1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Maslowich
3 years ago
6

Your computer has a single hard disk w/ a single volume used by the C:\ drive. You have previously upgraded the disk to a dynami

c disk. The disk has run out of disk space. You need to add more space to the C:\ volume. You add a new hard disk to the computer. What should you do to add space to the C:\ drive?
a. Strip the C:\ volume to the second disk
b. Span the C:\ volume to the second disk
c. Create a mount point using space on the second disk
d. Extend the C:\ volume to the second disk
Computers and Technology
1 answer:
olga55 [171]3 years ago
5 0

Answer:

Create a mount point using space on the second disk.

Explanation:

A mount point refers to a directory in a file system that is outside the root partition of the operating system and functions to help increase storage memory. The term mount is used in such instance to refer to the action of creating additional filesytems to add to existing filesytems that are available to the user in the operating system.

You might be interested in
When a program lets the user know that an invalid choice has been made, this is known as:?
kirza4 [7]

When a program lets the user know that an invalid choice has been made, this is known as a error message.

7 0
3 years ago
О OF<br>Types icts commonly<br>in education.<br>used​
Kipish [7]

Answer:

The types of the itcs can be defined as follows:

Explanation:

It stands for the information and communication technology, which is used to comprises products that are a store, process, pass, transform, replicate or receive digital communications. 

It applies to all technology of interaction, such as the Internet, wireless networks, devices, laptops, middleware, video - conferencing, social media, and other software and services in media, and the four types in which it is used in education can be defined as follows:

(i) networking for education

(ii) Web-based education

(iii) mobile education

(iv) facilities for the classroom

8 0
3 years ago
What will the output of this program be when it is executed? def test_function( length, width, height): print ("the area of the
erastova [34]

Answer: stuff

Explanation:

6 0
3 years ago
Can someone please explain this issue to me..?
Airida [17]

Answer:

try going to your settings and clear the data of the app,that might help but it if it doesn't, try deleting it and then download it again

5 0
3 years ago
Read 2 more answers
A) Why is eavesdropping done in a network?
Makovka662 [10]

Answer:

An eavesdropping attack is the theft of information from a smartphone or other device while the user is sending or receiving data over a network.

Missing: checksum ‎01001101 ‎00101000

3 0
3 years ago
Other questions:
  • How to bypas power switch on pc and make it switch on
    11·1 answer
  • Name the sections of an instruction.
    15·1 answer
  • The ____________________ chip handles the functions of the keyboard controller.
    12·1 answer
  • Which of the following is an example of a content management system (CMS)?
    12·2 answers
  • A recommended cleaner for the bowls of coffee brewers is
    7·1 answer
  • What is RAM and ROM​
    10·2 answers
  • Pasahot ako plzsss kailangan ko na ngayon ​
    5·1 answer
  • Practice using word processing software, including creating, formatting, and saving a document.
    5·1 answer
  • What are storage devices? write two such devices​
    14·2 answers
  • What does an operating system do
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!