1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
almond37 [142]
3 years ago
10

You are installing windows on a new computer. Using the RAID controller on the motherboard, you configure three hard disks in a

RAID 5 array. You leave the array unpartitioned and unformatted. You edit the BIOS boot order to boot from the optical drive.
Computers and Technology
1 answer:
Sergio [31]3 years ago
7 0

Answer:

On the screen where you select the disk to install Windows, click "Load Driver"

Explanation:

While the user has Windows installed on a new system. Instead, he configures several hard disks in such a RAID 5 series using the RAID controller onto the motherboard. The user is left unpartitioned and improperly formatted in the list. He edits that boot request from either the optical drive for the BIOS to boot. He installs DVD drive, begins the configuration, and boots to the disk.

Then press the "Load Driver" button on the monitor where he picks the disk to install Windows

You might be interested in
Only the root user can modify a file that has the immutable attribute set.
Vladimir79 [104]
False if the roots modify it’s capable of it’s attributed set
8 0
1 year ago
Describe the concepts of confidentiality, integrity, and availability (C-I-A), and explain each of the seven domains of a typica
GREYUIT [131]

Answer:

Answer explained below. The remaining part of the question is incomplete

Explanation:

The concepts of confidentiality, integrity, and availability (C-I-A) can be explained in following given points.

1) Confidentiality: Its basically refer to the confidentiality of the information. Here we can think about the protection of the information from unauthorized person. Confidentiality enuser that at what level your information is secured and no unauthorized access will be done to the information. For maintaining the confidentiality, we can use various encryption methods. The main concept of confidentiality is to enforce various techniques like encryption, file permissions and access control to restrict access to important information.

2) Integrity: Integrity of the information refer to the unwanted modification of the information. Integrity of the data as well as the information should be maintained and only the autorized person can access as well as modify the information. For enforcing the integrity, we can implement various hashing techniques on information.

3) Availability: Availability refers to the availability of the information, when ever an autorized person requests for the information. High availability of the information should occur, so that any autorized person can access it, when ever its required. For high availability, we can create backup as well as replicate the data across the geo sites.

Seven domains of a typical IT infrastructure are given below:

1) User Domain: Its refer to the group of users as well as the person who access the information systems.

2) LAN Domain: Refer to the local area network, where various computers are connected to each other.

3) Workstation Domain: The area is called workstation, where various users connect to the IT infrastructure.

4) WAN and LAN link domain: Refer to the connection of local area network to wide area network.

5) WAN domain: Refer to the wide area network, connection of computers in large area.

6) Storage Domain: Refer to the storage, where we store the data.

7) Remote Access Domain: Refer to the domain where mobile user can access the local as well as wide network remotely.

8 0
3 years ago
A termination condition in a loop is analogous to________in a recursive method.
Varvara68 [4.7K]

Answer:

b) iteration.

Explanation:

There are various algorithms which are used in computer programming. Iteration is also a type of algorithm which is used to create loops. The instructions are inserted once and then these instructions are repeated to create a loop function.

8 0
3 years ago
3. Wi-fi connections have limited range of :
Tamiku [17]

Answer: D) 300 metres would be my choice because our wifi can only go that far outdoors, inside wifi can only travel up to 150 metres.

Explanation: Hope this helps! Have a wonderful day!

Don’t forget to thanks & Brainliest is always appreciated!

3 0
2 years ago
Write the SQL commands to obtain the following information from the system catalog:
netineya [11]

The SQL commands to obtain the information from the system catalog is illustrated below.

<h3>How to illustrate the the SQL commands?</h3>

It should be noted that SQL commands are instructions to communicate with a database to perform a task.

List every table that you created. - SHOW TABLES

List every field in the Client table and its associated data type. - SHOW COLUMNS FROM CUSTOMER

List every table that contains a field named TaskID. - SELECT TBNAME FROM SYSCOLUMNS WHERE COLNAME = 'TaskID'

Learn more about SQL on:

brainly.com/question/25694408

#SPJ1

3 0
2 years ago
Other questions:
  • Which of the following variable declarations is a correct assignment?
    14·1 answer
  • What is secondary exchange ? - Apex
    14·1 answer
  • A ________ is a user-interface component with two states: checked and unchecked. radio button check box menu item submenu item
    5·1 answer
  • Which of the following is considered a benefit when using slab allocator?
    6·1 answer
  • A high school in New York (school A) is using videoconferencing technology to establish student interactions with another high s
    7·1 answer
  • Describe how electrons move between atoms to create electricity.
    7·2 answers
  • What are tributaries
    15·2 answers
  • Write a program that declares three one-dimensional arraysnamed miles, gallons, and mpg. Each array should be declared in main()
    10·1 answer
  • Pleasee help meeeeeeeeee I’m stuckk!!!!
    14·2 answers
  • How can you distinguish between a manually added page break and an automatic page break in a worksheet?.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!