Which SCSI standard allows for the technique known as “hot swapping”? Ultra SCSI Original SCSI Serial SCSI Fast-Wide SCSI

Answers

Answer 1

Answer:

Serial SCSI

Explanation:

Hot swapping can be defined as a process which typically involves fitting or replacing CD-ROM drive, hard-disk drive, power supply or other peripheral devices while a computer system is powered on. Thus, it allows for the installation or removal of a peripheral device from a computer while power is still being supplied to the computer i.e without having to shutdown the computer.

Serial SCSI is a SCSI standard which allows for the technique known as “hot swapping” because it's a point to point connection that is designed to move data to and from computer storage serially.


Related Questions

What is the base value of the number system that consist of the digit set {0, 1, 2, 3, 4, 5, 6, 7}?

(a) Two
(b) Eight
(c) Sixteen
(d) Seven

Answers

Answer:

B. Eight because octal number system has eight elements

the paint 3D program is used for drawing picture true or false​

Answers

Answer:

The answer is TRUE we use paint program to draw.

Explanation:

#swag

Answer is truee the paint 3d program is used for drawing pics

Write technical term of following statements: a.The set of programs to perform specific task. b.A feature of computer which tells multi-functioning capability of computer. c.The first calculating machine designed for the manipulation of census data. d.The first computer programmer.​

Answers

Answer:

a) Application software

d) Lady Augusta Ada Lovelace

b) (it may be versatility

14. Applying formatting using the commands in the ribbon is called style
(page layout, override, justification)

Answers

Answer:

Override

Explanation:

Hope this helps

It is the way to convey a message,an idea,a picture,or speech that is received and understood clearly and correctly by the person for whom it is sent.​

Answers

Answer:

Communication.

Explanation:

Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties.

In this context, communication is the way to convey a message, an idea, a picture, or speech that is received and understood clearly and correctly by the person for whom it is sent.​

Generally, the linear model of communication comprises of four (4) main components and these are;

1. Sender (S): this is typically the source of information (message) or the originator of a message that is being sent to a receiver. Thus, they are simply the producer of a message.

2. Channel (C): this is the medium used by the sender for the dissemination or transmission of the message to the recipient. For example, telephone, television, radio, newspapers, billboards etc.

3. Message (M): this is the information or data that is being sent to a recipient by a sender. It could be in the form of a video, audio, text message etc.

4. Receiver (R): this is typically the destination of information (message) or the recipient of a message that is being sent from a sender.

how do I answer question

Answers

Answer:

To answer a question on brainly, there is a add answer button below the question. Please look at the attached, it shows you the add answer button.

Explanation:

Once you click on add answer, brainly will take you to something that looks like a note and all you have to do is type the answer and explanation. Once you do that, click on the add your answer button on the top right corner, and your answer will be posted.

NBA bank uses centralized client server database that is accessed by all its nationwide branches. All customers' records are stored on the database. There are no copies at the branches. The building that holds this database and all the equipment went up in flames and was destroyed.

Answers

Answer:

NBA bank data is completely destroyed since it has not maintained any backup.

Explanation:

All businesses should maintain backup of important records. NBA bank has centralized client server database. This database record should be backup at different system which is only accessed when there is some problem in the original data. The backup system is initiated when the original database is destroyed.

how do you take a screenshot on a Samsung tablet

Answers

Explanation:

to capture a screenshot press and hold the power and volume down button at the same time for approximately 2 seconds

Which is not true about climatic normals?

Multiple choice question.

A)
They can differ from daily weather conditions.

B)
They are gathered at one location.

C)
They are averaged over a 30-year period.

D)
They describe average conditions.

Answers

Answer:

I think c is correct answer

Explanation:

hope it's help yu

Predict the output... LET A= -20.50 LET B = ABS(A) PRINT B END​

Answers

Answer:

full and then I would like this

Which of these is an example of an IT career? (ik I'm trash at this kinda stuff)


Select all that apply

A

game designer


B

network engineer


C

graphic designer


D

cashier

Answers

Answer:

not d

Explanation:

IT is info tech, so it's most likly a or c(I'mma go witn c), but then again b is possible, but c still sounds most reasonable(I think)

Greg has a list of payments for goods brought every month for the years 2009,2010,2011, and 2012. He needs information from only the last three years. He can filter this by clicking on

Answers

Answer:

"2009" and clicking "does not equal 2009"

Explanation:

The operator, 'does not equal', is a filtering operator used to exclude a specified attribute. The 'does not equal' operator is also used to provide the definition of the condition of the filter given that there are different values of two attributes

Therefore, given that there are only four years, and Greg needs the information of the last three years, which are, 2010, 2011, and 2012, the information for the year 2009 is to be excluded

