1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksanka [162]
4 years ago
13

"Describe how implementation of a RAID Level 2 system would be beneficial to a university payroll system. In your own words, des

cribe the disadvantages of such a system, if any, in that environment, and if appropriate, suggest an alter-native RAID system and explain your reasoning"
Computers and Technology
1 answer:
Darina [25.2K]4 years ago
4 0

Answer:

In RAID 2 Hamming Code ECC Each piece of the information word is kept in touch with an information plate drive . Every datum word has its Hamming Code ECC word recorded on ECC circles. On Read, the ECC code confirms the right information or revises the single plate blunders.  

Strike Level 2 is one of the two innately equal mapping and assurance strategies characterized in the Berkeley paper. It has not been broadly sent in the business to a great extent since it requires an extraordinary plate highlights. Since plate creation volumes decides the cost, it is increasingly practical to utilize standard circles for the RAID frameworks.  

Points of interest: "On the fly" it gives information blunder amendment. Amazingly high information move rates is possible.Higher the information move rate required,better the proportion of information circles to ECC plates. Moderately basic controller configuration contrasted with the other RAID levels 3,4 and 5.  

Impediments: Very high proportion of the ECC plates to information circles with littler word sizes - wasteful. Passage level expense are extremely high - and requires exceptionally high exchange rate prerequisite to legitimize. Exchange rate is equivalent to that of the single plate, best case scenario (with shaft synchronization). No business executions can't/not industrially suitable.

You might be interested in
The Painting Company has determined that for every 112 square feet of wall space:
LUCKY_DIMON [66]

Answer:

Answered below

Explanation:

#Program is written in Python.

sq_feet = int(input ("Enter paint area by square feet: ")

gallons = float(input (" Enter number of gallons: ")

paint_job_cost(sq_ft, gallons)

#Function

def paint_job_cost(sq_ft, gal){

gallon_cost = 0

cost_per_hour = 35

if sq_ft <= 2000:

 gallon_cost = 9.53

else:

gallon_cost = 10.50

paint_cost = gal * gallon_cost

labour_hours = 8 * (sq_ft/112)

total_labour_cost = labour_hours * cost_per_hour

hazard_fee = 0.075 * paint_cost

total_cost = paint_cost + total_labour_cost + hazard fee

print (paint_cost)

print(labour_hours)

print (total_labour_cost)

print (hazard_fee)

print(total_cost)

}

5 0
3 years ago
A friend knows I'm taking a technology class in college and asks me how a hard drive works. What should I say to a friend about
kramer
It's the main store of data on a computer. It's involatile, so data isn't lost when power is switched off. Relatively speaking, it's slow to access compared to the rest of the memory in the computer. Part of it can also become virtual memory when the RAM is full
4 0
3 years ago
An important factor to consider when purchasing new software is to investigate how much storage the application and associated d
kolbaska11 [484]

Answer: you need data files

Explanation: becusue you need to save

3 0
3 years ago
Which two components are configured via software in order for a PC to participate in a network environment
dalvyx [7]

Answer:

IP address and subnet mask.

Explanation:

The two components which are configured via software in order for a personal computer (PC) to participate in a network environment are;

I. IP address: it is an acronym for internet protocol address and can be defined as a unique number assigned to a computer or other network devices, so as to differentiate each device from one another in an active network system. Thus, an IP address is typically used to uniquely identify each computer or network devices connected to the internet or network.

In Computer networking, IP address are classified into two (2) main categories and these are; Local (internal) IP address and Global (external) IP address.

Also, the internet protocol (IP) address comprises of two (2) versions and these are; Internet protocol version 4 (IPv4) and Internet protocol version 6 (IPv6). An example of an IPv4 address is 192.168.1.0.

II. Subnet mask: this is a logical segmentation or subdivision of an internet protocol (IP) network so as to accommodate more hosts (computer systems). An example of a subnet mask is 255.255.0.0.

6 0
3 years ago
Jane, an employee in the human resources department, has created several important PDF documents on her computer that all office
Colt1911 [192]

Answer:

Share documents and set specific permissions.

Explanation:

For a computer network with Windows OS Jane and the technician can create a Shared Folder by right-clicking on it and selecting properties.

Then on the Share and Security tabs of the properties, they can set which specific users and/or roles will have access to the shared folder. They will also have to set what permission level will be granted, such as <em>full access, read only, etc.</em>

The managers can access the shared files using <em>Windows explorer</em> either by searching shared folders in their Network, or by typing the shared folder address usually something like \\JANE_PC/SharedFolder.

6 0
3 years ago
Read 2 more answers
Other questions:
  • Universal containers has included its orders as an external data object in to Salesforce. You want to create a relationship betw
    7·1 answer
  • A ________ is a container that provides quick access to elements at the front and the back of the list
    6·1 answer
  • During the _______ steps of the information processing cycle, data is manipulated, calculated, or organized to create useful inf
    9·1 answer
  • has anyone noticed to get credit for answering a question you don't even need to answer it correctly?
    11·2 answers
  • modified true or false analyze each statement then write technical the statement is true the statement is false underline the wo
    6·1 answer
  • About twice a day my Chromebook blacks out. why does it do that?
    8·2 answers
  • To see the formula in a cell, look at the___
    5·1 answer
  • Write an essay about yourself based on the dimensions of ones personality​
    9·1 answer
  • . 。 • ゚ 。 .
    10·2 answers
  • Select the correct answer from each drop-down menu,
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!