1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
maxonik [38]
3 years ago
10

Your source data is of 50 GB. You make a full backup. Next week, once again you perform a full backup, but this time 10 more GB

has been added to the source data. Second week, you perform another backup when the source backup has added 30 more GB. What is the total size of backups have you saved till date?
Computers and Technology
1 answer:
ahrayia [7]3 years ago
7 0

<u>The total size of backups:</u>

The source data is 50 GB. When its full backup is created, it takes 50 GB of space. Now, next week when 10 more GB of data has been added, the total source data are 60 GB. On creating another full backup, the size comes  out to be 60 GB as well and cumulative backup is 50 GB + 60 GB which equates to 110 GB.

In the second week, another 30 GB has been added to the source data, and on full backup creation, the size will be 60 GB + 30 GB which equates to 90 GB. So, the total size of backups saved till date will be 110 GB + 90 GB which equates to 200 GB.

You might be interested in
What do you understand by cloud computing? list the advantages of clould computing.​
LenaWriter [7]

Answer:

Cloud infrastructures support environmental proactivity, powering virtual services rather than physical products and hardware, and cutting down on paper waste, improving energy efficiency, and (given that it allows employees access from anywhere with an internet connection) reducing commuter-related emissions.

Explanation:

3 0
2 years ago
Read 2 more answers
your manager asks you to set up a secure network connection at a remote site to move over some backups which protocol would you
nlexa [21]

The protocol that should be used for establishing a secure network connection is SSH.  

The following information is to be considered:  

  • SFTP is secure also it is a protocol for file transferring that applied SSH.
  • IP, FTP, and DHCP should not be for safety purposes as they are not secure.
  • SSH is a secured connection for the remote sites so here the SSH protocol should be used.

Therefore we can conclude that The protocol that should be used for establishing a secure network connection is SSH.

4 0
1 year ago
What electronic appliances at your home / school can be controlled remotely? Name any 4
Paladinen [302]

Answer:

Hi how are you doing today Jasmine

8 0
2 years ago
When an event occurs, the agent logs details regarding the event. what is this event called?
Nimfa-mama [501]

If an event occurs, the agent logs details regarding the event. what is this event called GET.

The information in the agent log file is known to be the beginning of the log file, which is stated to show the agent's launch and handling of the services and configuration settings.

Keep in mind that the agent log also contains a history of the activities performed by the agent during runtime, along with any errors, and that it is utilised to investigate deployment issues.

As a result, if an event happens, the agent logs information about it. What is this GET event, exactly?

The agent monitoring services' startup and configuration settings are displayed at the log file's beginning. The sequence of agent runtime activity and any observed exceptions are also included in the agent log.

Learn more about agent logs:

brainly.com/question/28557574

#SPJ4

8 0
1 year ago
Which for loop syntax is correct?
Ugo [173]

Answer:

C

Explanation:

3 0
1 year ago
Other questions:
  • Double clicking a word selects the entire word?
    9·2 answers
  • Describe how one can change row and height
    6·1 answer
  • The company where Derek works has tasked him with setting up and securing a SOHO router. He wants to make sure the wireless netw
    7·1 answer
  • Find the Nearest Repeated Entries in an Array People do not like reading text in which a word is used multiple times in a short
    15·1 answer
  • Who made the first sandwich?
    5·2 answers
  • 3. Windows that are viewed as Web pages have<br> sections. **
    9·2 answers
  • WAFL (write-anywhere file layout) Select one: a. is a distributed file system b. is a file system dedicated to single user opera
    6·1 answer
  • PLS I NEED HELP Question 6<br> 1 pts<br> What is NOT a built-in function in python?
    5·1 answer
  • which gallery will allow a user to access a variety of preconfigured formatting styles for images that are added to a PowerPoint
    10·2 answers
  • What are the local, state, and national opportunities that may be available to those who participate in CTSOs?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!