1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nonamiya [84]
3 years ago
14

Which custom configuration is most likely to include a raid array?

Computers and Technology
1 answer:
Leto [7]3 years ago
3 0

Solution:

The installation wizards in most of the commercial Linux distributions provide an option to create a custom disk layout, specifying which the RAID arrays can be created and the root. Additional RAID arrays can be configured by using the mdadm

It is known as (Redundant Array of Independent Disks) is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement.

Data is distributed across the drives in one of several ways, referred to as RAID levels, depending on the required level of redundancy and performance. It  provide protection against unrecoverable sector read errors, as well as against failures of whole physical drives.

This is the required solution.

You might be interested in
The most efficient tables in a relational database in terms of storage space have no redundant data and very few null values bec
Nastasia [14]

Answer:

The best answer is "False

Explanation:

relational database uses a structure that allows us to identify and access data in relation to another piece organized into tables in the database.

Clustering similar records together is one way of reducing access time.

4 0
4 years ago
Which of the following commands would instruct OSPF to advertise ONLY the 192.168.10.0/24 network in Area 0?
xz_007 [3.2K]

Answer:

First, you need to start the OSPF process by executing the command:

<em>Router (config)# router ospf {process-ID#}</em>

Then, you have to instruct the router to advertise the networks that are directly linked to it by entering this network command with the area ID number for that network:

Router (config-router)# network {192.168.10.0} {255.255.255.0} area {0}

8 0
4 years ago
A four-year old laptop will not boot and presents error messages on screen. You have verified with the laptop technical support
storchak [24]

Answer:

The first question you should ask yourself before performing the repair is Option B. Can you find a replacement motherboard.

Explanation:

According to me, I would ask “Can you find a replacement motherboard”.

Because, Always the laptop charge will be more than the charge of a mother board, because motherboard is just a part and the laptop consists of other important parts too. So Option (a) is not the wise selection.

Let’s look into option D. Warranty period should be verified by us and not the technical person, because we have purchased and we have the warranty card.

Let’s look into option C. The technical person will already be well-versed with fixing solution and diagnosing problem. So service manual will be of not much use to him and he would want to make money out of fixing the problem, so we cannot expect him to teach us how to replace a motherboard.

5 0
4 years ago
In the computer science industry, the process of finding and removing errors from computer hardware or software is known as
Katyanochek1 [597]
Debugging i think it is
3 0
3 years ago
1. Write a program to input four numbers and store them in variables.
slega [8]
Honestly , brainly may seem like a place to get answers but it’s not , people come here to troll, like me
7 0
3 years ago
Other questions:
  • What are the latest technology in 2014
    11·1 answer
  • Ipv6 includes a native information security framework (ipsec) that provides both data and control packets. true false
    15·1 answer
  • ________ is a type of attack in which the attacker takes control of a session between two machines and masquerades as one of the
    5·1 answer
  • How many water bottles must be collected to win?
    8·2 answers
  • *blank* is the unauthorized copying and selling or distributing of licensed video games.
    10·1 answer
  • Consider the formula: G=D+(A+C^2)*E/(D+B)^3 Show the order that a processor would follow to calculate G. To do so, break down th
    10·1 answer
  • Which virus-infecting components are email messages prone to carry?
    8·2 answers
  • A router has just received the following new IP addresses: 88.62.108.0/21, 88.62.116.0/21, 88.62.120.0/21 and 88.62.128.0/21. If
    5·1 answer
  • Write a calculator program using a switch statement that: a) Prompts the user to enter two numbers b) Prompts the user to select
    6·1 answer
  • What would a good digital citizen do if he sees his classmate left her email account open on a school computer by mistake?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!