1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MissTica
3 years ago
5

If you have two redo log groups with four members each, what’s the optimal number of disks you need to provide appropriate prote

ction on the redo log files?
A. Eight

B. Four

C. Two

D. One

E. Operating system dependent
Computers and Technology
1 answer:
slega [8]3 years ago
6 0

Answer is B: Four

It is best practice to place members of a group on a multiplexed redo log on different physical disks. For instance, if you have two groups of multiplexed redo log members, make sure to place each member on a different disk. This practice helps avoid contention between LGWR and ARCN. In this case, however, we have two redo log groups with four members each. Instead of having one member on each group disk, it is recommended that we have two members in each group. This will total up to four disks in total

You might be interested in
What computer is designed for particular application​
Karo-lina-s [1.5K]

Answer: Applications for desktop or laptop computers are sometimes called desktop applications, while those for mobile devices are called mobile apps. When you open an application, it runs inside the operating system until you close it

Explanation:

5 0
2 years ago
What's the smallest part of a computer
Murljashka [212]

Answer:

A byte

Explanation:

I just had that question on my quiz

7 0
3 years ago
Read 2 more answers
Yo, how can I bypass the securely filter on a chromebook?
OLga [1]
Open your Chromebook and press the power button for 30 seconds. This should bypass the admin block.

Proxy Websites. Probably one of the oldest methods of bypassing web filters, proxy websites enable users to anonymously connect to websites through outside servers. ...
VPNs. VPNS or Virtual Private Networks, work as a tunnel between two devices. ...
Browser Extensions. ...
Stolen Passwords. ...
Firefox from USB. ...
5 0
2 years ago
Structure for forloop?
solong [7]

Answer:

for ( initialization; condition;increment)

{

code goes here;

}

in python:

for i in list/range:

code with proper indentation

By initialization above we mean, like int i=0; etc.

By condition like i<10;

and by increment it means like i++, ++i or i+=1; etc

And in python, i can be an integer value if the range is mentioned, and it can be an item of a list if the list is used. We can also use an array, string and various other data structures in python. like we can have characters in a string and so on.

Explanation:

Please check the answer section.

8 0
3 years ago
Write the definition of a method twice, which receives an integer parameter and returns an integer that is twice the value of th
Kipish [7]
<span>public static int methodName(int a, int b){
      a = a * 2;
      b = b * 2;
}
</span><span>int result = doubling(5, 10<span>);
System.out.println(result);
//result would be 10, 20</span></span>
5 0
3 years ago
Other questions:
  • What is the "host" in a typical email address?
    14·1 answer
  • Anyone wanna play roblox?? My user is Tsvetok_luis
    11·2 answers
  • True or false that computers that are joined together are able to share hardware and software, but not data
    11·1 answer
  • ...................You like swamps
    13·2 answers
  • One way to initiate a file download from a web page is to
    8·1 answer
  • Unlike radio frequency identification (RFID) tags, bar codes: Question 30 options: require a reader that tunes into a specific f
    14·1 answer
  • What is computer software​
    9·1 answer
  • 1. Fill in the blanks with appropriate word. 5°1-5 is a collection of raw unprocessed facts, figures, and symbols ​
    12·1 answer
  • What types of things were often NOT captured in early photographs?
    7·1 answer
  • Range paramters - for loop<br> question in picture
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!