1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ipatiy [6.2K]
3 years ago
14

What feature new to Windows Server 2012 provides the ability to find identical sets of data on a SAN based storage array and red

uce the identical sets to a single instance, in order to reduce space
Computers and Technology
1 answer:
igor_vitrenko [27]3 years ago
7 0

Answer:

Data Deduplication

Explanation:

In computing, data deduplication is a technique for eliminating duplicate copies of repeating data. This is also called single-instance storage.

Only applicable to Windows Server 2012 and newer versions, Data deduplication techniques ensure that only one unique instance of data is retained on storage media, such as disk, flash or tape.

Cheers

You might be interested in
Some computer engineering students decided to revise the LC-3 for their senior project. In designing the LC-4, they decided to c
Bezzdna [24]

Some computer engineering students decided to revise the LC-3 for their senior project.  KBSR and the DSR into one status register: the IOSR (the input/output status register). IOSR[15] is the keyboard device Ready bit and IOSR[14] is the display device Ready bit can be done in LC-3.

LC-4 is a poor design.

Explanation:

LC-3, is a type of computer educational programming language, an assembly language, which is a type of low-level programming language.

It features a relatively simple instruction set, but can be used to write moderately complex assembly programs, and is a theoretically viable target for a C compiler. The language is less complex than x86 assembly but has many features similar to those in more complex languages. These features make it useful for beginning instruction, so it is most often used to teach fundamentals of programming and computer architecture to computer science and computer engineering students.

The LC-3 specifies a word size of 16 bits for its registers and uses a 16-bit addressable memory with a 216-location address space. The register file contains eight registers, referred to by number as R0 through R7. All of the registers are general-purpose in that they may be freely used by any of the instructions that can write to the register file, but in some contexts (such as translating from C code to LC-3 assembly) some of the registers are used for special purposes.

When a character is typed:

  • Its ASCII code is placed in bits [7:0] of KBDR  (bits [15:8] are always zero)
  • The “ready bit” (KBSR[15]) is set to one
  • Keyboard is disabled -- any typed characters will be ignored

When KBDR is read:

  • KBSR[15] is set to zero
  • Keyboard is enabled
  • Alternative implementation: buffering keyboard input
8 0
3 years ago
If you were infiltrating a network (10.16.0.0/16), and searching for vulnerabilities (while trying to remain undetected), why wo
Juliette [100K]

Answer:

Yes, if you want to be undetected.

Explanation:

It is vital to always use a command that will ensure that one's activity is undetected. This is one of the important rules of corporate organizations to keep their data and activities safe and secure. The commend provided is a useful tool for detective works especially the activities of criminals and hackers. Therefore, if the admin wants to be undetected, the command should not be used.

8 0
2 years ago
Read 2 more answers
NBA bank uses centralized client server database that is accessed by all its nationwide branches. All customers' records are sto
lisov135 [29]

Answer:

NBA bank data is completely destroyed since it has not maintained any backup.

Explanation:

All businesses should maintain backup of important records. NBA bank has centralized client server database. This database record should be backup at different system which is only accessed when there is some problem in the original data. The backup system is initiated when the original database is destroyed.

4 0
3 years ago
Write an if/else statement that compares the value of the variables soldYesterday and soldToday, and based upon that comparison
jenyasd209 [6]

Answer:

if(soldYesterday > soldToday){

salesTrend = -1;

} else if(soldToday > soldYesterday){

salesTrend = 1;

}

Explanation:

The if/else statement is more explicit. The first if condition check if soldYesterday is greater than soldToday, if true, then -1 is assigned to salesTrend.

Else if soldToday is greater than soldYesterday, if true, then 1 is assigned to salesTrend.

7 0
3 years ago
Research the disadvantages of the computer and explain them.​
lisabon 2012 [21]

Answer:

Too much sitting-affects the back and makes our muscles tight

Carpal tunnel and eye strain-moving your hand from your keyboard to a mouse and typing are all repetitive and can cause injuries

Short attention span and too much multitasking-As you use a computer and the Internet and get immediate answers to your questions and requests, you become accustomed to getting that quick dopamine fix. You can become easily frustrated when something doesn't work or is not answered in a timely matter.

3 0
3 years ago
Other questions:
  • Although the battery on your smartphone is fully charged, it drains quickly. In some instances when the phone shows that the bat
    12·1 answer
  • The critical path of a network is the A. shortest time path through the network. B. path with the most activities. C. longest ti
    8·1 answer
  • The acceleration of a body is 3 metre per second square what does it mean​
    11·2 answers
  • A subroutine may be used to refer to which of the following? Check all that apply.
    15·2 answers
  • If there are 18 people in your class and you want to divide the class into programming teams of 3
    7·1 answer
  • A group of students writes their names and unique student ID numbers on sheets of paper. The sheets are then randomly placed in
    15·1 answer
  • Can someone help me get spotify premium
    7·2 answers
  • Select the correct answer from each drop-down menu. The following diagram shows four resistors. What is the effective resistance
    9·1 answer
  • 30 POINTS FOR THE CORRECT ANSWERS
    12·1 answer
  • Cable inside the computer transferring data between the mother board and storage devices.
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!