A server is installed in a location that is prone to power failures. While the server is connected to a UPS, the systems administrator is still concerned about ensuring the integrity of the data being written to the RAID array. Which of the following is the systems administrator MOST likely to do?

A. Install additional memory on the RAID controller.
B. Install redundant RAID controllers.
C. Install battery-backed cache on the RAID controller.
D. Install updated firmware on the RAID controller.


Answer: C. Install battery-backed cache on the RAID controller.

Computer Science & Information Technology

You might also like to view...

Explain why, in step (b), all primaries must be updated in a single transaction and, in step (c), the update is propagated to site A.

The following variant of the primary copy asynchronous-update replication protocol has been proposed for totally replicated systems. a. A transaction executing at site A updates only the replicas at A before it commits (it needed to access no other site since replication is total). b. After the transaction commits, a second transaction is initiated to update the primary copies of all items updated at A. c. After the transaction in step (b) has completed, each primary site propagates the update made at that site to all secondaries (including the one at site A). Updates made to a primary copy by several transactions are propagated to secondaries in the order in which the primary was updated. What will be an ideal response?

Computer Science & Information Technology

A section and section header refer to the same thing

Indicate whether the statement is true or false

Computer Science & Information Technology

John, an employee of an organization, always connects to the corporate network using his own mobile device. Which of the following best practices prevents BYOD risk when John connects to the corporate network?

A. Improperly disposing of a device B. Not reporting a lost or stolen device C. Providing support for many different devices D. Separating personal and private data

Computer Science & Information Technology

Given the class definition:

class CreateDestroy { public: CreateDestroy() { cout << "constructor called, "; } ~CreateDestroy() { cout << "destructor called, "; } }; What will the following program output? int main() { for ( int i = 1; i <= 2; ++i ) CreateDestroy cd; return 0; } a. constructor called, destructor called, constructor called, destructor called, b. constructor called, constructor called, c. constructor called, constructor called, destructor called, destructor called, d. Nothing.

Computer Science & Information Technology