1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
RSB [31]
3 years ago
5

Suppose you have data that should not be lost on disk failure, and the application is write-intensive. How would you store the d

ata?
Computers and Technology
1 answer:
natita [175]3 years ago
7 0

Answer:

use RAID 5

Explanation:

The best option in this scenario would be to use RAID 5, this would all but eliminate the risk of losing the data. As you would need at atleast 3 seperate drives which would all act as backups for each other. Therefore, in the unlikely case that one of the drives were to fail or data were to become corrupt/lost the other drives would have a backup of that data which ca be used.

You might be interested in
4.8 code practice question 2
Anna35 [415]

Answer:

Written in Python

for count in range(88, 42,-2):

    print(count,end=' ')

Explanation:

The programming language is not stated.

However, I used python to answer the question.

First, we need to loop from 88 to 44 with a difference of -2 in each term.

This is implemented as

for count in range(88, 42,-2):

Which means to start at 88 and ends at 42 - (-2) which is 44 with an increment of -2

Next, is to print the current iterating value;

This is implemented using print(count)

However, since all values are to be printed on a line, there's a need t modify the statement as: print(count,end=' ')

4 0
3 years ago
"What technology will examine the current state of a network device before allowing it can to connect to the network and force a
EleoNora [17]

Answer: A. Network Access Control (NAC)

Explanation:

The CORRECT answer is (A.) <em>Network Access Control (NAC)</em>. NAC refers to an method used in computer protection in which aspects such as antivirus, or host intrusion prevention among others are somehow consolidated in order to unify endpoint security. Such an approach allows the system authentication to enforce network security.

7 0
3 years ago
When you check to see how much RAM, or temporary storage you have available, you are checking your _____.
victus00 [196]

Answer: primary memory

5 0
3 years ago
Which of these is an example of a system?
lisov135 [29]

Answer:

force and a single particla of matter

4 0
3 years ago
Which of the following boxes should replace question mark
Rus_ich [418]

Answer:

There is nothing please put it then i will edit this answer.

Explanation:

6 0
3 years ago
Other questions:
  • HELLLLLP ill make you brainiest and ill give u a lot of points if you HELP ME Directions Part One.
    12·2 answers
  • Wendy is an attacker who recently gained access to a vulnerable web server running Microsoft Windows. What command can she use t
    9·1 answer
  • List of programming languages and their typing
    5·2 answers
  • _____ software can help a company manage security, enforce corporate strategies, and control downloads and content streaming fro
    11·1 answer
  • What is an enterprise system
    14·2 answers
  • Tom wants a way to automatically create ads and simplify campaign management, using his resources and Google's machine learning
    12·1 answer
  • A network address is 131.247.160.0/19. The 19 implies that
    5·1 answer
  • Using a personal computer to produce high quality printed documents.
    10·1 answer
  • Why do designers of smartphones hide computer processing details from
    14·2 answers
  • PLEASE ANSWER AND HURRY I'LL MARK YOU BRAINLIEST!!<br><br><br>​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!