For windows xp, 2000, and nt servers and workstations, raid 0 or ____ is available.

Answers

Answer 1

For windows XP, 2000, and NT servers and workstations, raid 0 or 1 is available.

What is NT in network?

NT's technology is known to be a type of tech that is said to be the base for any form of  Microsoft successor operating system, that is Windows 2000.

Note that Windows NT which is "New Technology," is known to be made up of two products: Microsoft NT Workstation as well as  Microsoft NT Server.

Therefore, For windows XP, 2000, and NT servers and workstations, raid 0 or 1 is available.

Learn more about servers from

https://brainly.com/question/15498455

#SPJ1


Related Questions

You have upgraded your aws support plan to the business support level. what is true of the business support plan?

Answers

The business support plan for AWS is one hour support on production system failure. AWS is stand for Amazon Web Services, Inc.

Governments, companies, and individuals can access on-demand cloud computing platforms and APIs through AWS, an Amazon corporation, on a metered pay-per-use basis. These cloud computing web services provide software tools and distributed computer processing power through AWS server farms.

One of these services is called Amazon Elastic Compute Cloud (EC2), which gives consumers access to a virtual computer cluster that is always reachable online. AWS services are delivered to customers through a global network of AWS server farms.

Learn more about AWS https://brainly.com/question/28145530?

#SPJ4

You are about to install a new desktop application that you downloaded from a website. what should you do before you start the installation? (select two.)

Answers

Since you are  about to install a new desktop application that you downloaded from a website. the thing that you should do before you start the installation are:

Scan the installer for malware and create a restore point.Verify that the application is compatible with the version of windows you are using.

What is called a desktop application?

Desktop applications are known to be a kind of a software programs that is said to often run locally on any kind of computer devices.

Note that these applications cannot be gotten or be accessible from any kind of browser such as web-based apps, and they are the ones that needs the deployment on a personal computer or on a  given laptop.

Therefore, Since you are  about to install a new desktop application that you downloaded from a website. the thing that you should do before you start the installation are:

Scan the installer for malware and create a restore point.Verify that the application is compatible with the version of windows you are using.

Learn more about desktop application from

https://brainly.com/question/14550401

#SPJ1

See options below

Scan the installer for malware and create a restore point.

Verify that the application is compatible with the version of windows you are using.

Scan the installer for malware and create a restore point.

Verify that the application is compatible with the version of windows you are using.

A _____ is an example of a systems program.
a. command interpreter
b. web browser
c. database system
d. programming ide

Answers

Command interpreter is an example of system porgram. In this question the correct option is a i.e Command interpreter

A software that is part of operating systems is known as a system program. System programs provide a platform to other programs or software. Command interpreter is one such example of system programs. Unlike graphical user interface (GUI) based programs, command interpreter handles and processes text commands entered by users or other programs.

Command interpreter provides an interface between users and computers. MS-DOS is an example of a command interpreter. Experienced and advanced users prefer to use command interpreters as they give fast and direct access to operating systems.

Why other options (b, c, and d) are not correct is explained briefly below:

Web browser: It is an application software to access the World Wide Web.Database system: It is a system software used to store, organize and retrieve data through queries.Programming ide: It is a software application that facilitates the programmers to develop software.

You can learn more about command interpreter at

https://brainly.com/question/14725990

#SPJ4

When you load a program in windows, the pc copies the program from the mass storage device to _______________ and then runs it.

Answers

When you load a program in windows, the pc copies the program from the mass storage device to RAM and then runs it.

RAM is an abbreviation for random access memory. RAM is used to store programs and data that can be read and altered in any order. RAM has the advantage over hard disk drives as it is more convenient and faster to read and write from.

One of the disadvantages of this type of memory is that it cannot store data permanently as the data is lost when the computer is shut off.

RAM is stored in microchips of the pc and can bear only a small amount of data.

Dynamic random access memory and static random access memory are the two main types of RAM that differ in that the static random access memory the data does not need to be constantly refreshed.

To know more about RAM, click here:

https://brainly.com/question/3157583

#SPJ4

According+to+gartner+research,+by+2020,+_____+will+be+the+greatest+source+of+competitive+advantage+for+30%+of+organizations.

