1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pychu [463]
3 years ago
12

How can the storage model assist in the design of storage networks?

Computers and Technology
1 answer:
kupik [55]3 years ago
7 0

Answer:

 The storage model basically used for protecting the confidential data and information. It is important for the security purpose during the accessing of the data to make it more easy.

There are basically different types of storage model that used to assign in the designing of the storage network are:

  • Hard drive storage is basically used for the data storage in the local hard drive which is used by the sever.
  • Online storage is one of the most secure and most secure choices, the information is put away on various framework which help in protected and secure exchange of the information regardless of whether one of the framework is fizzled. it is also known as cloud storage device.
  • The network storage is also used fr storing the data in the server.

You might be interested in
Write a short paragraph explaining why cross-training employees is imperative.
harina [27]
<span>One of the main deterrents to cross-training is how employees feel about retaining knowledge. An employee may feel their job is threatened if someone else is being trained in their function. It's important that you lay these woes to rest and explain why you are cross-training your employees.</span>
4 0
4 years ago
In a TCP session hijacking attack, if the server is waiting for data starting from sequence number X, but we used X 100 in our a
Irina18 [472]

Answer:

In the presence of packets transfer between client and server in a TCP session, the attack will be successful if the number of the sequence is approximately X+100. Otherwise, the attack will not be successful (i.e. fail).

Explanation:

Generally, it is important to ensure that there is a successful operation in the operation of a TCP session. In the presence of packets transfer between client and server in a TCP session, the attack will be successful if the number of the sequence is approximately X+100. Otherwise, the attack will not be successful (i.e. fail).

4 0
3 years ago
Read 2 more answers
Computers have small bumps on the keyboards that enable persons to type without looking at the keyboard. These letters are:
QveST [7]

A) FJ is the right answer

3 0
4 years ago
Read 2 more answers
Help plz computer science and engineering
Diano4ka-milaya [45]
>>> b=2.
>>> print type(b)
  File "<stdin>", line 1
    print type(b)
             ^
SyntaxError: invalid syntax
>>> print( type(b) )
<class 'float'>
>>>


8 0
3 years ago
Read 2 more answers
1. What does a transistor do?
Triss [41]

Hi there,

I believe the answer to number 1 will be C.

the answer to number 2 i think will be False.

the answer to number 3 is True

and finally the answer to number 4 will be D.

Hope these are correct :)

Have a great day

6 0
3 years ago
Other questions:
  • 1. Which markup language adds the ability to use video without requiring the user to download add-ons?
    13·1 answer
  • A bug collector collects bugs every day for 5 days. Write a program that keeps a running total of the number of bugs collected d
    12·1 answer
  • 110101111.11011 to decimal (base 10)
    6·1 answer
  • What are some objects in your home that demonstrate electrical energy to radiant energy to thermal energy
    10·2 answers
  • When you merge business letters, how many total documents will you have when you are finished with the merge process?
    13·2 answers
  • In client server network, there is no central server //// true or false​
    8·1 answer
  • identify at least three additional ethical responsibilities expected from a computer professional. In brief, explain each respon
    11·1 answer
  • Which of the following are causes of a run-time error. Choose all that apply.
    13·1 answer
  • Discuss five domains of Instructional technology​
    7·1 answer
  • HELP ME PLEASE
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!