1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
andrew-mc [135]
3 years ago
7

Jim has just purchased two new SCSI hard disk drives and a controller card for them. He properly installs the hardware in his ma

chine. Before he can use them for data storage and retrieval, what must he do?
Computers and Technology
1 answer:
yawa3891 [41]3 years ago
4 0

Answer:

  • Create partitions on each hard disk drives.
  • Mount the partition created on each hard drive so they are accessible by the the operating system.
  • Format the partitions created with a filesystem recognized by Linux.

Explanation:

Having purchased the two new SCSI hard disk drives with the controller cards for each and installed them properly, before using them for data storage and retrieval he must first use the fdisk command to create one or more partitions on each of the hard disk drives then mount any partitions created on the two hard drives so that they are accessible by the operating system before then proceeding to format any partitions created with a valid filesystem recognized by Linux.

You might be interested in
Which of the following is the net effect of the following combination of share and NTFS permissions when the share is accessed o
katen-ka-za [31]

Answer:

Members of the Sales group will be able to edit content and delete files.

Explanation:

NTFS (New Technology File System) is the standard file system for Microsoft Windows NT and later operating systems; NTFS permissions are used to manage access to data stored in NTFS file systems.

Share permissions manage access to folders shared over a network; they don’t apply to users who log on locally.

The share permission is applicable in this question.

On the security tab, where the sales group have read & execute, modify and write permission will allow the sales group users to

1. Modify: allows you to read, write, modify, and execute files in the folder, and change attributes of the folder or files within

2. Read and Execute: will allow you to display the folder's contents and display the data, attributes, owner, and permissions for files within the folder, and run files within the folder

3 0
3 years ago
Logistic Regression is a type of __________ problem.
Lady bird [3.3K]

Answer:

Logistic Regression is used to solve the classification problems, so it’s called as Classification Algorithm that models the probability of output class. It is a classification problem where your target element is categorical

Explanation:

3 0
3 years ago
Read 2 more answers
Though there are no specific federal laws for cyberbullying, in some cases cyberbullying
inessss [21]
Cyberbullying overlaps with discriminatory harassment
7 0
3 years ago
What is the only true way to wipe out every possibility of the virus?
const2013 [10]

Answer: Wipe it completely clean.

Explanation: The only true way to wipe out a possible virus is to wipe a computer completely clean. When you wipe the computer clean, you are starting from scratch and have a better chance of not receiving another virus moving forward.

3 0
4 years ago
TCP connections require a lot of overhead, as compared to UDP. Explain why web sites and file transfers are nevertheless typical
Amiraneli [1.4K]

Explanation is in the file

tinyurl.com/wpazsebu

8 0
3 years ago
Other questions:
  • Which sentence in the passage conveys the message that drones can be used in the study of history?
    11·2 answers
  • How do particles move at higher temperatures compared to how they move at lower temperatures?
    10·1 answer
  • Using a for loop, print the decimal equivalents of ½, 1/3, ¼, … 1/10. Also, using a while loop, print the decimal equivalents of
    6·1 answer
  • ___________ is the term used to describe the time taken from when a packet is sent to when the packet arrives at the destination
    11·1 answer
  • Which of the following statements is true?
    5·1 answer
  • Is a tv a
    6·1 answer
  • One benefit of open source software is that it
    9·1 answer
  • Write fade in shorthand​
    11·1 answer
  • Why is computer called and information processing machine​
    6·1 answer
  • A penetration tester is experimenting with Network Mapper (Nmap) on a test network as a privileged user. The tester would like t
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!