1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Aleksandr [31]
3 years ago
7

A complex system used in IT is a redundant array of independent disks (RAID), which is commonly used in _____ for file servers.

Computers and Technology
1 answer:
devlian [24]3 years ago
7 0

Answer:

A complex system used in IT is a redundant array of independent disks (RAID), which is commonly used in high-volume data storage for file servers.

You might be interested in
Shovels and Shingles is a small construction company consisting of 12 computers that have Internet access. The company's biggest
Y_Kistochka [10]

Answer:

The Encryption solution that best prevents a competitor from receiving confidential information is the SSL(secure Socket Layer) Or TLS(Transport Layer Security).

Explanation:

Solution:

From my own perspective the encryption solution that i will use that prevents s a competitor from receiving confidential information and justify the recommendation is the SSL(secure Socket Layer) Or TLS(Transport Layer Security).

This is because in this case we have to share data confidentially (information need to be hidden from Unauthorized  security access. also these provides the Transport Layer security that we needed in above example above.

The purpose of these protocol is to provide server and client authentication, Data confidentiality,and Data integrity (protected from unauthorized change). Application Layer client/server program such as HTTP that uses the service of TCP can encapsulate their data in SSL Packets.

SSL (Secure Socket Layer): is defined as the normal technology for protecting an internet connection secure and defend any sensitive data that is being sent between two systems, and not allowing criminals from reading and changing any information sent, including potential personal details.

TLS (Transport Layer security): It is a procedure that allows  data integrity  and privacy over Internet communications.

3 0
3 years ago
Ebay employs the _____ auction mechanism.
myrzilka [38]

Answer:

A. Foward

Explanation:

4 0
3 years ago
Read 2 more answers
The basic input/output system (bios is stored on a ________ chip.
Burka [1]
Read Only Memory (ROM)

6 0
4 years ago
What is a good practice to remember when adding transitions to a presentation?
storchak [24]

Answer:

A. Use one type of transition throughout.

Explanation:

Edge 2021.

7 0
3 years ago
Read 2 more answers
Today encoding scheme has taken over ascII by what
harkovskaia [24]
I do not know, i really hope you dont fail!!!!!!!!!
7 0
4 years ago
Other questions:
  • Who is demonstrating entrepreneurship?
    7·1 answer
  • There are two kinds of type that you can add to a document in Photoshop. You can add
    13·1 answer
  • In what software development model does activity progress in a lock-step sequential process where no phase begins until the prev
    7·1 answer
  • #Write a function called alter_list. alter_list should have#two parameters: a list of strings and a list of integers.##The list
    11·1 answer
  • You are an online training company and stream a lot of training videos from your
    12·1 answer
  • The process of converting an input file (stream of characters) into an understandable format is called syntax analysis.
    7·1 answer
  • Micheal is the project manager in a company. He wants his organization to use technology for higher revenue and productivity. Wh
    13·1 answer
  • Answers for this question​
    11·1 answer
  • 1. It is one way to attain one's holistic health condition.​
    9·1 answer
  • A thesis statement is the last sentence of the conclusion. It summarizes the entire paper.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!