1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Katarina [22]
3 years ago
11

A technician is talking to end users about the specifications for an upgraded application server. The users of the application r

eport that there cannot be any unscheduled downtime or data loss. Additionally, they would like the performance of the application to improve over the previous server in any way possible. The previous server running RAID 5. Which of the following RAID solutions should be implemented in this scenario?
Computers and Technology
1 answer:
Anarel [89]3 years ago
4 0

Answer:

According to the requirements of users of the system, RAID 10 is more suitable option.

Explanation:

As mentioned previous server is running RAID 5, Which takes a lot of time to manage parity while reading or writing data.

On the other end RAID 10 is the combination of RAID 1 and RAID 0, It has the the features of both system.

According to the users requirement, unscheduled downtime or data loss can cannot be tolerated. So RAID 10 has the ability to access the data from multiple disks. If one disk i down, required data can be gathered from other disks.

It creates multiple duplicates of data, so risk to lose data has also been reduced.

<em>In both aspects, RAID 10 is better than RAID 5, so he choose RAID 10 for up gradation.</em>

You might be interested in
What kind of attack allows for the construction of LDAP statements based on user input statements, which can then be used to acc
abruzzese [7]

Answer:   b. LDAP injection

Explanation:

LDAP (Lightweight Directory Access Protocol ) Injection is defined as

  • an injection attack used by attacker to exploit web based applications by inserting LDAP statements based on user input.
  • It may be possible modify LDAP statements through some techniques if an application fails to properly sanitize user input.

So,<u> LDAP injection</u> is the attack that allows for the construction of LDAP statements based on user input statements, which can then be used to access the LDAP database or modify the database's information.

Hence, the correct option is b. LDAP injection.

4 0
3 years ago
______ is the software that prevents people from being able to access your personal information.
AleksandrR [38]

Answer:

The answer is A I hope this helps, if not I apologize.

Explanation:

8 0
3 years ago
Read 2 more answers
What does % find on edhesive??
statuscvo [17]

Answer:

Explanation: What is that word you typed?

3 0
3 years ago
If you are using a sprite for your MakeCode Arcade game, which code block
xeze [42]

Answer:

set mySprite block

Explanation:

BRAINLIEST?

8 0
2 years ago
Read 2 more answers
A power ratio of 9000000:1 corresponds to ... dB?
sertanlavr [38]

Answer:

69.54

Explanation:

A power ratio of 9000000:1 corresponds to 69.54 dB.

The calculation is presented below:

Formula for calculating Power ratio (db) = 10 * log [P(out)/P(in)]

Since the given ratio is 9000000:1, substituting in the formula gives us 10 * log (9000000/1)

Note that log 9000000 = 6.954

Therefore, 10 * log (9000000/1) = 69.54

Hence the required power ratio in db is 69.54 db.

4 0
3 years ago
Other questions:
  • Whats a computer scientist.
    5·2 answers
  • Which education and qualifications are most helpful for Law Enforcement Services careers? Check all that apply.
    15·1 answer
  • Sequence encryption is a series of encryptions and decryptions between a number of systems, wherein each system in a network dec
    9·1 answer
  • Apple's macOS and Microsoft Windows are examples of ________ software. utility application communication operating system
    13·1 answer
  • In an oblique drawing, which lines can be measured accurately, if there is no foreshortening?
    10·1 answer
  • Does this mechanism increase or decrease speed? Why?
    9·1 answer
  • The stub: transmits the message to the server where the server side stub receives the message and invokes procedure on the serve
    8·1 answer
  • Tim has several workbooks open in the Excel application. He would like to view them all at the same time, so he should use the _
    14·1 answer
  • What is the fullform of ETA in computer term​
    15·1 answer
  • The ________ approach to motivation suggests a connection between internal physical states and outward behavior. achievement dri
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!