1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ne4ueva [31]
3 years ago
5

Some of the users in your company create and delete so many files that they have problems with fragmented disks. Which of the fo

llowing new features in the ext4 file system help to reduce fragmentation problems?
a. hot swap
b. fragmonitor
c. smaller file sizes
d. extents
Computers and Technology
1 answer:
zavuch27 [327]3 years ago
4 0

Answer:

D) extents

Explanation:

Disks fragmentations in computer science refers to the cases of a file system laying out its contents  in a non-continuous manner thus preventing an in-place alteration of the contents (that is the contents of the file are scattered in fragments across different location on the disk). Disk fragmentation is mostly associated with aging. To mitigate against this, modern implementation of file systems try to preallocate longer chunks of disk space, this is called extents, in this way fragmentation is avoided since a contiguous size of disk space is preallocated to the files and its contents stay together.

You might be interested in
5.4.6: Rolling Dice code
ziro4ka [17]
It is 15 all together
4 0
3 years ago
What are the events?
erastovalidia [21]

Answer:

a thing that happens or takes place, especially one of importance.

8 0
3 years ago
What is a privacy data breach
kotykmax [81]

Answer: A privacy data breach occurs when personal information is stolen or lost or is collected, used or disclosed without authority. A privacy breach occurs when personal information is stolen or lost or is collected, used or disclosed without authority.

Explanation:

Examples of a  data breach might include:

Loss or theft of hard copy notes, USB drives, computers or mobile devices. an unauthorized person gaining access to your laptop, email account or computer network. sending an email with personal data to the wrong person.

7 0
1 year ago
Is the following an example of social media viral marketing? Indicate your response by selecting yes or no. When you sign onto y
Vladimir [108]

Answer

yo im sorry give me points b

Explanation:

gasefe

3 0
3 years ago
2
Crazy boy [7]

If any mistake was made using this type of primitive programming, the entire program of punch cards had to be re punched again. The correct option is A.

<h3>What is punch card?</h3>

A punch card is a card on which data is able to be recorded in the form of punched holes.

Whenever a mistake is done, the punched card is scrapped and made anew one for same programming.

Thus, if any mistake was made using this type of primitive programming. The entire program of punch cards had to be re punched again. The correct option is A.

Learn more about punch card.

brainly.com/question/27476988

#SPJ1

4 0
2 years ago
Other questions:
  • Two electronics students are discussing static electricity and electric current. Student A says that a basic property of static
    12·1 answer
  • Who share the road with an impaired driver are at risk
    7·2 answers
  • If two hosts are connected by five networks, how many frames will there be when one host sends a packet to the other host? 1 2 5
    13·1 answer
  • Write a program that will find the smallest, largest, and average values in a collection of N numbers. Get the value of N before
    13·1 answer
  • Anyone here good with python coding. I have some machine learning homework which I am having a hard time with,
    12·1 answer
  • Which technology will a business use to figure out who accessed confidential files on a company's computer system
    12·1 answer
  • 9.
    15·1 answer
  • Which are benefits of group discussions? Check all that apply. Learning becomes more interesting. Students engage in learning. L
    12·2 answers
  • Write a program that produces an expense report for a trip to Lagos, Nigeria. Use the Internet to research the cost to travel to
    13·1 answer
  • ________ can be written only once. The data cannot be erased or written over once it is saved.​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!