1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
givi [52]
3 years ago
6

WAFL (write-anywhere file layout) Select one: a. is a distributed file system b. is a file system dedicated to single user opera

ting systems c. can provide files via NFS, but not via CIFS d. cannot provide files via NFS
Computers and Technology
1 answer:
Sophie [7]3 years ago
5 0

Answer:

A. Is a distributed file system

Explanation:

The WAFL is a distributed file system. It is blocked based and it has to make use of inodes to describe it's files. This is a proprietary file system, ystem layout. The WAFL makes use of files for the storage of meta-data which gives a description of the layout of the file system.

The WAFL is named the Write Anywhere File Layout because all data can be written in any part on the disk.

You might be interested in
The fractional_part function divides the numerator by the denominator, and returns just the fractional part.
Alinara [238K]

Answer:

a. True

Explanation:

The fractional_part function divides the numerator by the denominator, and in turn returns just the fractional part, which is usually a number between 0 and 1.

When the denominator is 0, it produces an error result, instead of attempting the division, the function can be programmed to return "Math Error: cannot be divided by zero", as shown in the following Python code;

def fractional_part(numerator, denominator):

if denominator == 0:

 return "Math Error: cannot be divided by zero"

return (numerator % denominator)/denominator

6 0
3 years ago
Why should a linked list node be separate from the element stored on the list?
Daniel [21]

Explanation:

A linked list node should be separated from the element stored in the list because it is not reasonable to assume that the each object that we may want insert in the collection can be architectured to cooperate with the collection implementation.

Also the details of the implementation are to kept distinct from the user of that collection , including the elements that the user wants to add to his collection.

8 0
3 years ago
Explaing why the findings are different between a general purpose search engine ( google) and a meta search engine ( ask jeeves)
Softa [21]
A lot of people use google and on all search engines the sites are ordered in what people click on the most. Popularest website that fits in with the key words and different people used different websites and different search engines
6 0
3 years ago
PLEASE HELP!!!!!! ASAP
NNADVOKAT [17]

Answer:

use a wizard or use a design view

Explanation:

i took the test

4 0
3 years ago
Read 2 more answers
If an ips identifies an attack, it can ________.
Gennadij [26K]

Answer:

a. drop the attack packet(s)

Explanation:

An IPS not only detects and alerts system administrators but it also stops attacks. It is built to consistently monitor a network, report malicious incidents and take preventative actions. So, how does an IPS work exactly? An IPS does a deep packet inspection and either blocks the IP of whoever sent the malicious packet or removes the malicious packet's content and repackages its payloads. Thus, this means that the malicious packet is completely dropped by stripping off of its header information and any infected items in the packet.

5 0
3 years ago
Other questions:
  • Prompt the user for an automobile service. Each service type is composed of two strings. Output the user's input. (1 pt) Ex: Ent
    9·1 answer
  • HELP I am in the computer lab right now and I need legit reasons why i should work on a laptop instead of a computer. I dont lik
    5·2 answers
  • What standard linux utility is used to install and configure software on centos operating systems?
    8·1 answer
  • Which of the following refers to a combination of hardware and software that ensures only authorized individuals gain entry into
    11·1 answer
  • How to change font size and style and add a table when creating a webpage?
    6·1 answer
  • In an IPv.4 addressing scheme the router works at layer 3 on which addressing layer?
    14·1 answer
  • Define the missing method. use "this" to distinguish the local member from the parameter name.
    11·2 answers
  • Since we know that this particular instance of the AppMaker implements a customer-facing store that processes financial transact
    6·1 answer
  • I need help, thank you
    7·1 answer
  • Ann, a user, reports that her pc is running slower than usual. which tool would best allow you to identify the bottleneck?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!