Answers

According to Gartner Research, by 2020, digital dexterity will be the greatest source of competitive advantage for 30% of organizations.

Organizations are under increasing pressure to keep up with the ever-changing digital landscape. To stay ahead of the competition, many are turning to digital dexterity as a source of competitive advantage.

Gartner Research predicts that by 2020, digital dexterity will be the greatest source of competitive advantage for 30% of organizations. To achieve digital dexterity, organizations need to be able to rapidly adapt to changing market conditions and technologies.

To stay ahead of the competition, organizations need to invest in training and development programs that will help employees stay up-to-date with the latest digital trends. Additionally, organizations need to create a culture of innovation that encourages employees to experiment with new technologies and ideas.

By 2020, digital dexterity will be a critical source of competitive advantage. Organizations that are able to effectively harness the power of digital technology will be well-positioned to succeed in the future.

Learn more here:

https://brainly.com/question/17178886

#SPJ4

An email message that is encrypted, uses a digital signature and carries a hash value would address which aspects of the cia triad?

Answers

An email message that is encrypted, uses a digital signature and carries a hash value would address this aspects of the CIA Triad: A. Confidentiality and integrity.

What is the C-I-A security triad?

The C-I-A security triad is an abbreviation for confidentiality, integrity and availability. Also, it can be defined as a cybersecurity model that is designed and developed to guide security policies for information security in a business firm, in order to effectively and efficiently protect and make their data available to all authorized end users.

This ultimately implies that, an encrypted e-mail message that uses a digital signature and carries a hash value is a process which is typically responsible for the confidentiality and integrity at all times.

Read more on C-I-A security triad here: https://brainly.com/question/13384270

#SPJ1

Complete Question:

An email message that is encrypted, uses a digital signature and carries a hash value would address which aspects of the CIA Triad?

A. Confidentiality and integrity

B. Confidentiality and availability

C, Integrity and availability

D. Confidentiality, Integrity and availability

Copyright protection begins as soon as the work is created. group of answer choices
a. true
b. false

Answers

Copyright protection begins as soon as the work is created. group of answer choices is a true statement.

What is Copyright protection?

Copyright is known to be one that do not need to be registered to be able to have its protection but, the body that it is under is one that provides owners of copyrights the ability to be able to deposit a copy of their works and they will be able to have a certificate that tend to serves as a kind of a  notification of the presence of the work to all of the  general public.

Therefore, Copyright protection begins as soon as the work is created. group of answer choices is a true statement.

Learn more about Copyright protection from

https://brainly.com/question/20225852

#SPJ1

Formatting codes can be added to documents using a(n)_____, such as slashes // and angle brackets < >.

Answers

Using a delimiter like slashes or angle brackets, formatting codes can be applied to documents.

What are boundaries and shading mean?

Word documents often utilize borders and shading to highlight specific passages of text and make them the reader's initial impression.

We can use Borders and Shading in MS Word to make written text, paragraphs, and other elements appear lovely and attractive.

Formatting codes can be used to apply formatting to documents using a delimiter like slashes or angle brackets.

In order to add formatting codes to documents, a delimiter like slashes or angle brackets can be used.

The complete question is:

Formatting codes can be added to documents using a ___ such as slashes and angle brackets

Learn more about the borders and Shading here:

https://brainly.com/question/1553849?

#SPJ1

Microsoft has improved the ________ part of its value chain by providing formal reviews of its suppliers, which has helped to clarify expectations for them.

Answers

Microsoft has improved the  procurement part of its value chain by providing formal reviews of its suppliers, which has helped to clarify expectations for them.

What is the procurement process?

Procurement is known to be a term that connote all kinds of activities involved the act of getting the goods and services a firm do needs to aid its day to day operations.

It is one that is made up of sourcing, negotiating agreements, buying items, getting and inspecting goods and others.

Therefore, Microsoft has improved the  procurement part of its value chain by providing formal reviews of its suppliers, which has helped to clarify expectations for them.

Learn more about procurement process   from

https://brainly.com/question/1489991

#SPJ1

What is the first step when processing digital images?
Group of answer choices

Copy

Open

Crop

Resize

Answers

Answer: Copy

Explanation: Image acquisition (copy + paste) is the first step in image processing. This step is also known as preprocessing in image processing.

