1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Romashka [77]
3 years ago
14

Tim has an old server computer that his company uses as a backup. One of the hard drives has gone bad and needs to be replaced.

The cable that the hard drive uses is not one that Tim has ever seen before, so he posts a picture of it on the company collaboration board to get help in deciding what type of hard drive he will need to order.
Computers and Technology
1 answer:
algol [13]3 years ago
3 0

Answer: SCSI hard drive.

Explanation:

SCSI means Small Computer System Interface.

It is a fast bus with the capacity to connect a number of devices to a computer system simultaneously, those devices includes printer, scanners, tape drives, hard drives, CD-ROM devices. SCSI helps to connect devices and transfer data in between computer and ancillary devices.

SCSI was invented by the American National Standard Institutes (ANSI)

Common Components of SCSI includes;

• Target.

• Expander.

• Service delivery.

• Initiator.

• Sub system.

You might be interested in
1. What does the term 'in season' mean?
yKpoI14uk [10]
Available at the time of year.
8 0
3 years ago
Read 2 more answers
A network administrator is planning redundant devices and cabling in a switched network to support high availability. Which bene
a_sh-v [17]

Answer:

Redundant paths can be available without causing logical Layer 2 loops.

Explanation:

  • Spanning Tree Protocol is used to allow redundancy in the Layer 2 switched networks without creating cycles/circles also called loops.
  • These loops are called physical loops.
  • When two parts of the switched network are connected via two or more Layer 2 switches this result in a loop.
  • This affects the performance of the network as the result of broadcast packets flooding.
  • STP puts one port of the switch to forward mode and the rest of the ports within the same part of the network to the blocking mode to avoid broadcast packet flooding. STP puts all the ports that are allowing redundant paths to block mode and the one port that is left after this is placed in forward mode.
  • Spanning Tree Algorithm is used by STP to determine the optimal path  of switch to the network.
  • Bridge Protocol Data Units are used to share the information about the optimal path determined by the spanning tree algorithm with other switches.
  • This information helps STP to eliminate the redundant paths.
  • So this is how STP tracks all the links in the switched network and eliminates redundant loops by allowing only one active path to the destination while blocking all other paths.
7 0
3 years ago
Q4. What is one of the benefits of using a library in a program?
Grace [21]

Answer:

Simplifies creating a complex program

Explanation:

5 0
3 years ago
Redundancy can be implemented at a number of points throughout the security architecture, such as in ________. Group of answer c
vovikov84 [41]

Group of answer choices.

a. firewalls

b. access controls

c. proxy servers

d. All of the above

Answer:

d. All of the above

Explanation:

Cyber security can be defined as a preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.

Generally, redundancy to prevent unauthorized access can be implemented at a number of points throughout the security architecture, such as in firewalls, proxy servers and access controls.

A firewall is a network security protocol that monitors and controls inbound and outbound traffic based on set aside security rules.

Generally, a firewall is used to control access to a computer or network, as it creates a barrier between a computer or a network and the internet in order to protect against unauthorized access. It is a security system pre-installed on most computers to essentially inspect data being transmitted to or from a computer.

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device.

5 0
3 years ago
An array can store integers and doubles together.true or false
Anna [14]

Answer:

False

Explanation:

An array stores a sequence of values that are all of the same type

7 0
3 years ago
Other questions:
  • What is Software? Write the functions of Software?​
    11·1 answer
  • Design two subclasses of Employee…SalariedEmployee and HourlyEmployee. A salaried employee has an annual salary attribute. An ho
    12·1 answer
  • __________ is a collection of formatting options—such as a frame, a rounded shape, and a shadow—that changes a picture’s overall
    5·1 answer
  • What features are offered by most of the email programs with for receiving and sending messages?
    10·1 answer
  • A utility program that makes a copy of all files or selected files that are in the libraries is called ______
    6·1 answer
  • -(-13) P binary using signed. 2's complement representation
    11·1 answer
  • List five applications field of a computer?​
    8·1 answer
  • time to throw poggers xqc time to throw pogchamp time to throw pogchamp time to throw pogchamp time to throw pogchamp time to th
    5·2 answers
  • Cui documents must be reviewed to which procedures before destruction?
    13·1 answer
  • Lynn has created a quarterly sales report using a word processor. The document is confidential, and Lynn wants to secure it with
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!