1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
laiz [17]
3 years ago
8

Describe how data center storage applications drive the development of SAN technology.

Computers and Technology
1 answer:
Ede4ka [16]3 years ago
5 0

Answer:

 The storage area network basically apply in the networking model for storage various application in the data center. The storage area network (SAN) provide the common pathway between the server and the storage device.

The storage area network technology basically implemented in the fiber channel configuration over the ethernet. SAN provide access to the data that shared by the personal resources. It is basically simple and dedicated network which provide for the data storage.

 

You might be interested in
Troy, an aspiring screenwriter, aspires to work with a famous director known for his philanthropic work. Troy gets an appointmen
kicyunya [14]

Troy should include a short overview of the story that his video will tell and why he wants to tell it (or what the video will be about and why). It should also include the target audience, and where the video will be published.

7 0
3 years ago
10 Ejemplos de Software de Sistema. AYUDENME POR FAVOR SE LOS SUPLICO
bearhunter [10]

Answer:

MacOS, Linux, Android, Microsoft Windows, software de ciencia computacional, motores de juegos, automatización industrial y aplicaciones de software como servicio.

:-) (-:

6 0
3 years ago
Big data are used to _____. Select 3 options.
Anon25 [30]

Answer:

Big data are used to _____. Select 3 options.

understand people’s hobbies

analyze people’s interests

make decisions about marketing

Explanation:

100%

8 0
3 years ago
John, an ethical hacker, is demonstrating a proof-of-concept IoT attack. For this demonstration, he used a jammer to jam and sni
scoundrel [369]

Answer:

BlueBorne Attack

Explanation:

If you're using a Bluetooth enabled device, whether it's a smartphone, laptop, smart TV, or any other IoT device, you risk malware attacks that can be remotely performed to take over your device, even without requiring any interaction from your side.

Security researchers have just discovered a total of 8 zero-day Bluetooth protocol vulnerabilities affecting more than 5.3 billion devices - from Android, iOS, Windows and Linux to the Internet of devices (IoT) - using technology short-range wireless communication

Using these vulnerabilities, security researchers at IoT security firm Armis created an attack, called BlueBorne, which could allow attackers to completely take over Bluetooth-enabled devices, spread malware, or even establish a “man” connection. -in-the-middle ”to gain access to device critical data and networks without requiring any victim interaction.

4 0
3 years ago
List 3 ways that you can customise a form?
evablogger [386]

Answer:

1.Customize the apperance

2.Customize the fields

3.Customize the Thank you screen

8 0
3 years ago
Other questions:
  • What occurs in a steam engine?
    5·2 answers
  • Which of the following websites can help you learn about general career trends?
    13·1 answer
  • Why should you need to have skills and an understanding about programming?
    8·1 answer
  • This is the most flexible way to create a query. Used to create queries that displays only the records that match criteria enter
    12·1 answer
  • Which of the following galaxy types is most likely to be clearly identifiable, regardless of orientation? SBc
    6·1 answer
  • Please help!
    10·2 answers
  • Write a police description a person who know you well​
    12·1 answer
  • CAN SOMEONE PLEASE DO THESE FOR ME I WILL GIVE BRAINLIESR AND 20 POINTS PLEASE ITS ONLY 5 QUESTIONS PLEASEEEE
    12·1 answer
  • Which of these is an example of an input?
    11·1 answer
  • Writers in our networked world enhance their credibility by
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!