1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kobusy [5.1K]
3 years ago
14

A RAID structure ____. is primarily used for security reasons is primarily used to ensure higher data reliability stands for red

undant arrays of inexpensive disks is primarily used to decrease the dependence on disk drives
Computers and Technology
1 answer:
notka56 [123]3 years ago
5 0

Answer:

b) A RAID structure is primarily used to ensure higher data reliability,

Explanation:

A set of hard disks configured as a RAID (Redundant Array of Independent Disks) , even is composed by several separate disk units, in their different configurations (RAID 0, 1, 2 or 5 being the more usual) behave like it were a single logical unit.

The information to be stored is divided in blocks (at a byte or bit level) and stored in several disks instead of a single one.

Depending on the type of RAID used , the information (except for RAID 0) is mirrored or encoded in a redundant fashion, so if eventually a disk drive fails, the remaining disks can be used in order to reconstruct the lost information.

So, the main purpose of  a RAID array is to be able to retrieve the stored data in the event of a disk failure, which ensures higher data reliability.  

You might be interested in
What is a feature of readable code?
mamaluj [8]

Answer:

sorry for the wait but the answer is b

Explanation:

5 0
3 years ago
Read 2 more answers
Kiko loves to surf the internet and check on different websites. One day he received an email from unknown source. When he opens
Angelina_Jolie [31]

He experienced phishing

Phishing is a method of trying to gather personal information using deceptive e-mails and websites.

Here are some measures to avoid phishing. You can pick up the one you liked the most

  • Always check the spelling of the URLs in email links before you click or enter sensitive information
  • Watch out for URL redirects, where you're subtly sent to a different website with identical design
  • If you receive an email from a source you know but it seems suspicious, contact that source with a new email, rather than just hitting reply.
  • Don't post personal data, like your birthday, vacation plans, or your address or phone number, publicly on social media
5 0
3 years ago
A web-based application encounters all of the connectivity and compatibility problems that typically arise when different hardwa
andrezito [222]

Answer:

False

Explanation:

A web-based application encounters connectivity and compatibility relate to data server. It does not belong to any hardware environments.

A web based application is accessed over network.They run inside a web browser. Small of program is download to user's desktop, but this processing is done over internet.

6 0
3 years ago
A red wavy line under a word means _____.
zhenek [66]
The third option is correct.
3 0
3 years ago
Read 2 more answers
What permanent magnets of a motor are replaced with more powerful ones, what effect do you think this would have on motor rotati
Marat540 [252]
When permanent magnets of a motor are replaced with more powerful ones, the motor rotation will increase. This is because there is more electricity being generated.
7 0
3 years ago
Read 2 more answers
Other questions:
  • What are some common characteristics of jobs in this career cluster? check all that apply
    10·2 answers
  • Which of the following actions should you take when turning left at an intersection?
    11·1 answer
  • Write a Python script to input time in minutes , convert and print into hours and minutes.
    7·1 answer
  • Help verify each identity<br><img src="https://tex.z-dn.net/?f=%20%5Cfrac%7Bcsc%7D%7Bcot%20%5C%3A%20x%20%20%5C%3A%20%2B%20%20%5C
    9·1 answer
  • Consider the following code which deletes all the nodes in a linked list. void doublyLinkedList::destroy() { nodeType *temp; //p
    14·1 answer
  • Assume that scotus is a two-dimensional character array that stores the family names (last names) of the nine justices on the Su
    14·1 answer
  • 1. Give state diagrams of DFAs recognizing the following languages. The alphabet is {0, 1}. (a) {w | w is any string except 11 a
    7·1 answer
  • The problem analysis phase typically includes which of the following tasks? (Points : 2) Negotiate baseline scope.
    10·1 answer
  • Predict the future that social media will have on society or the environment
    12·1 answer
  • Discuss how classification systems have undergone several changes over a period of time.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!