linnea is researching a type of storage that uses a single storage device to serve files over a network and is relatively inexpensive. what type of storage is linnea researching?

Answers

Answer 1

Considering the situation described above, the type of storage Linnea is researching is "NAS."

What is NAS in storage?

NAS is an acronym for Network Attached Storage. It is used as a file-level computer data storage server attached to a computer network.

NAS is usually applied in serving the files over Ethernet. It is cheaper and can be set up quickly.

Different Components of NAS.

Components of Network Attached Storage include the following:

CPUNetwork Interface CardsOperating SystemNFS and CIFS protocol, etc.

Hence, in this case, it is concluded that the correct answer is NAS

Learn more about NAS here: https://brainly.com/question/25705115


Related Questions

What are two characteristics of switches? (Choose two.) * 1 point A. Switches identify the intended destination of the data that they receive B. Switches cause more data collisions than hubs b C. Switches are capable of sending and receiving data at the same time D. Switches send each packet to all of the computer that are connected to them.​

Answers

Answer:

A. Switches identify the intended destination of the data that they receive. And C. Switches are capable of sending and receiving data at the same time

Explanation:

Switches can be used as inputs (Analog), or outputs (digital). These inputs and outputs are signals that the switches send or receive- Or at least as push button switches... But the same applies to network switches.

Hope this helps! Have a great day!

congress are smart becuase.....

Answers

Answer:

If we are talking about government then they are smart bc of there two house policies, both are equal yet super unique. They make sure each state has an equal voice in the senate.

One of the best ways to code effective programs is to write so-called _______ programs, using the sequential, selection, or repetition logic structures.

Answers

One of the best ways to code effective programs is to write so-called structured programs, using the sequential, selection, or repetition logic structures.

Structured programs are program types that aim to improve the clarity of program codes to make them readable and reusable.

Structural codes such as the if/then/else for selection and while/for repetition are used to achieve these goals.

So, structured programs are used to write programs that follow the sequential, selection, and repetition logic structures.

Learn more about structured programs here:

https://brainly.com/question/25770844

Write a program which will -

• Enter the score the student got in the test.
• Enter the maximum number of marks for the test.
• Divide the score by the maximum to work out the percentage.
• Check to see if the percentage is greater than 52. If it is then say "well done you have at least a grade 5"
• If the percentage is less than 52 then display "Unlucky, you need to revise more for the next test."
Will give out brainliest :)

Answers

Answer:

down below

Explanation:

score = input() # gets student's score input

max = input() # gets max number

percent = (score/max)*100 # multiply by a hundred to get percentage

if percent > 52: # checks if percent is greater than 52

  print("well dont you have at least a grade 5")

else # if percent is less than or equal to 52 it will print this instead

  print("Unlucky, you need to revise more for the next test.")

THIS PART IS NOT CODE:

make sure you indent/tab the print statements or else you'll get an error

Understanding that protection of sensitive unclassified information is:

Answers

Answer:

Not necessarily malignant

Explanation:

As the word "unclassified" shows it's not damaging, however I still doesn't recommend if it's not necessary.

what will the computer do in response to a line of code reading # name = input("What is your name?") print “What is your name?” print “name =” nothing return a syntax error

Answers

The computer will do nothing in response to the instruction # name = input("What is your name?")

The instruction is given as:

# name = input("What is your name?")

The above instruction is a Python instruction.

In Python, lines that begin with # are not executed, because they are treated as comments.

This means that, the computer will not do anything when it comes across the instruction

Read more about Python instructions at:

https://brainly.com/question/19344465

Brake fluid is made up of a chemical that:​

Answers

hi there!

Brake fluid is a type of hydraulic fluid used in hydraulic brake and hydraulic clutch applications in automobiles, motorcycles, light trucks, and some bicycles. It is used to transfer force into pressure, and to amplify braking force. It works because liquids are not appreciably compressible.

hope this helps.

