1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Romashka [77]
3 years ago
14

Tim has an old server computer that his company uses as a backup. One of the hard drives has gone bad and needs to be replaced.

The cable that the hard drive uses is not one that Tim has ever seen before, so he posts a picture of it on the company collaboration board to get help in deciding what type of hard drive he will need to order.
Computers and Technology
1 answer:
algol [13]3 years ago
3 0

Answer: SCSI hard drive.

Explanation:

SCSI means Small Computer System Interface.

It is a fast bus with the capacity to connect a number of devices to a computer system simultaneously, those devices includes printer, scanners, tape drives, hard drives, CD-ROM devices. SCSI helps to connect devices and transfer data in between computer and ancillary devices.

SCSI was invented by the American National Standard Institutes (ANSI)

Common Components of SCSI includes;

• Target.

• Expander.

• Service delivery.

• Initiator.

• Sub system.

You might be interested in
When we look for errors inside of our code on our own or with a partner , what is that called?
lutik1710 [3]
It’s called that he is cheating
6 0
2 years ago
Read 2 more answers
failed logins or instances of denial of access to restricted files may be indicators of compromise. suggest where records of suc
algol [13]

As forensic evidence of suspected intrusions on a host system or network, indicators of compromise (IOCs) are used.

<h3>What is indicators?</h3>

System administrators and information security (InfoSec) experts can identify malicious activity such as intrusion attempts using these artifacts. IOCs are used by security researchers to more thoroughly examine the methods and behaviour of a certain malware.

IOCs also offer useful threat intelligence that can be disseminated around the community to help organizations develop their incident response and remediation plans.

Some of these artifacts can be seen on the system's event logs, time-stamped entries, apps, and services. Various tools that monitor IOCs are also used by infosec experts and IT/system administrators to help mitigate, if not stop, breaches or assaults.

Therefore, As forensic evidence of suspected intrusions on a host system or network, indicators of compromise (IOCs) are used.

To learn more about indicators, refer to the link:

brainly.com/question/28093573

#SPJ1

4 0
1 year ago
BRAINLIEST BRAINLIEST BRAINLIEST BRAINLIEST BRAINLIEST BRAINLIEST BRAINLIEST BRAINLIEST BRAINLIEST BRAINLIEST BRAINLIEST BRAINLI
olganol [36]

Answer:

I think the answer is network

hope this helps

have a good day :)

Explanation:

7 0
3 years ago
Read 2 more answers
In a multiprogramming and time-sharing environment, several users share the system simultaneously. This situation can result in
kap26 [50]

<u>Explanation:</u>

a.

  • One user can read the private data of another user-privacy.
  • One user can prevent another user from getting anything done-denial of service.

Indeed, in any multiprogramming and time-sharing environment since the computers of users are networked together, then it is very possible for a bad actor to read the private data of another user, or even prevent another user from accessing their computer by employing a denial of service attack on the network. In other words, the network would be unable to handle the request of users since has been overloaded by another user.

b. a. Yes - if we can ensure that the operating system prevents any sharing of data between users, either for reading or writing and fairly shares the computer, then we can achieve the same level of security.

7 0
3 years ago
If an interest inventory reveals that you are highly interested in solitary, introverted work, what might be the best type of ca
Deffense [45]
A writer maybe, because you can work by yourself, even at home.
6 0
3 years ago
Read 2 more answers
Other questions:
  • Which web browser below is natively available on a major operating system? ie 10 opera firefox chrome?
    12·1 answer
  • Jeff wants to print quickly so he presses the Ctrl and the P. Jeff used a _____. macro invoice template shortcut
    15·1 answer
  • A layer of control in each communicating device that provides functions such as flow control, error detection, and error control
    13·1 answer
  • This loop is a good choice when you know how many times you want the loop to iterate in advance of entering the loop.
    14·2 answers
  • Which of the following is not a metamorphic agent?
    8·2 answers
  • Are the buying and selling of stocks centralized activities? Why or why not?
    10·2 answers
  • (9.10 Code Practice: Question 1)
    12·1 answer
  • PLEASE HELP!! WILL MARK BRAINLIEST!!
    15·1 answer
  • SOMEONE PLEASE HELP ME OUT WITH THIS PLEASE
    13·1 answer
  • What option in the zone aging/scavenging properties dialog box will prevent dns record time stamps from being updated too often?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!