert​ that:
    13·1 answer
  • The weird suspicious box that k12 sends the parents to put on the router. im getting strange privacy error messages on google an
    8·1 answer
  • You are preparing to program a replacement system board, but the "system is booting in mpm mode" message is not displayed. what
    10·2 answers
  • Your browsing the Internet and realize your browser is not responding which of the following will allow you to immediately exit
    14·2 answers
  • Use a switch statement to display "one" if the user has entered 1, "two" if the user has entered 2, and "three" if the user has
    14·1 answer
  • 1. Why is photographing lightning a difficult process?
    11·2 answers
  • Ben is writing a paper for his college history class, and he wants to include some information he found on a Web site. What are
    5·1 answer
  • Question 1 of 10 Chase lives in Oregon but works for a company that is located in Florida. What business trend is this an exampl
    11·2 answers
  • Which information can you apply to every page of your document with the page layout options?
    9·1 answer
  • Instructions: Write a program that calculates the amount of ingredients needed for various flavors of cheesecake.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!