1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksanka [162]
3 years ago
13

"Describe how implementation of a RAID Level 2 system would be beneficial to a university payroll system. In your own words, des

cribe the disadvantages of such a system, if any, in that environment, and if appropriate, suggest an alter-native RAID system and explain your reasoning"
Computers and Technology
1 answer:
Darina [25.2K]3 years ago
4 0

Answer:

In RAID 2 Hamming Code ECC Each piece of the information word is kept in touch with an information plate drive . Every datum word has its Hamming Code ECC word recorded on ECC circles. On Read, the ECC code confirms the right information or revises the single plate blunders.  

Strike Level 2 is one of the two innately equal mapping and assurance strategies characterized in the Berkeley paper. It has not been broadly sent in the business to a great extent since it requires an extraordinary plate highlights. Since plate creation volumes decides the cost, it is increasingly practical to utilize standard circles for the RAID frameworks.  

Points of interest: "On the fly" it gives information blunder amendment. Amazingly high information move rates is possible.Higher the information move rate required,better the proportion of information circles to ECC plates. Moderately basic controller configuration contrasted with the other RAID levels 3,4 and 5.  

Impediments: Very high proportion of the ECC plates to information circles with littler word sizes - wasteful. Passage level expense are extremely high - and requires exceptionally high exchange rate prerequisite to legitimize. Exchange rate is equivalent to that of the single plate, best case scenario (with shaft synchronization). No business executions can't/not industrially suitable.

You might be interested in
Order the steps needed to design a relational database.
tia_tia [17]

Answer:

1. List the fields needed to gain information

2. Break down the date into smaller parts

3. identify the fields holding stored data

4.distribute the fields into tables by subject

5. identify the common fields for linking tables

Explanation:

edge 2021

5 0
3 years ago
How to take a pic with a cumputer
sattari [20]

Answer:

Ctrl+Shift+4

Explanation:

4 0
2 years ago
Read 2 more answers
The information that a program requires in order to accomplish its objective is called the.
ivolga24 [154]

The information that a program requires in order to accomplish its objective is called input.

<h3>What is a program?</h3>

A program is a set of instructions by which the computer performs various tasks. The program is a sequence of instructions that are followed by the computer to run. An example is Microsoft Word.

A computer program comes under software. The sequence code of a program that is readable by humans is called source code. The program is run by information that is called input.

Thus, the data that a program needs in order to achieve its goal is referred to as input.

To learn more about the program, refer to the below link:

brainly.com/question/14368396

#SPJ4

8 0
1 year ago
¿Qué es lo contrario a frágil?
Pepsi [2]

Answer:

frágil

Explanation:

7 0
3 years ago
List at least five tasks a layer performs. Could one (or more) of these tasks could be performed by multiple layers?
ludmilkaskok [199]

Answer:

Transport layer:

- data packets are segment to smaller chunks.

- gives sequence number to segment.

- identifies the source and destination port number.

- initiates data transmission between nodes.

- rearrange and identifies the application, the transmitted data is meant for.

Explanation:

The transport layer is the fourth layer in the OSI network model. Protocols like TCP and UDP are found in this layer. It segment data packets and for a connection oriented protocol like TCP, it creates an established session between source and destination host (the session layer can also do this, but it is more defined in the transport layer).

The network and data-link layer can also transmit data packets.

6 0
2 years ago
Other questions:
  • A _____ is a network that uses multiple access points to link a series of devices that speak to each other to form a network con
    10·1 answer
  • Universal Containers has the following requirements:• Enable VIP community access once a customer has reached $1 million in reve
    14·1 answer
  • knowledge contributes vitally to the development of __________ memory, or recollections of personally experienced events that oc
    12·1 answer
  • Network address 192.10.10.0<br>​
    12·1 answer
  • Which of the following electronic payments is ideal for micropayments?
    11·2 answers
  • What is a programming language?
    14·2 answers
  • Which command could you use to change to the /usr directory using a relative pathname?
    8·1 answer
  • For this exercise, you are going to create a part of an Animal hierarchy. Unlike some of our examples and the previous exercises
    10·1 answer
  • If ADD = 81, BAD = 49, and CAD = 64, then what is the value of ACA?
    14·1 answer
  • unlike tv or newspaper ads, internet communications are interactive, and consumers can choose which messages and information the
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!