1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
arlik [135]
3 years ago
13

A hardware compatibility list recommends striping with double parity as storage for an application. In a test environment, a tec

hnician realized that a different RAID level can be used to compensate for a limited number of available disks. Which of the following is the closest RAID level the technician should deploy while minimizing the number of disks and maintaining fault tolerance.
Computers and Technology
1 answer:
riadik2000 [5.3K]3 years ago
4 0

Answer:

RAID level 5 can be used to compensate a limited number of available disks.

Explanation:

There are two type of RAID

  • Software RAID
  • Hardware RAID

Software RAID

deliver services form the host.

Hardware RAID

provides hardware services.

RAID has levels

0, 1, 5, 6, and 10

RAID 0, 1, and 5 work on both HDD and SSD media,

4 and 6 also work on both media.

RAID 0 :Striping

In this level minimum of two disks,RAID 0 split the file strip the data.Multiple hard drive are used to split the data.

RAID 1 : Mirroring

In this level Minimum two disk require and provide data tendency.

RAID 5 :Stripping with parity

Parity is a binary data.RAID system calculate the value which system used to recover the data.

Most RAID system with parity function store parity blocks.

RAID 5 combines the performance of RAID 0 with redundancy of RAID 1.

RAID 5 level should minimize the fault tolerance.

You might be interested in
Wendy wants to learn how to write a computer program that can get the dimensions of a rectangle from the user and then tell the
otez555 [7]

Answer:

algorithms for finding the area

Explanation:

you need algorithms to find out any computer input information.

4 0
3 years ago
Read 2 more answers
Send the memes whoever is the best will get that crown thing lol
shutvik [7]
I have to type 20 characters here so...

4 0
3 years ago
Read 2 more answers
The two rules within Title II of hippa that have the greatest relevance and impact on the business associates are
Ne4ueva [31]
The two rules within Title II of HIPPA (Health Insurance Portability and Accountability Act) that has great relevance and impact on the business associates are: 

1. Privacy Rule - stating of child welfare agencies
2. Security Rule - complying of HIPPA requirements
5 0
3 years ago
Read 2 more answers
Why is homophobia a big thing?
BigorU [14]

I don’t know. It’s an independence thing from society I guess
7 0
3 years ago
Read 2 more answers
An intruder tries a large number of possibilities in rapid succession to guess a password. As a result, other users on the netwo
Daniel [21]

A brute force is the type of attack that occurs when other users on a network are locked out because an intruder is trying to gain access by guessing a large number of password.

<h3>What is a brute force?</h3>

A brute force attack refers to a situation where someone uses a trial-and-error to guess login info, encryption keys etc.

In conclusion, the brute force is the type of attack that occurs when other users on a network are locked out.

Read more about brute force

brainly.com/question/2323336

8 0
3 years ago
Other questions:
  • How do the World Wide Web and the Internet work together?
    11·1 answer
  • Find the largest and smallest byte,short,int,long,float, and double. Which of these data types requires the least amount of memo
    5·1 answer
  • Write the method makeNames that creates and returns a String array of new names based on the method’s two parameter arrays, arra
    9·1 answer
  • What video game has made the most money as of 2016?
    15·2 answers
  • Benching system are prohibited in
    5·1 answer
  • Black and white squares codehs, i need the whole code (40 points for correct answer)
    15·2 answers
  • Who is the intended audience of a pseudocode document?
    14·1 answer
  • Explain how you think robotics plays a part in the subway driver's job.
    13·2 answers
  • Digital Media Equipment: Best Practices Quiz
    15·1 answer
  • How should excel Identify social security numbers: as a text, numbers, or date and time? Why?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!