1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
FinnZ [79.3K]
3 years ago
10

You buy a new workstation that features an embedded RAID controller on the motherboard. You want to setup hardware RAID 10. How

many hard drives are required, without multiple partitions per disk, and where would you set this up? (Choose all that apply). Each choice provides half of the answer.
Computers and Technology
2 answers:
tester [92]3 years ago
7 0

Answer:

4 hard drives are required for RAID 10 and you would set this up in your operating systems (Windows, Linux, Mac) storage management.

balu736 [363]3 years ago
3 0

Answer:

4

BIOS

Explanation:

BIOS is short for Basic Input Output System. Its a built-in program a system utilize to power on after it is shut down. It also controls data flow between the operating system and other attached devices such as the hard drive, mouse etc. It is usually found on the motherboard of a system. BIOS manages the hard drives, it acts as an intermediary between the CPU and the I/O (input/output) devices.

You might be interested in
A general rule for adding text to a slide is ____.
KiRa [710]

A general rule for adding text to  a slide is to use not more than two fonts in a presentation and vary the font  size. Besides adding text you can also import text, photographs, numerical data, and facts from files created in programs such as Microsoft word, excel and access.

5 0
3 years ago
Read 2 more answers
The use of public wireless connections can increase a user's vulnerability to monitoring and compromise. ____________ software c
GalinKa [24]

The use of public wireless connections can increase a user's vulnerability to monitoring and compromise. <u>VPN </u> software can be used to encrypt transmissions over public networks, making it more difficult for a user's PC to be penetrated.

Explanation:

  • A VPN, or Virtual Private Network, allows you to create a secure connection to another network over the Internet.
  • VPNs can be used to access region-restricted websites, shield your browsing activity from prying eyes on public Wi-Fi, and more. .
  • Virtual Private Network, is a private network that encrypts and transmits data while it travels from one place to another on the internet. VPNs aren't just for desktops or laptops, you can set up a VPN on your iPhone, iPad or Android phone.
  • A VPN encrypts the traffic from your machine to the exit point of the VPN network. A VPN isn't therefore likely to protect you from an adversary like Anonymous.
  • VPNs add another layer of encryption to your internet traffic, your latency will go up and speeds will go down.

3 0
3 years ago
Please help me with this! I’m using Python 3
IgorLugansk [536]

Something like this?

h1 = int(input())

m1 = int(input())

s1 = int(input())

h2 = int(input())

m2 = int(input())

s2 = int(input())

s = h2*3600 + m2*60 + s2 - (h1*3600 + m1*60 + s1)

print(s)

3 0
3 years ago
Write a program that has a user guess a secret number between 1 and 10. Store the secret number in a variable called secretNumbe
Tom [10]

Answer:

Explanation:

The following code is written in Python. It is a function called guessMyNumber and like requested creates a random number and saves it to secretNumber. Then it continuously asks the user for their guess and compares it to the secret number. If the guess is correct it exits the loop otherwise it will continue to ask for a new guess.

import random

def guessMyNumber():

   secretNumber = random.randint(1, 10)

   print(secretNumber)

   while True:

       guess = input("Enter your guess: ")

       guess = int(guess)

       if (guess == secretNumber):

           print("Congratulations you guessed correctly")

5 0
3 years ago
Which Call of Duty game is the best?
love history [14]

Answer:

i like ghost and modern 3

Explanation:

3 0
3 years ago
Other questions:
  • A skier provides what in a landscape photograph of a mountain?
    14·2 answers
  • What if you have been asked to opt or design expert system or virtual reality using artificial intelligence for your daily/routi
    9·1 answer
  • Can someone please help me write a code for this
    7·1 answer
  • Whereas enterprise network convergence focuses on the consolidation of traditionally distinct voice, video, and data communicati
    14·1 answer
  • (4 points.) Write an algorithm (i.e., step-by-step instructions) via which someone could walk or drive from some origin to some
    8·1 answer
  • Declare an ArrayList of Strings. Add eight names to the collection. Output the Strings onto the console using the enhanced for l
    9·1 answer
  • HELP FAST PLEASE
    6·1 answer
  • Are there any Potential Dangers in Artificial Intelligence?
    11·2 answers
  • Why is the Microsoft website considered the best source for information about pagefile.sys?​
    15·1 answer
  • Which type of network allows backups and network security to be centrally located?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!