1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
scoundrel [369]
3 years ago
5

What does iSCSI stand for?

Computers and Technology
2 answers:
Dahasolnce [82]3 years ago
8 0
Internet Small Computer Systems Interface
Basile [38]3 years ago
6 0
ISCSI stands for <span>Internet Small Computer Systems Interface</span>
You might be interested in
You've been given a network of 130.0.0.0 /16. you need to divide it into four VLSM subnets as follows:
Sidana [21]

Answer: Hello your required question is wrong as it does not tally with the data provided , attached below is the complete question

answer:

/23 /26 /27 /28   option A

Explanation:

<u>Breakdown of the last four subnet masks given to the subnets </u>

For the subnet of 500 production host the mask = /23 which will produce 512 hosts

For the subnet of 60 sales host the mask = /26 which will produce 64 hosts

For the subnet of  12 host the mask = /27 which will produce 32 hosts

For the subnet of 30 hosts the mask = /28 which will produce 16 hosts

4 0
3 years ago
Which is an example of intrinsic motivation?
kkurt [141]

Answer: allowing time to do an after-school activity once studying is done

Explanation: Motivation could be explained as any event, factors or circumstances which increases an individual's willingness, zeal or strength to do something. Motivation could also be inform of incentive or reward which one stands to gain when a certain assignment or mission is accomplished.

However, Intrinsic motivation refers to a class of motivation which are triggered naturally. When a motivation is intrinsic, there is no usually no obvious and or external source of motivation, incentive or reward attached to one's quest of doing something. In the scenario above, all other options except allowing time to do an after-school activity once studying is done have a lucid external incentive which the individual stands or aims to achieve by studying.

5 0
3 years ago
Read 2 more answers
What technique involves graphical methods and nontechnical language that represent the system at various stages of development a
Mnenie [13.5K]

Answer:

The answer to this question this "modeling".

Explanation:

In this question, the answer is modeling because in system design we use System Analysis and Design(SAD). It is the most important subject in any software design like a mobile application, website, web pages, etc. In this subject, there is an important topic that is SDLC. The term SDLC stands for systems development life cycle or it is also known as the software development life cycle. It is a conceptual modeling used in project management that describes the stages involves the information for system development project. It maintenance the complete application. SDLC applied to technical and non-technical systems. In the SDLC many phases can be given as:

Requirement gathering and analysis:

In this phase, all the relevant information is collected from the customer to develop a product as their expectation.

Design:

In the design phase, the requirement gather by the software requirements specification (SRS) in a document that is used for software architecture.

Implementation or coding:

After completing the design phase we implement/coding in that section like User input validation, admin work, payment management, etc.

Testing:

In this section, we test all the things in software before hand over to the customer.

Deployment:

In this section after completing the testing successfully. it goes to the deployment section in this section production environment or User Acceptance testing is done depending on the customer expectation.

Maintenance:

In the maintenance section when the product is hand over customer and in future if any issue comes up and needs to be fixed or there is any Up-gradation is needed So it is done by the developers.

In computer science, any development is done on modules. So the answer to this question is modeling.

3 0
3 years ago
How does toothbrushes affect the world of technology?
Yuri [45]

Answer:

The invention of the toothbrush made a huge impact of society and people for many reasons. You should always brush your teeth and keep your mouth clean so you will have nice, white teeth, healthy gums, good breath, and just a clean mouth! Without the toothbrush, your mouth would be smelly, gross, and full of bacteria.Some of the different impact categories included acidification, climate change, eutrophication, human health, land use, resource use and water scarcity. The results concluded that the electric toothbrush had the greatest environmental impact in 15 out of the 16 categories with water scarcity being the exception.Using the electric toothbrush as an example, this article examines the growing acceptability of domestic health technologies that blur the traditional boundaries between health, aesthetics and consumption. By using empirical material from individual and household interviews about people's oral health practices, this research explores the relationships between an everyday artefact, its users and their environments. It investigates the ways in which oral health technologies do, or do not, become domesticated in the home environment. We conclude that the domestication of oral health technologies is not inevitable, with the electric toothbrush often becoming an ‘unstable object' in the domestic setting.

Explanation:

3 0
2 years ago
Read 2 more answers
To exclude members of a group from the basic permissions for a folder, which type of permission would you assign? Deny Allow Mod
oksano4ka [1.4K]

Answer:

Deny

Explanation:

Under the New Technology System, the Deny permission is applied when the administrator wants to overrule the permission given to members of a group. The Allow and Deny options help in regulating access to the components of the system. Only authorized groups are granted access to the files.

Most times, the Deny permission is considered before the Allow permission. If the user is denied access to some files and granted access to some, the deny permission is most times considered first.

4 0
3 years ago
Other questions:
  • What are the pros and cons of editorial anonymity?
    13·1 answer
  • What does LMS Date Updated mean?
    9·1 answer
  • Which of the following domain types is most trustworthy 1) .com 2) .tv 3).org 4) .edu
    15·2 answers
  • The two key elements of any computer system are the____and the _____.
    7·1 answer
  • HELP! ASAP I KNOW IT'S QUITE A HANDFUL BUT I NEED THIS ANSWER!!
    10·1 answer
  • What type of cable would you use to connect two hosts together in a back-to-back configuration using twisted pair cable?
    15·1 answer
  • Each processor core on a multi core processor generally runs faster than a single core processor
    14·2 answers
  • Microsoft’s SharePoint server product dramatically altered the content and records management (RM) markets. Crocker (2015), edit
    6·1 answer
  • Which of the selections below is not a benefit of imaging the computers on your network? There are fewer licensing fees because
    11·1 answer
  • Which option is typically only used when utilizing self joins?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!