1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iren2701 [21]
3 years ago
14

Which custom configuration is most likely to include a raid array?

Computers and Technology
1 answer:
Usimov [2.4K]3 years ago
7 0

Solution:

The installation wizards in most of the commercial Linux distributions provide an option to create a custom disk layout, specifying which the RAID arrays can be created and the root. Additional RAID arrays can be configured by using the mdadm

It is known as (Redundant Array of Independent Disks) is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement.

Data is distributed across the drives in one of several ways, referred to as RAID levels, depending on the required level of redundancy and performance. It  provide protection against unrecoverable sector read errors, as well as against failures of whole physical drives.

This is the required solution.

You might be interested in
What the repeal of online privacy protections means for you?
kvv77 [185]
Online Privacy is well, our privacy while on the internet. If they have repealed that, then we have no privacy while on the internet. I feel like now a days there is no privacy at all anywhere. Everywhere you go, there are cameras watching you. So for them to take away online privacy is pretty messed up.
7 0
3 years ago
Why would you convert your birth year to binary numbers?
I am Lyosha [343]

Answer:

Write out your birthday in the following format: M/DD/YY. For example, if your birthday is on June 11, 2013, it would be written as 6/11/13.

2. Convert the birthday date to binary format. Using our same example from above, 6/11/13 translated into binary code would be: 110/1011/1101.

3. Select one color of bead to represent “0”, a second color to represent “1” and then the third color to represent a space (/) between the numbers.

4. Layout the beads to represent your birthdate in binary code. Don’t forget the third color for the spaces in between the numbers!

5. Once laid out, string all the beads on to the string or pipe cleaner.

6. Tie a knot around the ends and enjoy your one-of-a kind masterpiece as a piece of jewelry or a bag tag….the options are endless!

6 0
3 years ago
How does this happen on brainly????
Trava [24]

what do you mean????

4 0
3 years ago
Read 2 more answers
What is the name of the file in which this
anyanavicka [17]

Answer:

B

Explanation:

i’m an information technology  student and as I remember we used this  name

3 0
3 years ago
I have some IT problem. Can I find a programmer here?
Jlenok [28]
If it's a hardware problem, find a mechanic or buy replacement parts.
If it's a software issue, someone ranked high on Brainky may know the programming language.
A handy hint is just to ask! If your question isn't answered, try elsewhere!
3 0
3 years ago
Other questions:
  • Software can be distributed on the web. <br> a.true <br> b.false
    12·1 answer
  • Which of the following typically have the highest auto insurance premiums?
    14·1 answer
  • Displays are geared for a specific resolution. what is this resolution called?
    15·1 answer
  • A ________ is a very large general-purpose computer that is capable of performing very many functions as if these are done simul
    8·1 answer
  • Please help with attached file
    8·2 answers
  • ___signs tell you what you can or can't do, and what you must do ?
    5·2 answers
  • In cell M2, enter a formula using a nested IF function as follows to determine first if a student has already been elected to of
    12·1 answer
  • What is the main difference between a search engine and a web browser?
    6·2 answers
  • Which best describes what databases do?
    8·2 answers
  • Which password attack method uses long lists of words that have been predefined and can be quickly downloaded for use to break a
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!