1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
CaHeK987 [17]
3 years ago
13

Which of the following modes of replication requires a very low latency network connection and ensures data remains in synch wit

h zero data loss in the event of a failure at the source site?a. Asynchronous replication
b. Synchronous replication
c. Virtual replication
d. Paired replication
Computers and Technology
1 answer:
navik [9.2K]3 years ago
3 0

Answer:

b. Synchronous replication

Explanation:

Replication of data in storage partitions or in a number redundant array of independent disk drives helps to promote redundancy, as implied, and faulty tolerance to reduce loss of data.

There are two categories of replication and they are synchronous and asynchronous replication.

Synchronous replication requires low latency network site to mirror data, while asynchronous replication mirrors data in large metropolitan area in high latency networks.

You might be interested in
Forwarded events can only be recorded when systems ADMINISTRATORS have de-established an event subscription. TRUE or FALSE
weeeeeb [17]

Answer:

True

Explanation:

Forwarded events can only be recorded when systems administrators have de-established an event subscription.

8 0
3 years ago
Helpppppppppppppppppppppppppppppppppppppppp
PolarNik [594]

Answer:

the can us microsoft excel

3 0
3 years ago
What does bam file stand for computer terms?
Vlada [557]
It stands for business activity monitoring
5 0
3 years ago
In Cybersecurity terminology, a risk is defined as ________. Select one: a. A weakness that threatens the confidentiality, integ
deff fn [24]

Answer:

The probability of a threat exploiting a vulnerability and the resulting cost

Explanation:

The whole idea of IT security is to protect our data from bad things. Risk in cyber security is the potential to harm people, organizations and IT equipment. It is the probability that a particular threat will occur and as result, leave a system vulnerable.

4 0
3 years ago
What is the classification of the Gartner company?
Strike441 [17]

Answer:

It Is Multimedia

Explanation:

Trust Me

3 0
3 years ago
Other questions:
  • What at some advantages of creating a powerpoint?
    9·1 answer
  • What are the high and low temperatures on Saturn? (C)
    11·1 answer
  • OCR Land is a theme park aimed at children and adults. Entrance tickets are sold online. An adult ticket to OCR Land costs £19.9
    7·1 answer
  • g If a class named Student has a data member named gpa , and one of its member functions has a parameter also named gpa , how ca
    7·1 answer
  • What is a type of machine-to-human communication?
    14·1 answer
  • What should be the very last function performed in the lab before you leave? Bid the instructor farewell wipe your hands on a to
    11·1 answer
  • If there is only a stop sign posted at a railroad
    9·1 answer
  • What is involved with individual user-testing?
    10·2 answers
  • Create your code from the story using code blocks.You must include at least one of each of the following blocks. You can draw or
    5·2 answers
  • What does this mean startUp()
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!