1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Archy [21]
3 years ago
15

Why should the drives be segregated in a computer?​

Computers and Technology
1 answer:
Ostrovityanka [42]3 years ago
3 0

Answer:

In computer systems, drives were usually given with numbers for identification. In the earlier systems, manufacturers wanted to ensure that every thing is more simplified so they installed just one or two drives. These were usually identified as Drive A or B.

Earlier computers also lacked the provisions for external storage devices or hard disks. So to store your data you have an option to save it either on Drive A or B so the data could easily be retrieved by the user.

With the arrival of better and improved systems, the need for drive segregation also eliminated such that all data could be stored in a single hard disk.

https://brainly.in/question/4615628

You might be interested in
Without a well-designed, accurate database, executives, managers, and others do not have access to the ____________________ they
ohaa [14]

Answer:

Information

Explanation:

Good decisions are normally based on facts which are tangible information that can be analysed to show trends of key figures such as sales, income, production that are so critical in business. A well-designed and accurate database captures and stores these figures in an organised way which will enable the information or data to be analysed to make informed decisions.

6 0
3 years ago
There are local administrators for each of the departments, excluding the IT. These local administrators will use the local admi
torisob [31]

Answer:

Listed below are the few ways Linux Server can be secured

1. Group policies: This is a way to ensure security by applying group policies and permissions both on the group level and the files level. Through proper permission configuration we can easily restrict other users from accessing those files and directories.

2. Implementation of the firewall: Implementing firewall in each of the Linux server will definitely help in securing your machine from outside threats. Iptables will help in filtering the network traffic that are entering into the system and even going out of the system.

3.Enabling SELINUX: Enabling SELINUX is another way to secure your system especially a Linux Server. Selinux is a powerful security that checks and allows applications to run into the system. It won't allow any untrusted application to run into the system.

6 0
3 years ago
Question 2 (2 points)
swat32

I beleive all of the above for question one

4 0
3 years ago
In database software, which option is the most appropriate menu choice or command to use if you want to change the format of the
sleet_krkn [62]

Answer:

I think it's d

Explanation:

             

4 0
2 years ago
What is not a safety practice for working near power lines?
Vesna [10]
Because there is a very likely chance you can get electrocuted which could lead to medical treatment or even death. Also if working near trees or polls or anything that is touching a power line may lead to you being electrocuted.
6 0
3 years ago
Other questions:
  • What tab must you click on to view any previously read messages from instructors in the message center?
    14·2 answers
  • A person painting his house dumps the unused paint on the ground. Which of the following resources will this most likely pollute
    14·1 answer
  • If a filesystem has a block size of 4096 bytes, this means that a file comprised of only one byte will still use 4096 bytes of s
    6·1 answer
  • Marty uses a customized database to sort parts and track inventory. The customized database is an example of _____.
    15·1 answer
  • True or False <br><br> The term virus and malware may be used interchangeably.
    13·1 answer
  • Which of these is the largest?<br> terabyte<br> exabyte<br> gigabyte<br> kilobyte<br> PLEASE HELP
    5·1 answer
  • Create a Python program that: Allows the user to enter a person's first name and last name. The user should be able to enter as
    12·1 answer
  • Is it better to try to prevent damage from natural disasters or to deal with disasters after they occur?
    10·2 answers
  • The original programs awaiting tanslation is called​
    11·1 answer
  • Which of the following terms refers to the cells that contain values and labels to be graphed in the chart?.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!