Therefore, the correct option is; "2009" and clicking "does not equal 2009"

Gabriel's sister called him about a message that suddenly appeared on her screen that says her software license has expired and she must immediately pay $500 to have it renewed before control of the computer will be returned to her. What type of malware has infected her computer

Answers

Answer:

Blocking ransomware

Explanation:

A ransomware is a malware that acts by encrypting the files of a victim after which the attacker demands for a ransom payment to be made by the victim before access is restored through the provision of a key to decrypt the encrypted files

There are different types of ransomware such as blockers, wipers and cryptors

A blocker ransomware is one that blocks access to the files stored on a computer or device by encrypting them and usually displaying a demand for payment message that comes up in front of the all opened windows

write the name of the technologies used in all five generation​

Answers

Answer:

First Generation (1940-1956)

First Generation (1940-1956)Second Generation (1956-1963)

First Generation (1940-1956)Second Generation (1956-1963)Third Generation (1964-1971)

First Generation (1940-1956)Second Generation (1956-1963)Third Generation (1964-1971)Fourth Generation (1971-2010)

First Generation (1940-1956)Second Generation (1956-1963)Third Generation (1964-1971)Fourth Generation (1971-2010)Fifth Generation (Present Day)

Answer:

Five generation :Artificial intelligence _ Each one of the five generation computer is characterized by a major technological development .

Explanation:

When you call a method with a parameter list, the arguments in the argument list Select one: a. must be coded in the same sequence as the parameters b. must have data types that are compatible with the parameters c. have the same names as the parameters d. all of the above e. a and b only

Answers

Answer:

a and b only

Explanation:

If you have a function foo(int a, double b) { } you can call this as foo(x,y), just as long as x is an int and y is a double.

why the internet is not policed​

Answers

Answer:

The Internet allows people to circumvent law by committing criminal acts from areas where their activities are not illegal. Those areas will always exist, and thus new regulations will be just as ineffective as the old ones are ["Net Needs Law Enforcement, Author Says,"]. But Internet traffic is marked with IP addresses, and those addresses can be tied to specific networks with specific locations. Shouldn't it be possible to separate traffic based on the originating network and treat data coming from relatively insecure locations differently than data coming from relatively secure locations? It would be much harder for someone in a rogue nation to hack a network if he had to hack an intermediary network first. And unlike government regulation, which has zero impact in areas where these threats are likely to originate, separating traffic by location might actually work

Tables should be used when (a) the reader need not refer to specific numerical values. (b) the reader need not make precise comparisons between different values and not just relative comparisons. (c) the values being displayed have different units or very different magnitudes. (d) the reader need not differentiate the columns and rows.

Answers

Answer: (c) the values being displayed have different units or very different magnitudes

Explanation:

A table is refered to as an arrangement of data in rows and columns. Tables are used in research, communication, and data analysis.

Tables are used in the organization of data which are too complicated or detailed to describe and the use of table give a clearer description. Tables should be used when the values being displayed have different units or very different magnitudes. Tables can also be used in highlighting patterns or trends.

who is the father of computer​

Answers

Answer:

Charles babbage is the father of computer

Explanation:

Charles Babbage is a father of computer

Pratibha is working in a bank. She is creating a database to store the details of the bank customers. Which of the following fields of table Bank_Customer can be selected as primary key?​

Answers

Answer:

Acc_No

Explanation:

Given

See attachment for table Bank_Customer

Required

Which field can be used as primary key

A field, once made the primary key, cannot contain duplicate entries.

This means that Pratibha has to select a field that can be unique to all customers.

From the table, we have:

Acc_No [tex]\to[/tex] No two customers can have the same account number

Cust_Name [tex]\to[/tex] Multiple customers can have the same name

DOB [tex]\to[/tex] Multiple customers can have the same date of birth

PAN_NO [tex]\to[/tex] No two customers can have the same pan number; however, pan number is often issued by tax department of a country.

Opening_Bal [tex]\to[/tex] Multiple customers can have the same opening balance,

Hence, the field to use as primary key is:

Acc_No

Đất trồng có tầm quan trọng như thế nào đối với đời sống của cây:

A. Cung cấp nước, dinh dưỡng

B. Giữ cây đứng vững

C. Cung cấp nước, oxy, dinh dưỡng và giữ cây đứng vững

D. Cung cấp nguồn lương thực

Answers

Answer:

C

Explanation:

you’ve found an image you want to insert into your slide presentation you want to make the image look more gray so that it looks like an older image what would you need to adjust

Answers

image grayscale

format : format options: recolor : then pick the color

16. Which of the following is true about function return statements? A) A function can hold multiple return statements, but only one return statement executes in one function call. B) A function can hold only one return statement. C) A function can hold multiple return statements, and multiple return statements can execute in one function call. D) A function can have maximum of two return statements.