Fill in the blank: Every database has its own formatting, which can cause the data to seem inconsistent. Data analysts use the _____ tool to create a clean and consistent visual appearance for their spreadsheets.

Answers

The tool used by data analysts to create a clean and consistent visual appearance for their spreadsheets is called clear formats.

A database refers to an organized or structured collection of data that is typically stored on a computer system and it can be accessed in various ways. Also, each database has a unique formatting and this may result in data inconsistency.

In Computer science, a clean data is essential in obtaining the following:

Data consistencyData integrityReliable solutions and decisions.

Furthermore, spreadsheets are designed and developed with all kinds of tools that can be used to produce a clean data that are consistent and reliable for analysis.

In this context, clear formats is a kind of tool that is used by data analysts to create a clean and consistent visual appearance for their spreadsheets.

Read more on database here: https://brainly.com/question/15334693

create a parameter query where the user will enter a value to use as the criterion

Answers

Click in the Criteria row in the InsuranceType column and type [Enter Insurance Type]. Click the Run button. Type dental when prompted. Click OK.

lenny joggy along a trail for 1.35 hours he ran at a pace of 3.2 miles per hour. how far did lenny jog?

Answers

Answer:

Lenny jogged along a trail for 1.35 hours. He ran at a pace of 3.2 miles per hour. How far did Lenny jog? Answer Lenny jogged 4.32 miles.

Explanation:

Which of these problems is correct if the numbers are binary numbers?
Group of answer choices

1 + 1 = 2

1 + 1 = 10

0 + 0 = 1

1 + 0 = 10

Answers

Answer:

1 + 1 = 10

Explanation:

2 does not occur in the binary "alphabet"

0 + 0 = 0 in any base, so also in binary

1 + 0 = 1 in any base, so also in binary

The answer is 1 + 1 = 10
1 = 1 in binary numbers, so 1 + 1 = 2 but 2 in binary numbers is 10, 2 doesn’t exist in binary numbers, it is only 1s and 0s so therefore it would be 10.

Write true or false:-
1. The start attribute always accept an integer value.
2. Description list is used to create a bulleted list.
3. The <DT> tag is used to create a table in HTML.
4. The <TR> tag is used to create cells in the table.
5. The VALIGN in attitude of the <TD> tag is used to Align the position of text in the cell vertically.

And please don't give only one answer, if you are giving, then please give all the answers. ​

Answers

Answer:

false

true

false

true

false

Explanation:

.

write a program to print even numbers from 1 to 20​

Answers

Answer:

If qbasic then

pls mark barinist

Answer:

print(“2 4 6 8 10 12 14 16 18 20”)

What is the output for the following program?
numA = 4
while numA <12:
numA = numA + 3
print(numA)
Output:

Answers

Answer:

13

Explanation:

int numA = 4;

whilie (numA < 12){

  numA += 3;

}

System.out.print(numA);

numA          numA < 12

  4                   true ⇒ numA increases by 3, loop continues

  7                   true ⇒ numA increases by 3, loop continues

  10                 true ⇒ numA increases by 3, loop continues

  13                 false ⇒ loop stops, program them prints out value of numA

Aliaa and Zhang Li are tennis-playing robots. Aliaa is 715\,\text{cm}715cm715, start text, c, m, end text from Zhang Li and 2{,}200\,\text{cm}2,200cm2, comma, 200, start text, c, m, end text from the far corner. Zhang Li measures an 91\degree91°91, degree angle between Aliaa and the far corner, as shown.


From Aliaa's viewpoint, what is the angle between Zhang Li and the far corner?

Do not round during your calculations. Round your final answer to the nearest degree.

