1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ne4ueva [31]
3 years ago
5

Some of the users in your company create and delete so many files that they have problems with fragmented disks. Which of the fo

llowing new features in the ext4 file system help to reduce fragmentation problems?
a. hot swap
b. fragmonitor
c. smaller file sizes
d. extents
Computers and Technology
1 answer:
zavuch27 [327]3 years ago
4 0

Answer:

D) extents

Explanation:

Disks fragmentations in computer science refers to the cases of a file system laying out its contents  in a non-continuous manner thus preventing an in-place alteration of the contents (that is the contents of the file are scattered in fragments across different location on the disk). Disk fragmentation is mostly associated with aging. To mitigate against this, modern implementation of file systems try to preallocate longer chunks of disk space, this is called extents, in this way fragmentation is avoided since a contiguous size of disk space is preallocated to the files and its contents stay together.

You might be interested in
How can I make my Wi-Fi signal fast? I am going through my exam but my Wi-Fi is not supporting plz help.
9966 [12]

Answer: Maybe try to move router.

Explanation:

8 0
3 years ago
What technique is used to separate the different cell parts?
Brut [27]
This should be in Science/Biology
5 0
3 years ago
Write a Python function that join the two string and print it ​
liubo4ka [24]

Answer:

string1 = "this is string 1"

string2 = " this is string 2"

print(string1 + string2)

Explanation:

the string1 variable is assigned with a string value(aka. str)

string2 is also a variable assigned with a slightly different string value

the 3rd line then prints string 1 and 2 to the console.

5 0
2 years ago
Read 2 more answers
A three-tier design includes a middle layer between the client and server that processes the client requests and translates them
devlian [24]

Answer:

a. True

Explanation:

The three tiers in a three-tier architecture are:

Presentation Tier: Occupies the top level and displays information related to services available on a website. This tier communicates with other tiers by sending results to the browser and other tiers in the network.

Middle Tier: Also called the application tier, logic tier, business logic or logic tier, this tier is pulled from the presentation tier. It controls application functionality by performing detailed processing.

Data Tier: Houses database servers where information is stored and retrieved. Data in this tier is kept independent of application servers or business logic.

5 0
3 years ago
Are you concerned that strangers may have access to the personal information you share on social media platforms? Why or why not
GuDViN [60]
It makes me a little uneasy at times, yes, but I know that they cannot find me unless I share way too much.
Hope this helps~!
~{Oh Mrs. Believer}
4 0
3 years ago
Other questions:
  • Designing the moving parts of a car—including the engine, drivetrain, steering, and brakes—is done by what type of engineer?
    11·2 answers
  • Write a function that takes an array of integers and its size as parameters and prints the two largest values in the array. In t
    5·1 answer
  • Many computers today use _____ which is a coding scheme using at least 16 bits to represent a character.
    10·1 answer
  • Which type of computer is the best? laptop, tablet, or desktop
    15·2 answers
  • Which function of a word processing program enables you to apply a preset formatting
    5·1 answer
  • What is the name of the virus that appears to be a legitimate program but when opened
    9·1 answer
  • 1. Insert a Header that has the following in excel​
    14·1 answer
  • When looking at security standard and compliance, which three (3) are characteristics of best practices, baselines and framework
    8·1 answer
  • Write a program, TwoDimentionalGrid. Ask the user to enter the size of the 2 dimensional array. Here we are not doing any input
    13·1 answer
  • You have implemented an access control method that only allows users who are managers to access specific data. Which type of acc
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!