A ______ system spreads data across several disks and stores parity information that can be used to reconstruct data if a disk drive fails. Select the two correct answers, then click Done.
A disc stripping system spreads data across several disks and stores parity information that can be used to reconstruct data if a disk drive fails.
What is a stripping system?Disk striping has been around for a long time. To improve disk performance, data can be "striped" across multiple disks.
Instead of using a single disk read/write head to write data, multiple heads from multiple disk drives can be used to improve performance.
Thus, the correct option is a disc stripping system.
Learn more about stripping system
https://brainly.com/question/14924341
#SPJ1
14 AP Computer Science Principles
3. Consider the following code segment.
first 100
second 200
temp first
second + temp
first second
What are the values of first and second as a result of executing the code segment?
(A) first = 100, second
= 100
(B) first = 100, second = 200
(C) first = 200, second
=
100
(D) first = 200, second =
200
The values of first and second as a result of executing the code segment are (c) first = 200 and second = 100
How to determine the value of the variables?From the code segments, we have the following assignment operations
first = 100 and second = 200
The variable first is assigned to variable temp.
So, we have:
temp = first = 100
The variable temp is assigned to variable second
So, we have:
second = temp = 100
Lastly, the variable second is assigned to variable first
first = 200
Hence, the values of first and second as a result of executing the code segment are (c) first = 200 and second = 100
Read more about code segments at:
https://brainly.com/question/14284157
#SPJ1
_____ collection and dissemination involves satellites, manned aircraft, unmanned aerial vehicles, imagery analysis and assessment, non-classified internet protocol router network (NIPRnet).
Signal intelligence is intelligence gathered by the interception of signals. The blank space will be filled with "SIGINT".
What is SIGINT?SIGINT is also known as Signal intelligence is intelligence gathered by the interception of signals, whether they be human conversations or technological signals that are not directly utilised in communication. It is a subpart of Intelligence gathering management.
SIGINT collection and dissemination involves satellites, manned aircraft, unmanned aerial vehicles, imagery analysis and assessment, and a non-classified internet protocol router network (NIPRnet).
Learn more about SIGINT:
https://brainly.com/question/15710402
#SPJ1
Letters, memos, and computer printouts of numerical information are examples of formal reports.Group startsTrue or False
Letters, memos, and computer printouts of numerical information are examples of formal reports is a false statement.
What are formal reports?Formal reports are known to be a type of report that has elements such as a title page, a transmittal, a table of contents, etc. An example are:
Inspection Report.Safety and Health Report.Conclusively, Letters, memos, and computer printouts of numerical information are examples of formal reports is a false statement because they are all examples of informal reports.
Learn more about formal reports from
https://brainly.com/question/11599232
List a future Internet and a future network technology that interests you. Explain what it is and how it works. Comment on another's post. You must post before you can see other's posts. Internet tech
100 points asap and brainly if right
Type the correct answer in the box. Spell all words correctly.
What term describes the site-to-site VPN used by Kevin’s company?
Kevin’s company has offices located in different states. All the offices are connected to the head office through a site-to-site VPN connection. Kevin’s company is using a(n) (blank) VPN.
Answer:
extranet
Explanation:
VPN stands for virtual private networkVPN is used by companies for privacyIt also helps in keeping important data safe from hackers________ generally processes the largest quantities of data. Group of answer choices Operational databases Transaction processing Big data Data marts
transaction processing
generally processes the largest quantities of data. Big data Data marts Operational databases Transaction processing QUESTION 2 According to your text, NoSQL stands for: Numeric Only SQL Not Only SQL Numbered SQL No SQL QUESTION 3 Big data includes: Targe volumes of entity relationship diagrams (ERD) with many different data types that are processed at very high speeds. large volumes of data with many different data types that are processed at very high speeds.
You are a game designer and are going to give a presentation to a group of high school students to try to get them interested in a career in the video game industry. You decide you will use a PowerPoint presentation to guide you through your discussion. Your PowerPoint presentation must include:
an explanation of what a video game is;
some history of video games and the video game industry;
why a career in the video game industry is a good choice; and
some examples of what students could do to begin to prepare themselves for an application to college and a career in gaming
Answer:
Pick a concept. Generate a few game concepts to see what kind of game you want to make. ...
Gather information. Game creation involves extensive research. ...
Start building. ...
Refine your concept. ...
Test your game. ...
Market the finished product.
Explanation:
A video game immerses players in a virtual environment and is an interactive form of electronic entertainment. It involves story-telling, user experience, aesthetics, sound design, and gaming mechanics.