Answers

Answer:

70

Explanation:

Law of Sines.

sin(91)/12 = sin(x)/715

x=19

180-91-19=70

Pomelo and Calamansi Trees are type of plants that suitable in this method.A. Cleft-Grafting B. Marcotting C. Layering D. T-Budding

Answers

Pomelo and Calamansi Trees are type of plants that suitable in this method.A. Cleft-Grafting

Sidney needs to create a decimal number variable that will be added to another number. What kind of variable is required?binaryBooleanstringfloat

Answers

Answer:

Option D. float is the correct answer.

Explanation:
Decimal number contains decimal point. Out of all the given data types, float data type store the number with decimal point.
As the number has to be further used for calculations float ahs to be used. Because the numbers can also be stored in string but cannot be used for further calculations.

the service you are attempting to use is restricted

Answers

Services can be restricted due to different factors. If when an individual have received calls on their cell phone and the device's caller ID shows "Unavailable" or "Restricted," It can be due to a lot of factors.

Note that caller ID designations are brought about by the settings on the caller's end or network restrictions and not the phone's settings.

When a Cell phone calls designated shows "Unavailable" on a phone's caller ID, it means that the placed from an area or region is, is where the wireless service provider or phone company cannot be able to retrieve that phone number.

A "Restricted" phone call is said to be a call from a caller who has blocked one's phone so that you cannot identify their number.

Learn more about restricted from

https://brainly.com/question/15870692

________ is a function pertaining to a particular database that develops procedures and practices to control and protect the database.

Answers

Answer: Database administration

Explanation:

imagery functions as a coding system to help individuals acquire movement patterns. this describes

Answers

Answer:

Imagery can be used to develop qualities in yourself you'd like to have — it's like emotional body-building — and using a technique called “Evocative Imagery” you can cultivate courage, patience, tolerance, humor, concentration, self-confidence or any other quality you'd like to embody.

Katie is writing a print statement but nothing is printing. Which of the following should she check for?

A.
Make sure the print statement is surrounded by parentheses.

B.
Make sure the word print is in all capital letters.

C.
Make sure there is a colon after the print statement.

D.
Make sure the next line after the print statement is indented.

Answers

Answer:

A.

Explanation:

Parenthesis are required to be around the data in a print function. All the letters in a  print statement should be lowercase. A colon isn't required after a print statement. Indentation is not needed for a print statement because there are no colons after the statement instead. Here's an example where you would need to indent the line:

def randNum( x, y ):

    x = input("Enter number: ")

    y = input("Enter number: ")

    return x * y

Here's an example of a print statement:

print("My name is Sullen.")

If you know that a file for which you are searching starts with the letters MSP, you can type ____ as the search term.

Answers

Map I think it is the answer


Pls help me pls I’m struggling

Answers

you have it correct

You are creating a program that can add up the amount of money the user spent that day. Right down to the penny! What kind of variables should you create? a default variable a user variable an integer variable a float variable

Answers

Answer:A. A default Variable

Explanation:

Answer:

A

Explanation:

Did it on a Test

Which type of wireless attack is designed to capture wireless transmissions coming from legitimate users

Answers

A type of wireless attack that is typically designed and developed to capture wireless transmissions coming from legitimate end users is referred to evil twin.

An evil twin can be defined as an illegitimate and fraudulent that is usually set up to capture wireless transmissions, especially by eavesdropping on the information transmitted by legitimate end users.

In Cybersecurity, an evil twin is an equivalent of phishing on a local area network (LAN).

Basically, an evil twin is a rogue wireless access point (AP) that is typically designed and developed to capture wireless transmissions and sensitive information coming from legitimate end users.

In conclusion, an evil twin is used by an attacker or hacker to gain an unauthorized access to sensitive information from legitimate end users.

Read more: https://brainly.com/question/5660386

what is a copy of a theme with different color schemes called?

Answers

Answer:

A copy of a theme with different color schemes is called a Variant

Explanation:

If your company uses a non-price competition strategy what should you focus on
A. lowering prices
B. differentiation
C. creating direct competitors
D. the public sector

Answers

B- differentiation

nonprice competition strategy refers to strategy to win a business competition that does not involved lowering price of the product.