What is the first question john says we must ask ourselves about things we see online?.

Answers

Answer:

"who made this and why?"

Explanation:

What uses upward- and downward-pointing arrows that let you move through a set of values by clicking?

Answers

Spin box uses upward- and downward-pointing arrows that let you move through a set of values by clicking

There are many different types of input devices that can be used to enter data into a computer, but one of the most common is the spin box. A spin box uses upward- and downward-pointing arrows that let you move through a set of values by clicking.

Spin boxes are often used for numerical data, but they can also be used for other types of data, such as dates or names. When you click on the up arrow, the value in the spin box increases by one, and when you click on the down arrow, the value decreases by one.

If you click and hold on the up or down arrow, the values will change more quickly. This can be helpful if you know you want to increase or decrease the value by more than one.

Spin boxes are found in many different types of software, including word processors, spreadsheets, and image editing programs. They can be very helpful when you need to enter precise data into a program.

Learn more on Spin here:

https://brainly.com/question/28053654

#SPJ4

Question 6 of 20:
Select the best answer for the question.
6. Which of the following can prevent access to technology and the Internet?
O A. Geography
O B. Digital literacy
OC. A high salary
OD. A good education
Mark for review (Will be highlighted on the review page)
<< Previous Question
Next Question >>

Answers

Answer:

A.geograpy

Explanation:

cuz if there is no Geography internet will not be able to get to de person who needs it

Geography can prevent access to technology and the Internet.

What is Technology and Internet?

The electrical engine was the main driver of technological advancement during the Industrial Era, the Internet is the key technology of the Information Age.

This vast worldwide network of computer networks, which is currently mostly built on wireless communication platforms, offers omnipresent capability of multimodal, interactive communication in selected time, transcending space.

The Arpanet, the forerunner of the Internet, was introduced in 1969, thus it's not really a new invention.

The Internet is the key technology of the Information Age, much like how the electrical engine drove technological advancement during the Industrial Age.

Therefore, Geography can prevent access to technology and the Internet.

To learn more about Internet, refer to the link:

https://brainly.com/question/13308791

#SPJ2

In balloon framing, the second floor joist sits on a horizontal framing member called a _____.

Answers

The joist extend to the sidewall and is fastened to the full height studs. Alternately, a rim member can be installed to make the joist height easier to align

Computer programs typically perform three steps: input is received, some process is performed on the input, and output is produced. true/ false

Answers

True. Most basic programs follow this structure.

The given statement input is received, some process is performed on the input, and output is produced about computer programs is true.

What are the basic steps computer programs typically perform?

Any computer program to perform it follows three basic steps, which make the program better to run:

Generally, a computer program receives a kind of data that is an input, this data may be a file or something provided by the user.This data is altered by the program in some specific way.The altered data is provided as output.

There is some basic software also that can run on computer system software, utility software and application software. These programs are running on the information. and provides output.

Therefore, the steps given in the question are true.

Learn more about computers, here:

https://brainly.com/question/3397678

#SPJ2

Without middleware, different bi programs cannot easily connect to the data warehouse. group of answer choices
a. true
b. false

Answers

Without middleware, different BI programs cannot easily connect to the data warehouse: True.

What is a data warehouse?

A data warehouse can be defined as a logical collection of information that are gathered or obtained from many different operational databases, in order to both support and enhance day-to-day business analysis activities and decision-making tasks of various employees who are working in a business organization.

This ultimately implies that the primary purpose of a data warehouse is to logically aggregate a collection of information from all the departments in a business organization into a single repository.

However, we can infer and logically deduce that without middleware such as application server, different Business intelligence (BI) programs won't easily connect to the data warehouse.

Read more on data warehouse here: brainly.com/question/18565560

#SPJ1

The use of plain english in radio communications transmissions and avoidance of 10-codes is known as using:_________

Answers

The use of plain English in radio communications transmissions and avoidance of 10-codes is known as using  clear text.

What is plain English?

The term known as Plain language is known to be a word that can be referred to as  plain writing or plain English.

This is seen as a kind of a communication system where a said audience can be able to understand the first attempt made to  read or hear information that is presented to them.

