answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oksanka [162]
2 years ago
13

"Describe how implementation of a RAID Level 2 system would be beneficial to a university payroll system. In your own words, des

cribe the disadvantages of such a system, if any, in that environment, and if appropriate, suggest an alter-native RAID system and explain your reasoning"
Computers and Technology
1 answer:
Darina [25.2K]2 years ago
4 0

Answer:

In RAID 2 Hamming Code ECC Each piece of the information word is kept in touch with an information plate drive . Every datum word has its Hamming Code ECC word recorded on ECC circles. On Read, the ECC code confirms the right information or revises the single plate blunders.  

Strike Level 2 is one of the two innately equal mapping and assurance strategies characterized in the Berkeley paper. It has not been broadly sent in the business to a great extent since it requires an extraordinary plate highlights. Since plate creation volumes decides the cost, it is increasingly practical to utilize standard circles for the RAID frameworks.  

Points of interest: "On the fly" it gives information blunder amendment. Amazingly high information move rates is possible.Higher the information move rate required,better the proportion of information circles to ECC plates. Moderately basic controller configuration contrasted with the other RAID levels 3,4 and 5.  

Impediments: Very high proportion of the ECC plates to information circles with littler word sizes - wasteful. Passage level expense are extremely high - and requires exceptionally high exchange rate prerequisite to legitimize. Exchange rate is equivalent to that of the single plate, best case scenario (with shaft synchronization). No business executions can't/not industrially suitable.

You might be interested in
I am doing keyboarding keyboarding is very boring and yeah
Bingel [31]

Answer:

yes I agree with you

Explanation:

I have been keyboarding for the past 7 hours.

7 0
2 years ago
Read 2 more answers
15 points. Please give an actual answer and not some random thing. this is not just free points. Correct answer will receive bra
trapecia [35]

Answer:

i think its b

Explanation:

i did the test and got it right

7 0
2 years ago
Read 2 more answers
Annabeth has been using a public cloud to store and access her documents. Which drawback of a public cloud should she be aware o
Flura [38]

<u><em>i just to the test on Plato and it said that A. accessibility is wrong  the correct answer is d  security #homeschoolrocks</em></u>

5 0
2 years ago
A team of students is collaborating on a program to obtain local weather data from a website, and predict weather-related school
love history [14]

Answer:

1. Using meaningful names for all variables and functions.

2. Use shorter blocks of codes wherever possible

Explanation:

Their code should be easy to read, this can be achieved by avoiding complex syntax, basically they should adopt the two methods stated in the answer

7 0
2 years ago
Your company just bought a new subsidiary based in Des Moines, Iowa. Although your local operation already uses IPv6 for local n
AlexFokin [52]

Answer:

Answer explained below

Explanation:

Following are the arguments that can be used to persuade our colleagues in Des Moines to switch there network to IPv6 or to enable dual use of IPv6 and IPv4 :

  • IPv6 provides an increased capacity of address space as resources are efficiently allocated to provide coverage to additional web addresses.
  • IPv6 provides efficient routing by conveniently aggregating the prefixes that have been assigned to IP networks.
  • IPv6 conserves bandwidth by enabling large data packets. it uses less bandwidth than IPv4 for the same data.
  • IPv6 is more secure than IPv4 due to multiple security layers built in the firewall. It also provides authentication layers and integrity of data.
  • IPv6 supports multicast rather than broadcast.
  • IPv6 has more efficient packet processing and error detection through checksum as compared to IPv4.
  • Address and network configuration is fully simplified and automatic in IPv6 but the same is not true for IPv4.
  • IPv4 supports 32 bit IP address whereas IPv6 supports 128 bit. Therefore more number of IP addresses availability makes IPv6 future oriented.
6 0
2 years ago
Other questions:
  • Which behavior could be acceptable at a classical concert as well as at a ball game? standing for an exceptional performance che
    9·2 answers
  • Which selections are possible for controlling the start time of audio playback? Check all that apply. Automatic Rewind when done
    10·1 answer
  • Mark T for True and F for False. No single person or government agency controls or owns the Internet. The W3C is responsible for
    5·1 answer
  • A half-life is the amount of time it takes for a substance or entity to fall to half its original value. Caffeine has a half-lif
    10·1 answer
  • A Class B network needs to be subnetted such that it supports 100 subnets and 100 hosts/ subnet. Which of the following answers
    8·1 answer
  • Describe the Say It, Cover It, Resay It method.
    14·2 answers
  • When does the narrator of "EPIC 2015" say the "road to 2015" began?
    10·2 answers
  • Use the AND function with appropriate arguments in cell H11 to determine if there is a force out at third base. There is a force
    14·1 answer
  • You have an on-premises network that contains several servers. You plan to migrate all the servers to Azure. You need to recomme
    14·1 answer
  • Consider the method total below: public static int total (int result, int a, int b) {     if (a == 0)    {      if (b == 0)     
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!