Businesses mostly do this using differentiation strategy, which is increasing the different variety of product that they sell in the market.

A facility that is pre-wired for necessary telecommunications and computer equipment, but doesn't have equipment installed, is known as a

Answers

Answer:

hot site

Explanation:

Megan owns a small neighborhood coffee shop, and she has fifteen employees who work as baristas. All of the employees have the same hourly pay rate. Megan has asked you to design a program that will allow her to enter the number of hours worked by each employee and then display the amounts of all the employees’ gross pay. You determine that the program should perform the following steps:

1. The text that is in the file is stored as one sentence. Incorporate the code that reads the file’s contents and calculates the following:
a. total number of words in the file
b. total average number of words per sentence
c. total number of characters in the file
d. total average number of characters per sentence


file name: employee_names.txt
file text:
George Thomas
Melinda Harris
Norah Jeddery
Jorge Ortiz
Samantha Gregory
Tanvi Gupta
William Edwards
Tania Gomez
Erica Sanders
Gracie Lou Freebush
Tony Montana
Obi-Wan Kenobi
Cruella De Vil
Marty McFly
Napoleon Dynamite

Answers

Answer:

she gives 10 dollars an hour

Explanation:

no

What do you mean by Data Types? Give Examples.
Ms Access question​

Answers

Answer:

This answer is quite late, but data types are basically categories that differentiate stuff in python.

A few examples would be:

String - Anything that has single or double-quotes around it. The input( ) function automatically returns a string, unless changed.

Int - An integer. Any whole number.

Float - Any decimal number.

List - a variable in which you can store multiple different elements. (Strings, integers, floats, tuples, lists, etc...)

Also, sorry if my English isn't perfect. English isn't my first language.

Explanation:

Don't know. Just some stuff I remember from my python class. ∞

Other Questions
Find the slope of the line passing through the points (3,-1) and (3, -6). What is the area of a parallelogram with base 40 mm and height 18 mm? help me please!!!!!!! Where does cellular respiration take place? A. endoplasmic reticulum B. Golgi apparatus . mitochondria D. ribosomes Can someone please give me the (Answers) to this? ... please ... Explain the importance of scientific names. What is your definition of the fifth amendment? 1. There are 200 bones in the human body. 2. The skeleton is the structural arrangement of bones in the human body. 3. A bones are of the same shape. 4. Bones give shape to the body. 5. The backbones or spinal column are attached to the skull. the statements below. A farm lets you pick 3 pints of raspberries for $12.00 How have South Americas geography and history caused its modern culture to be diverse? After World War II, many wondered how peace could be guaranteed. For politicians,intellectuals, and other observers, what was the answer? 1. What is the approximate size of Luxembourg? 1,000 square miles 0 25,000 square miles 5,000 square miles 10,000 square miles I really need help! Please, please, PLEASE do not give me a link.Last year, Kristen read a total of 30 fiction and non-fiction books. The number of non-fiction books was 5 less than 4 times the number of fiction books.What is the total number of FICTION books that Kristen read last year?A. 5B. 7C. 23D. 25 What role did Muslim Merchants play as they were trading with other lands? a car is travelig at 20.0 m/s when the driver applies the brakes and comes to a stop. if the car slows down uniformly with an acceleration of -4.20 m/s, about how far does the car travel before coming to a rest Which expression can be used to find the surface area of the following square pyramid?eaChoose 1 answer:100 + 80 + 80 + 80 + 80100 - 8010 + 10 +8+8+8+8100 + 40 + 40 + 40 + 40 HOW DO YOU FIND RADIUS What is a trusted computing base (TCB)? Hosts on your network that support secure transmissions The operating system kernel and device drivers The combination of hardware, software, and controls that work together to enforce a security policy What is the haploid number for the Tasmanian devil? what do i do on this rubixs cube