Based on the above, one can say that The use of plain English in radio communications transmissions and avoidance of 10-codes is known as using  clear text.

Learn more about communications  from

https://brainly.com/question/27799808

#SPJ1

Software engineering must include the code and regulations that its members must uphold to be judged as a(n):_____.

Answers

Software engineering must include the code and regulations that its members must uphold to be judged as a professional engineering practice option (c) is correct.

What is execution?

The process by which a computer or virtual machine reads and responds to a computer program's instructions is known as execution in computer and software engineering.

It is given that:

The statement:

Software engineering must include the code and regulations that its members must uphold to be judged as a(n):

Software engineering must adhere to the rules and codes that all engineers must follow in order to be considered professional practice.

Thus, software engineering must include the code and regulations that its members must uphold to be judged as a professional engineering practice option (c) is correct.

Software engineering must include the code and regulations that its members must uphold to be judged as a(n):

a. engineer.b. certified professional engineer.c. professional engineering practice.d. All of these are

Learn more about the execution here:

brainly.com/question/20493746

#SPJ1

It is advised to fully charge the battery of a laptop before using it for the first time. True or false?.

Answers

It is advised to fully charge the battery of a laptop before using it for the first time is a true statement.

Should a person fully charge laptop before first use?

Yes, it is very important for a person to charge their laptop before they make use of it.

Note that the first charge is seen to be  most important charge because if a person buy a new laptop, it is good to charge your battery for 24 hours to ensure that it gets a full charge on its first attempt and thus helps to prolong its life.

Therefore, based on the above, It is advised to fully charge the battery of a laptop before using it for the first time is a true statement.

Learn more about laptop  from

https://brainly.com/question/14956175

#SPJ1

A key characteristic of teams is that all members are responsible for achieving common goals. which term describes this concept?

Answers

A key characteristic of teams is that all members are responsible for achieving common goals, a terminology which describes this concept is: d) shared accountability.

What is a project team?

A project team can be defined as a group of people with common aims, goals and objectives that are assembled by a project manager, in order to execute and implement a project successfully.

This ultimately implies that, project management is focused on team building and the execution of a project by the team members.

What is shared accountability?

Shared accountability can be defined as a concept which ensures that all team members are responsible for achieving team outcomes, while operating under common aims, goals, and standards of performance, in order to foster appreciation and satisfaction among team members.

Read more on shared accountability here: https://brainly.com/question/15094531

#SPJ1

Complete Question:

A key characteristic of teams is that all members are responsible for achieving common goals. Which term describes this concept?

a) cohesiveness

b) consensus

c) stability

d) shared accountability

The address o:3/7 would be found on terminal ____ of an output module residing in slot ___ of the plc chassis.

Answers

The address O:3/7 would be found on terminal 7 of an output module residing in slot 3 of the PLC chassis.

The PLC chassis is the heart of any industrial control system. It houses the various modules that make up the system, including the input/output (I/O) modules. Each I/O module has a unique address that identifies its location within the chassis.

For example, the address O:3/7 would be found on terminal 7 of an output module residing in slot 3 of the PLC chassis. This address is used to identify the module when configuring the system.

Knowing the addresses of the various modules is essential for troubleshooting and maintaining the system. If a problem arises, the technician can quickly identify the location of the module and take the necessary actions to correct the issue.

Learn more here:

https://brainly.com/question/14786619

#SPJ4

Which example best describes an ethical issue raised by computers?
OA. Millions of businesses using their knowledge and skills to sell
products and services online
OB. Causing others harm by posting unkind words or embarrassing
pictures of them on social media
OC. Organizations posting job openings online and job seekers
filtering searches to find a job
OD. Messages or images a person shares with friends being saved for
an unlimited amount of time

Answers

The option that is the example best describes an ethical issue raised by computers is Causing others harm by posting unkind words or embarrassing pictures of them on social media.

What are some of ethical issues concerning the use of computers?

To start with, there is known to be a lot of issues in regards to computer ethics.

It is one that covers:

(1) Computer crime

(2) The  responsibility for computer failure

(3) The protection of computer property, records and software

(4) privacy of the company, workers and customers

Note that Computer ethics is seen as the use of moral principles to the use of any kind of computers as well as the use of the Internet.

