1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Arte-miy333 [17]
4 years ago
13

What is storage virtualization? Multiple Choice combines networks by splitting the available bandwidth into independent channels

that can be assigned in real time to a specific device combines the physical resources, such as servers, processors, and operating systems, from the applications offers backup services that use cloud resources to protect applications and data from disruption caused by disaster combines multiple network storage devices so they appear to be a single storage device
Computers and Technology
1 answer:
slavikrds [6]4 years ago
8 0

Answer:  Combines multiple network storage devices so they appear to be a single device.

Explanation: In this case, different physical devices, that normally are accessed separately as different drives, are treated  by the operating system, like they were only one "giant drive" , hidding from the  user the details regarding how it is done, creating in this way a virtual storage, a single logic unit.

You might be interested in
Davingould1115...................answer 3​
FrozenT [24]

Answer:

yo thx bro let me know if u need any more help

Explanation:

4 0
3 years ago
We love him, because he ."
Andre45 [30]
We love him, because he “is everything I need.” I’m kinda confused on the answer lemme know if you need help
7 0
2 years ago
Fill in the blank: In a Word chart, text that describes the data represented in a chart and that is typically displayed on the r
Triss [41]

Answer:

Data bar

Explanation:

8 0
3 years ago
What threat do insiders with authorized access to information or information systems pose
ki77a [65]

Answer:

Depens on the permissions the user has been granted if the user leaks the infomation it will break the CIA triad rule. To be more specific it will break the confidentiality rule in the triad. If the user has the permission to delete data it will break the availability rule because the data is not avaliable as the user deleted the data. If the user has permissions to edit the data, it will break the integrity rule in the triad because the data is no longer reliable or trustworthy.

7 0
3 years ago
In this exercise we will practice using loops to handle collections/containers. Your job is to write a program that asks the use
kati45 [8]

Answer:

In Python:

chars = 'abcdefghijklmnopqrstuvwxyz'

letter = input("Sentence: ")

for i in range(len(chars)):

   count = 0

   for j in range(len(letter)):

       if chars[i] == letter[j].lower():

           count = count + 1

   if count > 0 :

       print(chars[i]+": "+str(count)+" times")

Explanation:

This initializes the characters of alphabet from a-z

chars = 'abcdefghijklmnopqrstuvwxyz'

This prompts the user for sentence

letter = input("Sentence: ")

This iterates through the initialized characters

for i in range(len(chars)):

This initializes count to 0

   count = 0

This iterates through the input sentence

   for j in range(len(letter)):

This compares the characters of the sentence with alphabet a-z

       if chars[i] == letter[j].lower():

If there is a match, count is incremented by 1

           count = count + 1

If there is an occurrence of character,

   if count > 0 :

The character and its count is printed

       print(chars[i]+": "+str(count)+" times")

5 0
3 years ago
Other questions:
  • Operating systems are designed to work with specific hardware. Which operating system works with Apple computers?
    8·2 answers
  • Why would it be beneficial to preview a page before printing?
    8·1 answer
  • In an image citation, what piece of information is listed first?
    14·1 answer
  • What is UTF-8 and why was it created?
    8·1 answer
  • Write a program with a loop that lets the user enter a series of positive integers. The user should enter −1 to signal the end o
    7·1 answer
  • Instructions:Select the correct answer.
    9·1 answer
  • What characteristics of IT careers can be a challenge for employees
    9·2 answers
  • Which of the following, (1) money deposited in a bank account, (2) student recording her answer to a question in an online test,
    14·1 answer
  • Which of the following are correct? I. Hold the middle mouse button to rotate the model on the screen. II. To pan the model, hol
    15·1 answer
  • Write C# program that will read name from keyboard and display it on screen. The program should throw an exception when the leng
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!