1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
WARRIOR [948]
4 years ago
10

On your Windows server, you're planning to install a new database application that uses an enormous amount of disk space. You ne

ed this application to be highly available, so you need a disk system with the capability to auto-correct from disk errors and data corruption. You also want a flexible storage solution that makes it easy to add space and supports deduplication. Describe your best option.
Computers and Technology
1 answer:
hoa [83]4 years ago
4 0

Answer:

ReFS format and Storage Spaces.

Explanation:

ReFS(Resilient File System)format was introduced in 2012 and it was the replacement for NTFS(NT File System).It was introduced as a part of the Windows Server.ReFS supports maximum value of 1 yottabyte (1 one million Terabytes). It also supports auto-correct form disk errors and data corruption.You need a storage space to store the data hence  we need storage space also.

You might be interested in
In a typical e-mail address, the \"host\"is
steposvetlana [31]
Email hosts by definition are the servers which operate the emailing service. This allows individuals to interact through message sending. The best email hosts defined today are Zoho Mail, Fast Mail, Google Apps that handles Gmail, Pobox, Proton Mail and Rackspace Mail. 
4 0
4 years ago
When do you need to use a fully qualified url in a hyperlink?
Rudiy27
When you're linking to another web site.
7 0
3 years ago
Suppose that, even unrealistically, we are to search a list of 700 million items using Binary Search, Recursive (Algorithm 2.1).
damaskus [11]

Answer:

There is also an attachment below

Explanation:

Since we are talking about binary search, let's assume that the items are sorted according to some criteria.

Time complexity of binary search is O(logN) in worst case, best case and average case as well. That means it can search for an item in Log N time where N is size of the input. Here problem talks about the item not getting found. So, this is a worst case scenario. Even in this case, binary search runs in O(logN) time.

N = 700000000.

So, number of comparisions can be log(N) = 29.3 = 29.

So, in the worst case it does comparisions 29 times

7 0
3 years ago
You are creating a budget for your new business. What should you include?
Lina20 [59]

The answer is A.

When creating a business budget, include all you income sources and ad both fixed and variable costs and expenses.

The first and most important element of a good business budget is to tally and figure out your income sources. Income sources include things like product sales, earnings, and others. You should also be able to determine the fixed costs and include variable expenses. Variable expenses are those items that do not have a fixed price tag and may include raw materials, commissions, advertising, transportation, printing services, and many others.

7 0
3 years ago
Windows service accounts will use passwords consisting of at least 15 characters.
vichka [17]
False because u need 16 letters
4 0
3 years ago
Other questions:
  • 2 Which statement best explains how computers are used to analyze information?
    6·1 answer
  • The __________ format is a proprietary file format defined by guidance software for use in its forensic tool to store hard drive
    15·1 answer
  • When a module is executing what happens when the end of the module is reached?
    10·1 answer
  • Customizing ads to people who had earlier visited the site is
    14·1 answer
  • Java: Programming Question: Reverse OrderWrite a program that reads ten integers into an array; define another array to save tho
    10·1 answer
  • Working with do-while loop
    9·1 answer
  • Tina has taken the time to modify font sizes and colors in a text box and would like to duplicate those settings on other text b
    12·2 answers
  • Why is computer called and information processing machine​
    6·1 answer
  • What is the role of UPS in Computer security?<br>4 marks answer​
    12·1 answer
  • Print numbers 0, 1, 2, ..., userNum as shown, with each number indented by that number of spaces. For each printed line, print t
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!