1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iren2701 [21]
3 years ago
14

Which custom configuration is most likely to include a raid array?

Computers and Technology
1 answer:
Usimov [2.4K]3 years ago
7 0

Solution:

The installation wizards in most of the commercial Linux distributions provide an option to create a custom disk layout, specifying which the RAID arrays can be created and the root. Additional RAID arrays can be configured by using the mdadm

It is known as (Redundant Array of Independent Disks) is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement.

Data is distributed across the drives in one of several ways, referred to as RAID levels, depending on the required level of redundancy and performance. It  provide protection against unrecoverable sector read errors, as well as against failures of whole physical drives.

This is the required solution.

You might be interested in
What are 7 good facts on Computer Viruses?
tia_tia [17]
<u><em>Viruses,A tiny program that hacks a computer </em></u>
<u><em>Steals information and personal data.It can disable your laptop.Viruses can be found in malicious sites.Criminals share these viruses to steal data from others.With a firewall,Hackers will be detected.</em></u>
<u><em> </em></u>

<u><em>The general consensus is that there are no good viruses.</em></u>



4 0
3 years ago
A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use.
Brilliant_brown [7]

Answer:

True.

Explanation:

An investigator would like to do an internet-based college student survey to gather data regarding their behavior as well as drug use. Even so, specific identifications are still not gathered and IP addresses might be available in the set of data. Damage threat must be assessed both by the magnitude (or severity) and the likelihood (or likelihood) of the hurt.

7 0
3 years ago
How to make a 'Sign in with replit' button in replit (Node.js) will make brainliest
Y_Kistochka [10]

hit the sign in botten or create new account

3 0
3 years ago
Read 2 more answers
Walt has selected data in a worksheet and inserted a chart. However, the chart is inserted right on top of the data set, and he
Marianna [84]

Answer:

Click View and zoom into the worksheet so the chart is easily visible.

Explanation:

5 0
3 years ago
Read 2 more answers
What is a form of technology that you think will make your life easier?
zzz [600]

Answer:

Digital communication technologies

Explanation:

connecting people across the globe has become easier and faster. Platforms such as Zoom, Room, Microsoft teams, WebEx, and many others are buzzing virtual world spaces to connect and share.

5 0
3 years ago
Other questions:
  • PLS HURRY!! This OS introduced a very cool GUI that had animations and transparencies.
    5·1 answer
  • The title of a Web page is the text that appears on the title bar and taskbar of the browser window. *
    13·1 answer
  • How did the discovery of glossopteris support wegner's continental drift hypothesis?
    15·1 answer
  • 7.12 LAB: Contains the character
    12·2 answers
  • After a suspected identity fraud case has been resolved, you should:
    5·1 answer
  • Which of the following statements describes a good reason to use lossless audio compression?
    6·1 answer
  • Which of the following is true about scalability?
    9·1 answer
  • Why is the Microsoft website considered the best source for information about pagefile.sys?​
    15·1 answer
  • Define the term loop rule.
    13·1 answer
  • A(n) _____ is a computerized system by which subscribers are able to communicate to all other subscribers by sending a transmiss
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!