Therefore, The option that is the example best describes an ethical issue raised by computers is Causing others harm by posting unkind words or embarrassing pictures of them on social media.

Learn more about ethical issue from

https://brainly.com/question/13514672

#SPJ1

where do i click next to get to the following window? ​ a. change settings b. system protection c. advanced system settings d. device manager

Answers

The option to click to get to the next window is option c. advanced system settings.

What is the aim  of System settings?

System is known to be the first, as well as one  one of the most vital , areas that is found inside of the Settings app.

Note that it is said to be  the place where a person can be able to find the most basic form of settings to be able to customize your computer, such as display, notifications, apps, and others.

Therefore, The option to click to get to the next window is option c. advanced system settings.

Learn more about advanced system  from

https://brainly.com/question/24260354

#SPJ1

The query window displays when you click the _____ option and then click the finish button.

Answers

The query window displays when you click the Open the query to view information option and then click the finish button.

Why is a query used?

A query is known to be an element or a tool that helps to give you an answer to any form of simple question, carry out calculations, put data together from multiple tables, add, alter, as well as delete data from a given database.

Note that the use of queries is one that is seen to be very  versatile, as there are found to be a lot of types of queries and a person can be able to create a type of query through  the way the task has been given or made.

Therefore, based on the above, The query window displays when you click the Open the query to view information option and then click the finish button.

Learn more about query window from

https://brainly.com/question/17280632

#SPJ1

Which search operator would you use to locate webpages containing the exact phrase augmented reality, with words in the same order?

Answers

The search operator that you can use to locate webpages containing the exact phrase augmented reality, with words in the same order is option c: "augmented reality.

What is augmented reality?

Augmented reality (AR) is known to be a kind of an advance and well enhanced technology of the real physical world that is said to be attained via the use of digital visual elements, as well as sound, and other forms of sensory stimuli.

It is known to be a reality that is often delivered via the use of technology. It is seen as a growing tech and it is used in a lot of companies as it is said to be involved in the area of mobile computing as well as in business applications.

Therefore, The search operator that you can use to locate webpages containing the exact phrase augmented reality, with words in the same order is option c: "augmented reality.

Learn more about augmented reality from

https://brainly.com/question/9054673
#SPJ1

Which search operator would you use to locate webpages containing the exact phrase augmented reality, with words in the same order?

a: augmented + reality

b: -augmented reality

c: "augmented reality

d: ~augmented reality~

Given the variables x, y, and z, each associated with an int, write a fragment of code that assigns the smallest of these to min.

Answers

Given the variables x, y, and z, each associated with an int, a fragment of code that assigns the smallest of these to min. is given below:

if x<=y and x<=z:

   min=x

if y<=x and y<=z:

   min=y

if z<=x and z<=y:

   min=z

What is Programming?

This refers to the sequence of steps that are used to give commands to a computer system to execute a task.

Hence, we can see that Given the variables x, y, and z, each associated with an int, a fragment of code that assigns the smallest of these to min. is given below:

if x<=y and x<=z:

   min=x

if y<=x and y<=z:

   min=y

if z<=x and z<=y:

   min=z

Read more about fragment codes here:

https://brainly.com/question/15776278

#SPJ1

A palindrome is a string whose reversal is identical to the string. how many bit string of length 20 are palindromes and do not contain 11 as a substring?

Answers

A palindromic number, often known as a numeric or numeral palindrome, is one whose value remains the same when its digits are reversed, such as 16461. There are 2n possible bit strings for any n. Both forward and backward reading are done in the same manner.

What makes something a palindrome?Both forward and backward reading are done in the same manner.

A word, phrase, or sentence that reads the same both forward and backward is known as a palindrome.

The Greek words for "again" (Palin) and "to run" are combined to form the word palindrome (drom).

A palindromic number, often known as a numeric or numeral palindrome, is one whose value remains the same when its digits are reversed, such as 16461.

February 20, 2022, is the only palindrome date in the M/DD/YYYY date format for the year 2022. (2-20-2022). There are 2n possible bit strings for any n.

The characters read the same backward as forward. Some examples of palindromic words are redivider, deified, civic, radar, level, rotor, kayak, reviver, racecar, madam, and refer.