Answers

Answer:

A) A function can hold multiple return statements, but only one return statement executes in one function call

Explanation:

This is because each function can only return one value, whether it be an integer, String, or other object.

However, you can have a series of if-else statements, or case statements, to return a different value depending on information (within parameters, or variables.

Excellent. So, you can have multiple return statements, but the function will only end up executing one of these return statements and return a single value.

Hope this helps!

The statement "When there are multiple return statements but one return statement should execute the 1 function call" is true.

The following information should be considered:

This can be done as every function has only a return i.e. one value. It can be an integer, string, or any other thing. The function can't hold only 1 return statement.The function can't hold many return statements that execute one function call. The function can't have the utmost 2 return statements.

Therefore, we can conclude that option A is correct.

Learn more about the function here: brainly.com/question/12431044

Define Data communication​

Answers

Explanation:

Data transmission and data reception is the transfer and reception of data over a point-to-point or point-to-multipoint communication channel. Examples of such channels are copper wires, optical fibers, wireless communication channels, storage media and computer buses. 

are the exchange of data between two devices For data communications to occur, the communicating devices must be part of a communication system made up of a combination of hardware

4. Calculate the standard deviation for the following data set: Foundations of Technology Engineering byDesi OITEEA . . Data Set = 4, 14, 6, 2, 7, 12 217 ,​

Answers

Answer:

[tex]\sigma_x = 5.68[/tex]

Explanation:

Given

[tex]x = 4, 14, 6, 2, 7, 12 2,17[/tex]

Required

The standard deviation

First, calculate the mean

[tex]\bar x =\frac{\sum x}{n}[/tex]

So, we have:

[tex]\bar x = \frac{4+ 14+ 6+ 2+ 7+ 12 +2+17}{8}[/tex]

[tex]\bar x = \frac{64}{8}[/tex]

[tex]\bar x = 8[/tex]

The standard deviation is:

[tex]\sigma_x = \sqrt{\frac{\sum(x - \bar x)^2}{n-1}}[/tex]

So, we have:

[tex]\sigma_x = \sqrt{\frac{(4 - 8)^2+ (14 - 8)^2+ (6 - 8)^2+ (2 - 8)^2+ (7 - 8)^2+ (12 - 8)^2+ (2 - 8)^2+ (17 - 8)^2}{8-1}}[/tex]

[tex]\sigma_x = \sqrt{\frac{226}{7}}[/tex]

[tex]\sigma_x = \sqrt{32.2857}[/tex]

[tex]\sigma_x = 5.68[/tex]

1. Answer the following questions: a. What are the different types of number system? Name them.​

Answers

Answer:

binary,decimal, hexadecimal and octal number system

why is computer virus called destructive program​

Answers

Answer:

A computer virus is a malicious software program loaded onto a user’s computer without the user’s knowledge and performs malicious actions.

Viruses which are the most commonly-known form of malware and potentially the most destructive. A virus can do anything from erasing the data on a computer to hijacking a computer to attack other systems, send spam, or host and share illegal content.

Explanation:

The term 'computer virus' was first formally defined by Fred Cohen in 1983. Computer viruses never occur naturally because they are always induced by people. Once created and released, however, their diffusion is not directly under human control. After entering a computer, a virus attaches itself to another program in such a way that execution of the host program triggers the action of the virus simultaneously. It can self-replicate, inserting itself onto other programs or files, infecting them in the process. Not all computer viruses are destructive though. However, most of them perform actions that are malicious in nature, such as destroying data. Some viruses wreak havoc as soon as their code is executed, while others lie dormant until a particular event (as programmed) gets initiated, that causes their code to run in the computer. Viruses spread when the software or documents they get attached to are transferred from one computer to another using a network, a disk, file sharing methods, or through infected email attachments. Some viruses use different stealth strategies to avoid their detection from anti-virus software. Some old viruses make sure that the "last modified" date of a host file stays the same when they infect the file.  

What is spam? a type of virus that spreads from computer to computer through a network connection a type of virus that targets programs and files, and duplicates itself like a biological virus the process of using email to trick a user to share personal information an unwanted e-mail sent in bulk from people or organizations

Answers

Answer:

This is a pretty obvious answer.

An unwanted e-mail sent in bulk from people or organizations.

Explanation:

A simple circuit consists of a battery, an ammeter and a 2-ohm resistor. If the ammeter reads 4 amperes, determine the voltage of the battery and enter in the appropriate space.

