1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Reil [10]
3 years ago
15

You're installing two new hard drives into your network attached storage device. Your director asks that they be put into a RAID

solution that offers redundancy over performance. Which would you use?
a. RAID 0
b. RAID 1
c. RAID 5
d. RAID 6
e. RAID 10
Computers and Technology
1 answer:
bekas [8.4K]3 years ago
8 0

Answer:

d. RAID 6

Explanation:

RAID is a data storage technology that combines multiple physical disk drive components into a single logical unit. The functions of RAID is to provide performance and redundancy.

RAID 0 provides data stripping but it does not offer data stripping.

RAID 1 increases performance to about 2x but it limits the disk capacity to about 50%

RAID 5 provides redundancy and increased perfomance but it is limited to small disk drive.

RAID 6 also provides redundancy but it slows performance

RAID 10 increases performance and data protection.

RAID 6 is the best drive that offers redundancy over performance.

You might be interested in
Please check my answer! (Java)
marin [14]

Yep. 4 rows of 5 stars each.

8 0
3 years ago
16. A/An __________ is operated on the principle that the dying have special needs and wants that hospital personnel are too bus
marta [7]

Answer:

Hospices

Explanation:

A/An <u>Hospices</u> is operated on the principle that the dying have special needs and wants that hospital personnel are too busy to handle.

5 0
2 years ago
Read 2 more answers
The Security Development Life Cycle (SDLC) is a general methodology for the design and implementation of an information system.
navik [9.2K]

Answer:

False

Explanation:

The Security Development Life Cycle (SDLC), is a software development which involves traditional approach towards its design such as, waterfall model, Agile, etc.

It can either be referred to as a generic secure development life cycle or a specific one, such as the Microsoft SDL or the Cisco SDL.

Its phases includes,

A1 - Security Assessment

A2 - Architecture

A3 - Design and Development 1

A4 - Design and Development 2

A5 - Ship

PRSA - Post Release

Each phase talks about how a secured software is developed.

The Security Development Life Cycle (SDLC) is a general methodology for the design and implementation of an information system. This statement is false because by definition and attributes Security Development Life Cycle is a traditional approach towards software development and not a general method.

6 0
3 years ago
Each JavaScript command line ends with a(n) ____ to separate it from the next command line in the program.
kykrilka [37]
The answer is :
semicolon (;)
8 0
2 years ago
What will be the output of “AAAAMMMMMHHHVV” using a file compression technique?
jeka94

Answer:

it would be amhv i think i hope it answered u'er question

Explanation:

8 0
3 years ago
Other questions:
  • What is the use of word art?
    10·1 answer
  • If you need to show slides on a wide-screen monitor, you might change their size to: Select one: a. Onscreen Show (16:9) b. Onsc
    11·1 answer
  • What is the post condition of an expression or variable
    11·1 answer
  • Jennifer frequently uses a few programs on her laptop. Where will she find all the frequently used program icons in her computer
    13·1 answer
  • A network administrator wants to logically separate web servers on the network. Which of the following network device will need
    10·2 answers
  • How does leadership play a role in IT management? How does leadership need to be aligned to the company’s goals for IT managemen
    9·1 answer
  • Which composer below was not part of the classical period? <br> A. Beethoven B. Bach<br> C. Mozart
    6·1 answer
  • Select the correct answer from the drop-down menu.
    15·2 answers
  • How do you change your name on your brainly profile
    14·2 answers
  • What are the different Stape of data processing cycle?​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!