There are 2n possible bit strings for any n. Both forward and backward reading are done in the same manner.

To learn more about palindrome, refer to:

https://brainly.com/question/28279486

#SPJ4

________ is an application program function that deals with storing and retrieving data. data storage data access logic application logic presentation logic application access storage

Answers

Data storage is a function of application programs that manages storing and retrieving of data. The correct option is a i.e data storage.

One of the general functions of all application programs is data storage that handles storing and retrieving large amounts of data. Some examples of data storage provided by various application programs are:

MS E-xcel handles datasheets by storing data for the purpose of analysisWhats-App is used for communication purposes dealing with storing and retrieving data such as messages, media, and documentsDatabase management systems deal with storing, analyzing and retrieving large amount of dataWord processors allow to input, modify, format, and output data, thus, help in data storing and retrieving.

Options (b) data access logic, (c) application logic and (d) presentation logic are also functionalities of application programs but they do not offer data storage facilities. They serve their own purposes such as:

Data access logic creates a logic to store and fetch the data in databases.Application logic sends the data to the front-end to serve users. Presentation logic provides a graphical user interface, also called front-end, in order to make application programs usable.

Whereas, option application access storage (e) is the functionality of system software such as operating system, not the application software, that provides storage so that application programs can organize their data file.

You can learn more about data storage at

https://brainly.com/question/24227720

#SPJ4

1-assume a color display using 8 bits for each of the primary colors (red, green, blue) per pixel and a frame size of 1024 × 1024. a. what is the minimum size in bits of the frame buffer to store a frame?

Answers

Answer:

Hope this helps: 3145728

Explanation:

1024 x 1024 pixels = 1048576 pixel

1048576 x 3 = 3145728 bytes/frame

How do you change the desktop background in the macos mojave operating system?

Answers

Answer: Click the System Preferences icon on the dock. In the first row, click Desktop & Screen Saver.

Explanation: When it comes to macOS versions, Mojave and High Sierra are very comparable. The two have a lot in common, unlike Mojave and the more recent Catalina.

Other Questions
Logan is 2 years old. since logan is of average size we know he weighs about ______ pounds Due to radiation and absorption, what is the maximum flame temperature in a fire? In what way does quindlen think the events of september 11, 2001, are similar to the cold war? 7 12 = 12 7 is an example of the ____ property of multiplication.O commutativeO associativeO distributiveO multiplicative identity _____ is conflict within an individual, which may involve values, loyalties, or priorities. Starbucks coffee has recently begun selling and playing compilation cds and is supporting its own xm satellite radio station. this represents which strategy for growth? The text defines _____ psychology as the scientific study of how people think about, influence, and relate to one another. The tall ferns that we typically see in the tropics and temperate woodlands are the ________. Students on a campus of a college in California were asked "What will most likely help you to succeed incollege?" The results of this survey are tabulated below.Reasonhave a good roommatestudy hardlive on campussupportive familyalways go to classhave a goal in mindother(a) What is the relative frequency for the reason "study hard"? (Write your answer as a fraction.)Answer:Frequency583620187163558645439(b) What is the relative frequency for the reason "have a goal in mind"? (Write your answer as a fraction.)Answer: True or false: in-group collectivism was identified in the globe project as a reflection of how much leaders should encourage and reward loyalty to the social unit. In the last half of the fifteenth century, some forty thousand africans were forced into slavery by portugal and spain to? Solve the simultaneous equation-4x+3y=16x-y=2 Luke has bought three video games so far this month. he has $50 left and decides to buy another. this illustrates the economic concept of:_______ Please hurrySolve for c. a = 11+4b- 4ci think c is correct 1. Draw the graph of y = 3 x/2 using a table of points from x = -3 to 3. The minor groove contains less information about the identity of base pairs than the major groove because of the. Exercise 1 Underline the verb in each sentence. In the blank, write T if the verb is transitive. Write I if the verb is intransitive. The bell rang at exactly midnight. When welding a flat tee joint, what can be done to help prevent the reflected heat from causing the torch to backfire or pop? In the infrequent foreign marketing stage of international marketing involvement, firms? Which type of infection is the nurse trying to prevent when practicing aseptic techniques during a colonoscopy?