A server technician is reviewing a server and notices the server hard disk supports up to 15000rpm. The technician is reviewing whether the hard drive can be upgraded from 40GB to 136GB for primary storage size. Given this scenario, which of the following is the technician MOST likely to do next ?

A. Procure a 136GB SAS interface storage device
B. Procure a 136GB SATA interface storage device
C. Procure a 136GB USB interface storage device
D. Procure a 136GB FireWare interface storage device


Answer: A. Procure a 136GB SAS interface storage device

Computer Science & Information Technology

You might also like to view...

Which of the following statements is false?

a) Extension methods add functionality to a type by modifying the type’s source code. b) LINQ capabilities are implemented as extension methods. c) Preceding an object parameter that’s the first parameter in the method header with the this keyword indicates that the method extends an existing type. The compiler uses this information to add code into the compiled program that enables extension methods to work with existing types. d) The type of an extension method’s first parameter specifies the type that you’re extending.

Computer Science & Information Technology

____ applications work on your smartphone or tablet.?

A. ?Portable B. ?Mobile C. ?Local D. ?Vector

Computer Science & Information Technology

A software development company needs to share information between two remote servers, using encryption to protect it. A programmer suggests developing a new encryption protocol, arguing that using an unknown protocol with secure, existing cryptographic algorithm libraries will provide strong encryption without being susceptible to attacks on other known protocols.Which of the following summarizes the BEST response to the programmer's proposal?

A. The newly developed protocol will only be as secure as the underlying cryptographic algorithms used. B. New protocols often introduce unexpected vulnerabilities, even when developed with otherwise secure and tested algorithm libraries. C. A programmer should have specialized training in protocol development before attempting to design a new encryption protocol. D. The obscurity value of unproven protocols against attacks often outweighs the potential for introducing new vulnerabilities.

Computer Science & Information Technology

The _____ attribute tests whether the XPath expression returns a value of true or false; if it is true the enclosed style is applied.

A. ?when B. ?test C. ?choose D. ?if

Computer Science & Information Technology