The earliest arcade machines and home consoles like the Atari may be found in the history of video games. As technology developed over time, 3D graphics, virtual reality, and augmented reality experiences were introduced.
For those who are passionate, a career in the video game industry offers fascinating options. The sector is renowned for its quick expansion, with new platforms and technologies appearing on a regular basis.
Technical expertise and the creation of a solid portfolio are prerequisites for pursuing a career in the video game industry.
For the creation of games, learning programming languages like C++, Java, or Python is useful. Additionally, learning 3D modelling, animation, and game design fundamentals can be helpful.
For people who love games and creativity, a career in the video game industry provides intriguing opportunities.
Thus, you can contribute to the creation of engaging and innovative games that engage gamers all over the world if you have the necessary abilities, portfolio, and commitment.
For more details regarding gamers, visit:
https://brainly.com/question/25829996
#SPJ5
What's the best way that Safiya can improve the machine learning algorithm's ability to detect all pedestrians
The best way that Safiya can improve the machine learning algorithm's ability to detect all pedestrians is; As detailed below.
What is a machine algorithm?Machine learning algorithms are mathematical model mapping methods used to learn or uncover underlying patterns embedded in the data.
Now, Machine learning comprises a group of computational algorithms that can carry out pattern recognition, classification, and prediction on data by learning from existing data set.
In this question, the best way that Safiya can improve the machine learning algorithm's ability to detect all pedestrians is She can add videos of people using wheelchairs and strollers into the training data set (perhaps crowd-sourcing them if there are none already available).
Read more about Machine Learning Algorithm at; https://brainly.com/question/21928505
A network configuration in which connected devices are located in close proximity is called a _____________
A technician is installing RG6 cable and asks you to retrieve a connector from the parts drawer. What type of connector do you need
The type of connector, which is needed when a technician is installing RG6 cable and asks to retrieve a connector from the parts drawer, is F-connector.
What is F-connector?The F-connector is a type of RF connector which is used to connect the Video equipments to the antennas and setup box.
A technician is installing RG6 cable.
The RG6 cable is a coax cable.This cable is used in satellite signal transmission, generally for TV and setup box.Now the technician is ask to retrieve a connector from the parts drawer. Here, we use F type connector for this RG6 cable.
Thus, the type of connector, which is needed when a technician is installing RG6 cable and asks to retrieve a connector from the parts drawer, is F-connector.
Learn more about the connector cable here
https://brainly.com/question/9082842
#SPJ1
whats happens when you add the numbers 1 and 1 together (1+1)
11
32
2
9
Answer:
2
Explanation:
The mathematical answer would be 2. To get 11, one would simply put the 1's next to each other but there is an addition symbol. 32 is an irrational number to think of for an answer because there are no other numbers to add or multiply with the 1's to achieve 32. 9 is also irrational for the same reason.
What is RAM?
Contained on a chip on the motherboard that does the computing to execute commands
Circuit boards that attach to the motherboard so you can connect components outside the case, such as a mouse, keyboard, speakers, or microphone
Random access memory, which are chips where information is stored temporarily while processing is taking place
Answer:
Random-access memory.Explanation:
Random-access memory is a form of computer memory that can be read and changed in any order, typically used to store working data and machine code.What are the possible values you can store in the C# "bool" data type?
a
A or B
b
true or false
c
more or less
d
1 or 2
Answer:
d are the values that can be stored in the c#"bool"data type
Assume that the Vehicle class contains a virtual method named CalculateMaxSpeed(). Assume that both the MotorVehicle and Automobile classes override this method. Which class defines the method that is called when the second statement in the code that follows is executed
The class that defines the method that is called when the second statement in the code that follows is executed is: Automobile.
Automobile classIn a situation where the statement " Automobile car = new Automobile ( )" is executed. The process called instantiation has taken place.
When instantiation occur this indicate or means that object of the automobile class has been created.
An object can tend to be created based on the definition of the class and the created object can be used to perform or carryout tasks.
Therefore the class that defines the method is: Automobile.
Learn more about automobile class here:https://brainly.com/question/15697747
#SPJ1
GlobalMan Tech purchased raw material from NewBizTr Co. When the sales team at NewBizTr Co checked the system, there was no payment
detall in the system, though the order-delivery details were present. Also, it seemed that someone had tampered with the details of the previous
order. Which Important data-management features were compromised?
The Important data-management features were compromised is maintaining Data Security.
