1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Artist 52 [7]
4 years ago
13

You create a new three-way mirror storage space. You format the storage space by using ReFS. Which two features can you use on t

he new storage space
Computers and Technology
1 answer:
Snezhnost [94]4 years ago
7 0

Answer:

These feature include Sparse VDL and Block clone

Explanation:

First an ReFS(Resilient File System) is a file system designed by Microsoft to minimize the availability of data  and to have an efficient scalability to large data set across diverse workloads

Note : efficiency can be defined as the rate at which work is performed relative to the total work and/or cost incurred.

While

scalability: can be defined as the ability of a system to fit in the needs of  an increased workload by repeatedly applying a cost-effective strategy for extending a system’s capacity.

Block clone:

This feature  accelerates copy operations, enabling quick, low-impact VM (Virtual Machine)checkpoint merge operations.

Sparse VDL:

This is a feature of ReFS that allows it to zero file rapidly thereby reducing the time it takes to create fixed VHDs(Virtual Hard Disks)

You might be interested in
Unscramble dki-----------------------------------------------------------------------...........
Fudgin [204]

Answer:

hmmmm.. kid?

Explanation:

6 0
4 years ago
Read 2 more answers
The scope of a temporary table is limited to what?
kari74 [83]

The scope of a temporary table is limited to the database session in which it's defined.

<h3>What is a database?</h3>

A database can be defined as an organized and structured collection of data that are stored on a computer system as a backup and are usually accessed electronically.

In database management system (DBMS), the scope of a temporary table is generally limited to the database session in which it's defined by a software developer or programmer.

Read more on database here: brainly.com/question/13179611

#SPJ12

8 0
2 years ago
. What are the typical parts of a Change Request Document?
photoshop1234 [79]

Answer:

 Change request is the type of document which basically contain the adjustment of the system by call and the change request is the essential and important part in the process of change management.

Change request must be declarative as, it state that what should be accomplish, but forget about the change that should be completed. The main elements or parts of the change request are:

  • Customer ID
  • Abstract change
  • The deadline change type

The importance of the change request document is that it is used in various type of SDLC and project management system. It is basically originate from the system request from the users.

3 0
3 years ago
A) Explain the concept of memory management unit as related to Operating systems.
USPshnik [31]

Answer:

Memory is the faculty of the brain by which data or information is encoded, stored, and retrieved when needed. It is the retention of information over time for the purpose of influencing future action.

Explanation:

4 0
3 years ago
There is a natural tendency on the part of users and system managers to perceive little benefit from security investment until a
spayn [35]

Answer:

The answer is True

Explanation:

Users and system managers/administrators do not necessarily see the use of security investments, because there is no security breach or security failure to the system.

When security infrastructures are in place, it is to prevent or at least reduce the possibility of devaluation, modification, corruption, destruction or deletion, disruption, disclosure, use, and inappropriate or unauthorized access. So, if any of these breaches do not occur, system managers and users perceive little benefits from security investments.

6 0
3 years ago
Other questions:
  • Why do bullies and criminals often say things online they otherwise wouldn’t say
    9·2 answers
  • A website updated daily could be considered _____. a. authoritative b. objective c. accurate d. timely
    8·1 answer
  • Write a program that will ask the user to input a phrase (multiple word sentence), and an integer value. A static function will
    14·1 answer
  • Description A data retrieval tool that finds specified data within a database A collection of records All of the fields for a si
    7·1 answer
  • A "start transaction" is set to be the system's first screen displayed once you log in to GCSS-Army. Setting up a start transact
    14·1 answer
  • Which of the following payment types require you to pay upfront?
    9·1 answer
  • write a program in C# that reads a set of integers and then finds and prints the sum of the even and odd integers?​
    12·1 answer
  • What are the ways to search out a number from a tree?
    11·1 answer
  • PLEASE PLEASE HELP pleeeeeeeeeaaaase
    12·2 answers
  • Use your editor to open the cc_data.js file and study the data stored in the staff object to become familiar with its contents a
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!