1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
arlik [135]
3 years ago
13

A hardware compatibility list recommends striping with double parity as storage for an application. In a test environment, a tec

hnician realized that a different RAID level can be used to compensate for a limited number of available disks. Which of the following is the closest RAID level the technician should deploy while minimizing the number of disks and maintaining fault tolerance.
Computers and Technology
1 answer:
riadik2000 [5.3K]3 years ago
4 0

Answer:

RAID level 5 can be used to compensate a limited number of available disks.

Explanation:

There are two type of RAID

  • Software RAID
  • Hardware RAID

Software RAID

deliver services form the host.

Hardware RAID

provides hardware services.

RAID has levels

0, 1, 5, 6, and 10

RAID 0, 1, and 5 work on both HDD and SSD media,

4 and 6 also work on both media.

RAID 0 :Striping

In this level minimum of two disks,RAID 0 split the file strip the data.Multiple hard drive are used to split the data.

RAID 1 : Mirroring

In this level Minimum two disk require and provide data tendency.

RAID 5 :Stripping with parity

Parity is a binary data.RAID system calculate the value which system used to recover the data.

Most RAID system with parity function store parity blocks.

RAID 5 combines the performance of RAID 0 with redundancy of RAID 1.

RAID 5 level should minimize the fault tolerance.

You might be interested in
Explain online issue management​
Over [174]

Answer:

Online issue tracking system is a computer software solution for managing issues lists. The lists of issues are defined by the organization activity field.The best example of online issue tracking software is a customer support call center. ... A Bug Tracker is also one of possible online issue tracking software

Explanation:

the answer has the explanation needed.

7 0
2 years ago
To prevent replay attacks, authentication protocols create a number that will be used only once. The number is called a _____.
fgiga [73]

Authentication protocols are usually designed and configured to create a number that will be used only once, so as to prevent replay attacks in a computer network. Thus, this number is called a <u>nonce</u>.

Authentication work based on the principle of strategically matching an incoming request from an end user or electronic device to a set of uniquely defined credentials.

In an access control list (ACL), authentication and authorization is used to ensure an end user is truly who he or she claims to be, as well as confirming that an electronic device is valid through the process of verification.

In Cybersecurity, authentication protocols are usually designed and configured to create a nonce, which can be used only once, so as to prevent replay attacks in a computer network.

In conclusion, a nonce is used prevent replay attacks in a computer network because the number created by an authentication protocol can be used only once.

Read more: brainly.com/question/17307459

7 0
2 years ago
In which job role would a course in 3D modeling help with professional career prospects?please help
lana66690 [7]
Arcitechture, video game design, etc.
6 0
3 years ago
Read 2 more answers
You have booted your windows workstation into safe mode and enabled boot logging. To which log file is the boot logging informat
enyata [817]

Answer:

Ntbtlog.txt

Explanation:

Found in a book

Have a nice day! :)

5 0
2 years ago
What statement best describes operating systems?
neonofarm [45]

Answer:b

Explanation:

Course I got I right

8 0
3 years ago
Other questions:
  • Omar wants to add transitions to his presentation, so he clicks the Transitions tab. Which tasks can he now complete? Check all
    10·1 answer
  • GIVING BRAINLIEST What does output allow a computer to do? Display information Receive information Do complex math problems Do m
    6·2 answers
  • Software that instructs the computer how to run applications and controls the display/keyboard is know as the
    8·1 answer
  • What is <br> central vision
    12·2 answers
  • Vhat is output by the code below?<br><br> PLEASE HELP!! TIME LIMIT!!
    5·1 answer
  • When you perform an in-place upgrade to windows 8.1 from windows 7, what will be names of the “windows” folders in windows 7 and
    5·1 answer
  • Service that connects on-premises software appliances with cloud based storage is ______
    10·1 answer
  • AWT
    7·1 answer
  • 6. Find the volume of the figure. Round your answers to the nearest
    11·1 answer
  • Areas on which the development of the computer as a communication technology is based
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!