1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kobusy [5.1K]
3 years ago
14

A RAID structure ____. is primarily used for security reasons is primarily used to ensure higher data reliability stands for red

undant arrays of inexpensive disks is primarily used to decrease the dependence on disk drives
Computers and Technology
1 answer:
notka56 [123]3 years ago
5 0

Answer:

b) A RAID structure is primarily used to ensure higher data reliability,

Explanation:

A set of hard disks configured as a RAID (Redundant Array of Independent Disks) , even is composed by several separate disk units, in their different configurations (RAID 0, 1, 2 or 5 being the more usual) behave like it were a single logical unit.

The information to be stored is divided in blocks (at a byte or bit level) and stored in several disks instead of a single one.

Depending on the type of RAID used , the information (except for RAID 0) is mirrored or encoded in a redundant fashion, so if eventually a disk drive fails, the remaining disks can be used in order to reconstruct the lost information.

So, the main purpose of  a RAID array is to be able to retrieve the stored data in the event of a disk failure, which ensures higher data reliability.  

You might be interested in
In one to two sentences, explain how to save a new document.
Eduardwww [97]

It all depends on what you are using,

If you are using Google Docs, the document automatically saves itself

4 0
3 years ago
Read 2 more answers
How dependent are we on technology? ​
rusak2 [61]

very independent  : ) we use it for everything

3 0
4 years ago
Read 2 more answers
[30 points, will mark Brainliest] Which of the following is the lowest hexadecimal value? Explain why. Options to chose; F2, 81,
larisa86 [58]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

First, we need to convert these hexadecimal numbers into decimal numbers, then we can easily identify which one is the lowest hexadecimal.

The hexadecimal numbers are F2, 81, 3C, and 39.

F2 = (F2)₁₆ = (15 × 16¹) + (2 × 16⁰) = (242)₁₀

81 = (81)₁₆ = (8 × 16¹) + (1 × 16⁰) = (129)₁₀

3C = (3C)₁₆ = (3 × 16¹) + (12 × 16⁰) = (60)₁₀

39 = (39)₁₆ = (3 × 16¹) + (9 × 16⁰) = (57)₁₀

The 39 is the lowest hexadecimal number among the given numbers.

Because 39 hex is equal to 57 decimal.

39 = (39)₁₆ = (3 × 16¹) + (9 × 16⁰) = (57)₁₀

5 0
3 years ago
Which requires large computer memory?
Sav [38]

Answer:

Imaging , Graphics and voice..... requires large computer memory.

Explanation:

5 0
3 years ago
Which Internet connection can have speeds around 1 Gbps?<br> Cable<br> DSL<br> Fiber<br> Satellite
Alexus [3.1K]
<h2>Answer:</h2>

<u>Fiber</u> Internet connection has speeds around 1 Gbps.

<h2></h2><h2>Explanation:</h2>

Fiber Internet connection is the modern way of transmitting and receiving data. As obvious from the name Optical Fiber consists of thin fibers that are extremely thin (as a human hair). They transmit data with the beam of light that make this transmission speedy as well as reliable. Therefore they provide  the download speed ranging from 25 Mbps to 1 Gbps.

Fiber Internet connection is considered best for the small businesses as it provides high bandwidth for transmission.  The best part of this connection is that it is made of glass and plastic that  do not conduct heat or electricity that means the fiber is safe from the damages as well.

<h3>I hope it will help you! </h3>
5 0
4 years ago
Other questions:
  • Explain why living things store energy in lipids instead of in carbohydrates
    5·1 answer
  • How to find determinant of ​
    15·1 answer
  • Suppose that a computer can read or write a memory word in 5 nsec. Also suppose that when an interrupt occurs, all 32 CPU regist
    10·2 answers
  • You can invoke or call a method from another program or method. When methods must share data, you can pass the data into and ret
    6·1 answer
  • Two ways in which the media does not reflect the society you live in.
    9·1 answer
  • How to unsubscribe from Brainly
    6·2 answers
  • When more open-ended questions are asked in a study group, discussions are more likely to
    14·2 answers
  • Describing Lookup Fields
    14·2 answers
  • 4.2 Code Practice: Question 2​
    14·1 answer
  • Difference between second and third generation of computer<br>​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!