answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
allsm [11]
2 years ago
12

Your company has decided it wants to build a file server and store data that can be shared by coworkers. You were asked to resea

rch the type of storage that should be used on the server. Your boss said that he would like to implement RAID on the computer and wants your opinion on the best RAID type for the company. He informed you that the company will need at least 500 TB of storage. He also wants to make sure that if a drive fails, the data can be recovered. In addition, he told you to keep the cost down as much as possible. What will you recommend to your boss? O a. RAIDO O b. RAID 1 TO C. RAID 5 Tod. RAID 10 Today when Paul turned on his computer, it did not boot. Instead, it tried to boot to the network using PXE. After Paul rebooted the computer, it tried to boot the network again. Because his computer was not booting properly, Paul went into the UEFI to change the boot order and discovered that the boot order was set to boot to the hard drive first. While in the UEFI, he discovered that his hard drive was not recognized by the UEFI. What might be the problems with Paul's computer? (Select all that apply.) a. CMOS battery has failed. b. UEFI setting are corrupt. C. SATA cable for the HDD is bad. d. Hard drive has failed. e. RAID controller has stopped functioning.
Computers and Technology
1 answer:
Yuri [45]2 years ago
3 0
Tylenuuutiunumiiute joy. Until ouuu I gotta y us huh iuoihtytutb to the ng ru
You might be interested in
Jane's organization recently experienced a security incident that occurred when malware set to trigger on the chief executive of
inn [45]

Answer:

The answer is viruses

Explanation:

Because it is a harmful software hidden inside another  and usually performs a harmful action, such as destroying data.

4 0
2 years ago
What are the arguments for writing efficient programs even though hardware is relatively inexpensive?
Ainat [17]

Answer: Even though the hardware is inexpensive the writing of program is not efficient through this method as proper development of program is necessary for the clear execution due to factors like:-

  • The facility of writing program even the cost of hardware is less but it is not a free facility.
  • It also has a slower processing for the execution of the program
  • The construction of the efficient program is necessary for the compilation and execution of it rather than poorly constructed program is worthless and inefficient in working.

7 0
2 years ago
c++ You are given an array A representing heights of students. All the students are asked to stand in rows. The students arrive
Lilit [14]

The below code will help you to solve the given problem and you can execute and cross verify with sample input and output.

#include<stdio.h>

#include<string.h>

 int* uniqueValue(int input1,int input2[])

 {

   int left, current;

   static int arr[4] = {0};

   int i      = 0;

     for(i=0;i<input1;i++)

      {

         current = input2[i];

         left    = 0;

         if(current > 0)

         left    = arr[(current-1)];

      if(left == 0 && arr[current] == 0)

       {

       arr[current] = input1-current;

       }

       else

   {

       for(int j=(i+1);j<input1;j++)

       {

           if(arr[j] == 0)

           {

               left = arr[(j-1)];

               arr[j] = left - 1;

           }

       }

   }

}

return arr;

}

4 0
2 years ago
Write a class named Employee that has private data members for an employee's name, ID_number, salary, and email_address. It shou
mario62 [17]

Solution :

class Employee:

   #Define the

   #constructor.

   def __$\text{init}$__($\text{self, nam}e$,  ID_number, $\text{salary}$, email):

       #Set the values of

       #the data members of the class.

       $\text{self.nam}e$ = name

       $\text{self.ID}$_number = ID_number

       $\text{self.salary}$ = salary

       self.email_address = email

#Define the function

#make_employee_dict().

def make_employee_dict(list_names, list_ID, list_salary, list_email):

   #Define the dictionary

   #to store the results.

   employee_dict = {}

   #Store the length

   #of the list.

   list_len = len(list_ID)

   #Run the loop to

   #traverse the list.

   for i in range(list_len):

       #Access the lists to

       #get the required details.

       name = list_names[i]

       id_num = list_ID[i]

       salary = list_salary[i]

       email = list_email[i]

       #Define the employee

       #object and store

       #it in the dictionary.

       employee_dict[id_num] = Employee(name, id_num, salary, email)

   #Return the

   #resultant dictionary.

   return employee_dict

6 0
1 year ago
A bunch of computer scientists take over an island and start their own country. They want the license plates to use binary numbe
Thepotemich [5.8K]

Answer:

  • <em>Their country can support </em><u><em>   128   </em></u><em>unique license plates</em>

Explanation:

Since there is space for<em> 7 digits </em>on each <em>license plate</em>, the first plate starts at <em>0000000 </em>(seven 0).

<em>Binary numbers</em> contain only the digits 0 and 1.

Thus, there are only two possibilities for each digit.

Using the multiplication counting principle, the number of total different binary numbers, with seven digits is 2 multiplied seven times:

  • 2 × 2 × 2 × 2 × 2 × 2 × 2 = 2⁷ = 128 ← answer
5 0
2 years ago
Other questions:
  • In a spreadsheet, the instructions for carrying out calculations are called __________. recalculations formulas templates macros
    13·1 answer
  • The alternative to encapsulating security protocol (esp) is _________.
    10·1 answer
  • The most direct way for Jonathan to gain on-the-job experience and earn money while attending school is to apply for:
    5·2 answers
  • In mathematics, the notation n! represents the factorial of the nonnegative integer n. The factorial of n is the product of all
    7·1 answer
  • When trying to improve performance of a slow system, you notice in Task Manager that the superfetch service is using a high perc
    11·1 answer
  • Software as a Service (SaaS) refers to the use of computing resources, including software and data storage, on the Internet rath
    13·1 answer
  • You have configured your firewall to authenticate a group of 100 users who are in your company. You set up the database of users
    14·1 answer
  • Write a script that prints the multiples of 7 between 0 and 100. Print one multiple per line and avoid printing any numbers that
    14·1 answer
  • You are a security consultant and have been hired to evaluate an organization's physical security practices. All employees must
    6·1 answer
  • A homeowner uses a smart assistant to set the house alarm, get packages delivery updates, and set time on the outdoor lights. Wh
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!