1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
salantis [7]
4 years ago
13

In ____, two or more disk drives become one large volume, so the computer views the disks as a single disk.

Computers and Technology
1 answer:
lawyer [7]4 years ago
7 0

Answer:

Raid 0

Explanation:

While managing the Hard disk drive if you want to set the two disks as one so that the large size can be seen and used by the user rather than using them separately, Raid 0 is where it is done.

It is usually done to combine two disks to use it as one.

You might be interested in
Chegg A full bootstrap program Select one: a. may be infected by viruses. b. is stored in ROM to ensure to avoid any infection f
harina [27]

Answer:

Option b = "is stored in ROM to ensure to avoid any infection from viruses. "

Explanation:

In order to to understand the fundamentals of an Operating system in computer one needs to know what the bootstrap program is.

The BOOTSTRAP PROGRAM is first program that will run when the computer is switched on, thus the program( the BOOTSTRAP PROGRAM) will be the program to open the OPERATING SYSTEM.

The device in laptops and personal computers known as ROM is an acronym that stands for Read-Only Memory and it is a storage medium. Because of ROM inability to get Virus it is used in the storage of Bootstrap program.

8 0
3 years ago
A(n) _____ access file is also known as a direct access file.
zloy xaker [14]
The answer to the question asked  above is <span>remote direct memory .

</span>A remote direct memory  access file is also known as a direct access file.

Hope my answer would be a great help for you.    If you have more questions feel free to ask here at Brainly.

5 0
3 years ago
When making a While Loop in Python, what button should I press?
olganol [36]
D. None of the above
8 0
4 years ago
A company asked you help mitigate the brute force attacks carried out against its users' Windows account passwords. You successf
prohojiy [21]

Answer:

The following options are true.

Explanation:

A corporation has requested the user to support minimize the brute force attacks on credentials of their Microsoft account holder's. They effectively eliminated the malware involved in those assaults and have to protect their credentials allocated towards their user profiles properly without restricting the usefulness of the program.

The following should be included in securing the user accounts are need credentials for the user profile, create logon constraints that failed as well as need powerful credentials.

7 0
3 years ago
Type the correct answer in the box. Spell all words correctly.
Molodets [167]

Answer:

Increase/decrease indent

Explanation:

8 0
2 years ago
Other questions:
  • Consider the following method intended to modify the parameter names by removing all instances of the String n.
    14·1 answer
  • How does a Computer chip work?
    6·2 answers
  • I have a samsung tab 2 10.1 and all of my apps stopped working. Can anybody help me?
    13·2 answers
  • What is achieved through xylography
    7·2 answers
  • *blank* is the unauthorized copying and selling or distributing of licensed video games.
    10·1 answer
  • What is the purpose of a diode in a cordless drill or power screwdriver?
    14·1 answer
  • 7x+ 2x = 14<br>want is (x)?​
    15·1 answer
  • Alcohol first impairs your ____?
    12·2 answers
  • HI brainly friends....<br> Pease thanks my answers I will also thank your answers
    11·1 answer
  • Electronic hacking and illegal trespassing for the purposes of acquiring a competitor’s proprietary information is considered.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!