What does data management made up of?Data management is known to be a kind of administrative method that is often used in acquiring, validating, storing, etc., of data for system users.
Note that Maintaining Data Security is one key feature of data-management and it is the one that has been tempered with.
Learn more about data-management features from
https://brainly.com/question/24027204
#SPJ1
Answer:
1 security 2 accuracy
Explanation:
Why shouldn’t you add taxes to schools to keep technology in classrooms?
Answer:
Technology is becoming more expensive and more unhealthy over time, so adding taxes is adding extra funds that don't need to be added. Studies also show that technology in classrooms can cause students' social skills to deficit.
Michael is doing research to find information about a pet fish. He finds a website that says fish do not make good pets. Michael should not use this information because it is
a belief
a fact
an opinion
informative
Answer:
It is a opinion not a fact so it should not be used
Explanation:
Which client-server application allows an administrator to control a remote computer, but does not encrypt or secure the communication between client and server
Answer:
✓ A. Telnet
Explanation:
6.Which client-server application allows an administrator to control a remote computer, but does not encrypt or secure the communication between client and server?
A. Telnet B. Remote Desktop C. FTP D. SSH
✓ A. Telnet
To make slides in a powerpoint online application presentation have the same transition effect, select __________ on the transition tab. apply to all existing fade none
Answer: Animations
Explanation:
Transitions, such as fade, can be applied to all using the command Ctrl+A.
Transitions are found under the animations Tab. Sorry about the bots.
Hope This Helped!
Answer:
Apply to all
Explanation:
_____ means collecting vast amounts of data from a host of websites.
A. Relating
B. Visualizing
C. Querying
D. Web scraping
Answer:
D
Explanation:
D. Web Scraping is the answer
Size of a request header field exceeds server limit.
Think about the activities that you do online. What are three ways you can use a web browser to make your experience easier and more enjoyable?
Answer:
Copy and paste
Keywords
Bookmark tabs
Select the correct answer.
Identify the correct CSS syntax to link an external style sheet.
B.
C.
D.
newstyle.css
Answer:
D
Explanation:
It is D
Select the correct answer.
Identify the correct CSS syntax to link an external style sheet.
If the value of score1 is 350 and the value of score2 is 210, what will be the value of result after the code segment is executed
The value of result of the code segment is executed is known to be 4.
Why is the value of the code segment so?When the result of is not executed because the condition is said to be false and also when there is a false condition is, the else statement will be said to be true
Therefore, result = result + 2; -> result is brought up by 2 to bring about 4 and as such, the value of result of the code segment is executed is known to be 4.
Learn more about scores from
https://brainly.com/question/19492935
#SJ1
Answer:
its 5
Explanation:
I put 4 and got it wrong and checked the test
Lin is creating a template for the configuration of Windows servers in her organization. The configuration includes the basic security settings that should apply to all systems. What type of document should she create
The type of document should she create is baseline document. Check more about the term Baseline below.
What is a Baseline document?A Baseline document is known to be a kind official or legalized document that has passed through some measures of start approval and was used for its purpose.
Note that for Lin to be able to make the template for the configuration of Windows servers, the type of document that she can create is baseline document.
Learn more about Windows servers from
https://brainly.com/question/14526761
#SJ1
in china speaking your mind on the internet can cause what problems
It is found that in china speaking your mind on the internet might get you arrested.
How does internet affect China?In China, mobile internet access is one that restrict the freedom of speech.
Note that one cannot speak freely or post things on the internet there and as such, It is found that in china speaking your mind on the internet might get you arrested.
See options below
A. is allowed by the government. B. might get you arrested. C. is protected as free speech. D. is difficult to do in Chinese script.
Learn more about china from
https://brainly.com/question/24717901
#SPJ1
Answer:
it can get you arrested
Explanation:
got it correct for pennfoster! God bless! Hope this helps!
Which type of cell references are automatically updated when copied?.
Answer:
By default, all cells are Relative Cell References within a formula and will update when copied or use of Autofill.
Explanation:
By default, all cells are Relative Cell References within a formula and will update when copied or use of Autofill.
________ is the process of obtaining, cleaning, organizing, relating, and cataloging source data. Data acquisition Data entry Data mining Data encryption
Answer:
_______ is the process of obtaining, cleaning, organizing, relating, and cataloging source data. A Data acquisition B Data mining C Data encryption D Data scrubbing E Data entry
✓ A Data Acquisition
Explanation:
what is not an example of ai
Answer:
human
Explanation:
because it is not a machine