Answers

Resistance=2ohmCurrent=I=4AVoltage=V

Using ohms law

[tex]\boxed{\sf \dfrac{V}{I}=R}[/tex]

[tex]\\ \sf\longmapsto V=IR[/tex]

[tex]\\ \sf\longmapsto V=2(4)[/tex]

[tex]\\ \sf\longmapsto V=8V[/tex]

Class C Airspace inner ring begins at the __________ and extends vertically (by definition) to MSL charted values that generally go up to ______________ feet above airport elevation and the outer ring begins at _______ feet above the ground and extend vertically to _________ feet above airport elevation. (NOTE #1: no commas) (NOTE #2: All values on the Sectional Charts are in MSL values)

Answers

Answer:

5 nautical mile

4000 feet

1200 feet

Explanation:

Class C Airspace has inner ring which is also an inner core has usually 5 nautical mile radius. This extends from surface area upto 4000 feet above airport elevation and outer ring starts at an altitude of 1200 feet above ground and is extended upto 4000 feet above airport elevation.

What is ABC computer?​

Answers

Answer: The Atanasoff–Berry computer was the first automatic electronic digital computer. Limited by the technology of the day, and execution, the device has remained somewhat obscure. The ABC's priority is debated among historians of computer technology, because it was neither programmable, nor Turing-complete.

Explanation:

Other Questions
When a company has established separate manufacturing overhead rates for each department, it is using:_______. a. departmental overhead rates. b. cost distortion. c. a plant-wide overhead rate. d. lean thinking. Which of the following is the correct way to punctuate this statement?O A. Barry could not believe what he was seeing, a ghost.B. Barry could not believe what he was seeing: a ghost.O C. Barry could not believe what he was seeing; a ghost.D. Barry could not believe what he was seeing a ghost. can someone please help me out marking brainliest 7,25 x (y+5,6)=58 vy y = An outside supplier offers to provide Epsilon with all the units it needs at $60 per unit. If Epsilon buys from the supplier, the company will still incur 40% of its overhead. Epsilon should choose to: Multiple Choice Buy since the relevant cost to make it is $48. Buy since the relevant cost to make it is $72. Buy since the relevant cost to make it is $56. Make since the relevant cost to make it is $56. Make since the relevant cost to make it is $48. No.3 plzz ...?Any one write an absolute value equations to satsify the given solution set shown on a number line -1/2 1/2 and aPlz help fast he preemptive right is important to shareholders because it a. protects bondholders, and thus enables the firm to issue debt with a relatively low interest rate. b. allows managers to buy additional shares below the current market price. c. protects the current shareholders against a dilution of their ownership interests. d. is included in every corporate charter. Match each example to the appropriate term.a. Trees used to make paper1. Human capital 2. Technological knowledge 3. Physical capital b. A printing press used to make books.1. Human capital 2. Technological knowledge 3. Physical capital c. A method of organizing workers to increase production per hour.1. Human capital 2. Technological knowledge 3. Physical capital d. The skills workers learn during a training session.1. Human capital 2. Technological knowledge 3. Physical capital How were Mexican citizens lives affected by the leadership of Antonio Lopez de Santa Anna?Citizens faced many changes in laws and policies.Citizens began to have more influence in Mexican politics.Citizens had less protection from a weakened military.Citizens were silenced under harsh dictatorial rule. Look at the sentence that follows. When translated to Spanish, would it use the subjunctive?It's certain that Marcos is coming to the party.No or yes. 6 less than the product of 5 and a number A. 5-6nB. 6+5nC. 5(n - 6)D. 5n-6 With the advent of industrialization and urbanization, maintaining the _____ family pattern becomes more difficult in societies. Increasingly, young people move from rural to urban areas in search of employment in the industrializing sector of the economy. At that time, the _____ family typically becomes the predominant family pattern in the society. Many historians say that the seeds of animosity that will light the fire to World War II began with the impact of the: On a spinner I have a 0.1% chance of getting a 5. How many times do I need to spin to get 5? All of the following are true of spermatogenesis EXCEPT: Question 18 options: DNA replicates once, but cells divide twice. The products are spermatozoa that each have a head, midpiece and tail. Spermatids containing 23 chromosomes (1n) are produced. One spermatogonium produces 4 spermatids Genetically diverse spermatids are created. What element is a character of an informative report Today, 6 friends went out for lunch. Their total bill was $27.60, including tax and gratuity. They decided to split the bill equally and each paid with a $10 bill. How much money will each person get back? $60 is shared between Ali, Ben and Carol in the ratio of 5 :3 : Z How much does Ben get? A sample of oxygen gas has a volume of 453.7 mL when its pressure is 0.435 atm. What will the volume of the gasbeat a pressure of 0.88 atmospheres, if the temperature remains constant?