Answer:
hybrid cloud
Explanation:
hybrid cloud is a cloud environment that employs both public and private cloud services.
Hybrid cloud gives businesses more flexibility and greater efficiency in coverage due to its ability to move files between public and private cloud.
Answer:
The answer is below
Explanation:
a)
If the blocks of a file are not put together, that is for nonadjacent block of files to each other, the time (t) taken to read a 100 block file is:
t = (average seek + rotational latency + transfer time) * 100 block
Average seek = 5 msec, rotational latency = 10 msec and transfer time = 20 microsec = 0.02 msec
t = (5 + 10 + 0.02) * 100 = 1502 msec
b)
If the blocks of a file are put together, that is for adjacent block of files to each other, the time (t) taken to read a 100 block file is:
t = (seek time * mean interblock distance + rotational latency + transfer time) * 100 block
seek time = 100 microsec = 0.1 msec, rotational latency = 10 msec and transfer time = 20 microsec = 0.02 msec, mean interblock distance = 2 cylinders
t = (0.1*2 + 10 + 0.02) * 100 = 1022 msec
Answer:
gpresult
Explanation:
Group Policy provides the system administrator with settings that would be necessary to manage the different user accounts available in an organization. It also controls their work environment centrally by configuring the user Operating System (OS), applications and user accounts.
Group policy settings or configurations are referred to as Group Policy Objects (GPOs). These objects can be linked to organizational units (OUs), domains or sites.
There are various group policy commands such as;
- rstrui (System Restore tool will run),
- runas (using different permission to run a tool or program),
- tasklist (currently running programs are shown
- gpupdate (Group policies are refreshed)
- gpresult (group policy configurations are displayed for verification)
gpresult command can be used to verify the group policy configurations for adjustment or optimization. The technician can start troubleshooting from viewing the active settings, then running the rstrui to start the System Restore utility to restore the computer to an earlier date
Answer:
The answer is antivirus solution implementation and planning.
Explanation:
Enterprises use antivirus implementation to protect from threats of different types such as Trojan horses, rootkits, ransomware, spyware, and botnets. Withing organizations, this implementation requires a proper planning and implementation plan that helps companies to protect the enterprise system. So, antivirus implementation and planning is the answer.