1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kobusy [5.1K]
3 years ago
14

A RAID structure ____. is primarily used for security reasons is primarily used to ensure higher data reliability stands for red

undant arrays of inexpensive disks is primarily used to decrease the dependence on disk drives
Computers and Technology
1 answer:
notka56 [123]3 years ago
5 0

Answer:

b) A RAID structure is primarily used to ensure higher data reliability,

Explanation:

A set of hard disks configured as a RAID (Redundant Array of Independent Disks) , even is composed by several separate disk units, in their different configurations (RAID 0, 1, 2 or 5 being the more usual) behave like it were a single logical unit.

The information to be stored is divided in blocks (at a byte or bit level) and stored in several disks instead of a single one.

Depending on the type of RAID used , the information (except for RAID 0) is mirrored or encoded in a redundant fashion, so if eventually a disk drive fails, the remaining disks can be used in order to reconstruct the lost information.

So, the main purpose of  a RAID array is to be able to retrieve the stored data in the event of a disk failure, which ensures higher data reliability.  

You might be interested in
What is destination email address​
Ronch [10]

Answer:

Explanation:

The E-mail Destination allows you to send data from your forms in text format to various different email addresses.

8 0
3 years ago
Please help I upped the points and please don't answer if you don't have the answer..
ikadub [295]

Answer:

3. Paying for my daughter to attend college and building a life outside of struggle. These goals must be accomplished by me finishing school, going onto college and maybe even starting my own business. I must set an appropriate example for my daughter to learn from someone who she believes in. Starting a family business to pass down to generations will be an excellent way to start financially planning now ahead of time.

4. Living in a family of mines, common financial resource is either government assisted or public security.An expense that I cannot escape now is the caring for of my daughter which will vary as she get older. Lastly a debt would be the over spending of credit cards with no money to pay it back as the interest rates climb.

Explanation:

3 0
3 years ago
In Mandatory Access Control sensitivity labels attached to object contain what information?
larisa86 [58]

Answer:b)The item’s classification and category set

Explanation: Mandatory access control(MAC) is the security component in the computer system. It is regarding the controlling the access of the operating system by the administrator.The accessing is made limited by the MAC according to the sensitivity of the data .

The authorization for user to access the system is based on this sensitivity level known sensitivity label. The objects contain the information regarding the classification and categories or level of items. Thus, the correct option is option(b).

7 0
3 years ago
Does anyone play fortnite i want to be gifted vbucks please my epic is Springtrap_locks thx means a lot to me
Paladinen [302]

Answer:

This is not what this platform is supposed to be used for

Explanation:

Fortnite isnt a real game lol get a life

3 0
3 years ago
Why dose enginuty suck like really
masya89 [10]

Answer:

if you don't like it why u doin it?

Explanation:

3 0
3 years ago
Other questions:
  • Why would an over the shoulder shot be used
    11·1 answer
  • Which of the following would be a considered a want rather than a need for most people?
    15·1 answer
  • You have just finished writing a lengthy research paper and you are ready for formatting. You insert your paragraph headings and
    15·1 answer
  • Which of the following is a malicious program that can replicate and spread from computer to computer?
    13·2 answers
  • Which is an unbound form with menu options for navigating a database?
    11·2 answers
  • Why might it be a good idea to choose a bus topology?
    6·2 answers
  • A network needs to be set up with 60 subnets. Given the IPv4 class C address 192.168.100.0, what subnet mask value should be use
    7·1 answer
  • In your own words explain how to add footer and head in a word doc.
    10·1 answer
  • Which of the following is the best example of an installation issue?
    6·2 answers
  • Match the following pls help
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!