You are the administrator for the contoso.com website. recently, the server hosting the website had a failure that caused it to go down for a short period of time while the server was being repaired. in the future, you need to take steps to avoid a hardware failure from causing website downtime. what should you do?

Answers

Answer 1
Protecting the Power supply
Adding disk Arrays
Install an NLB Cluster
Answer 2
We should enable High Availability.

This one will keep a data backup constantly synced well with the primary server, and it would also utilize routing protocols to disperse application-level traffic between computers or even other equipment.Backup servers are often placed in separate locations and are linked utilizing NFS. The reason behind relocating backup servers is that unless there's a natural disaster or whatever else unexpected happens with the site, backup servers should always be available for assistance.

Thus the above answer is correct.

Learn more about the website here:

https://brainly.com/question/17270466


Related Questions

If your path variable is not set to search the working directory, how can you execute a program located there?

Answers

In *nix ./ (dot slash) means this directory, so ./helloWorld executes a program named helloWorld in the PWD.

Use the Internet identify a problem that social media was used to solve. The problem may be local, national, or global.

answer these questions on topic

a definition of the problem (what is it?);
an analysis of the problem (what caused it?; what are the major issues involved?);
how social networking was used to solve the problem;
your opinion of how social media made it easier to solve the problem; and
your sources.

Answers

The #MeToo movement exemplifies a problem tackled via social media, addressing the issue of sexual harassment globally. It was fueled by societal norms and leveraged social media to encourage solidarity among victims and demand change. Social networks' wide reach accelerated the movement's impact.

Problems addressed via social media range from local community issues to global crises. A clear example is the #MeToo movement, which became a global phenomenon through social media.

Definition of the problem: The #MeToo movement addresses the widespread prevalence of sexual assault and harassment, especially in the workplace.

Analysis of the Problem:

It's caused by longstanding societal norms and power imbalances. Major issues involve the silence surrounding victims and the lack of accountability for perpetrators.

Use of Social Networking:

Social networking provided a platform for victims to share their stories, creating a sense of solidarity and calling for change.

Opinion on Social Media's Influence:

In my opinion, social media significantly amplified the issue, by providing a large, immediate audience and fostering community support.

Sources:

My sources include articles from credible news outlets and academic journals that have analyzed the impact of the #MeToo movement.

Addressing Misinformation:

Social media's structure allows for rapid spread of information, making it vulnerable to misinformation. Major effects include public misinformation and damage to reputations.

Privacy Issues:

Platforms have implemented features such as privacy settings and data encryption to address user privacy concerns.

Marketing Insights:

Marketers can glean user preferences, social interactions, and trends through social networking.

What advantage do ExpressCard modules and U.S.B adapters offer over expansion cards?

Answers

The advantage does of ExpressCard modules and U.S.B adapters offer over expansion cards is that it can connect a variety of devices to a computer. The technical standard of ExpressCard specifies the design of slots built into the computer and of expansion of cards to insert in the slots including the mobile broadband modems. It is sometimes connectors for externals devices such as flash drives, USB connectors and other ports that need to connect to the computer.

What does ieee stand for

Answers

this stands for institute of electrical and electronics engineers

Good luck!
institute of electrical and electronics engineers

Discuss the disadvantages of creating a bit-stream copy from a disk to a network drive. is it worthwhile?

Answers

The biggest disadvantage is the time involved in transferring the data in bit-stream mode. Typically, only files are used by the operating system or user, but a bit-stream copy will transfer even the unused bits, multiplying the amount of time required to complete the process.

if you were going to construct a table that only included shape names with number prefixes, which shape would you include

square

circle

oval

triangel

Answers

The answer would be A. square

Answer:

Well the real answer is D. Triangle :) hope this helps anyone in connections academy! :)

Explanation:

What is a composition that is designed so that every element in the composition represents a single idea or theme?

1.Abstract
2.Allegory
3.Chiaroscuro
4.Mosaic

Answers

What was the answer?

the answer should be mosaic

G implement a program to display a file's contents. it should be similar to the unix cat command when given a single file. name your command show.

Answers

cat file.txt = Read the contents of file.txt and display them on the screen.
cat file1.txt file2.txt = Reads the contents of file1.txt and file2.txt, and displays them in order on the terminal screen.
cat file.txt > newfile.txt = Read the contents of file.txt and write them to newfile.txt, overwriting anything newfile.txt previously contained. If newfile.txt does not exist, it will be created. etc.

Using the syntax in section 2.3, write a command delete_all_rights (p, q, s). this command causes p to delete all rights the subject q has over an object s.

Answers

command delete_all_rights(p, q, s)
delete read from a[q, s];
delete write from a[q, s];
delete execute from a[q, s];
delete append from a[q, s];
delete list from a[q, s];
delete modify from a[q, s];
delete own from a[q, s];
end

_____ are special combinations of keys that tell a computer to perform a command. A.)Keypads
B.) Multi-keys
C.)Combinations
D.)Shortcuts

Answers

The answer is D.) Shortcuts
D. Shortcuts are special combinations of keys that tell a computer to perform a command

hope this helps

which of the following cannot be performed from the windows task manager?

A) view what application are running from in the background
B) delete a program from the harddrive
C) open a program
D) check recent CPU usaga

Answers

Could be wrong... but it's most likely D.

Task managers are used to monitoring which applications and background processes/ running and also to terminating a program that isn't responding.

The utility tool displays the status of all applications that are currently running.  It is a computer monitoring program included with Microsoft Windows.  This program is capable to include viewing running apps, in both backgrounds or currently open, checking CPU utilization, or opening a new program from the list of those you have installed.

Therefore, the answer is "Option B".

Learn more:

brainly.com/question/7162166

You can access decorative underlines and change their color through the ____ drop-down.

Answers

The answer is "underline gallery or underline drop-down". The user can access the decorative underlines and change the underline's color through the underline gallery. Underlines can be added for decoration purposes, to make your work look formal or creative.

explain briefly how the cooling mechanism implemented in fan less laptop

Answers

Fanless computers use a heat sink and taking the heat produced from the computer and dissipating heat. The heat sink is made of a highly heat conductive material such as aluminum. It is connected to the CPU with thermal paste to maximize the amount of heat transferred to it and then connects to the outside air most commonly in an area with many ridges to maximize air contact.

What best describes the way that businesses tend to represent themselves online?

a) They put an emphasis on the positive and downplay negative feedback.
b) They put equal emphasis on positive, negative, and neutral feedback.
c) They put an emphasis on the negative and downplay neutral feedback.
d) They put an emphasis on neutral feedback and downplay praise and criticism.

Answers

They put an emphasis on the positive and downplay negative feedback. So your answer is a. This is because businesses want to make themselves look good for the public image.

Hope this Helps



________ is a crime that uses mock (fake) sites to trick people into sharing information.

Answers

Phishing is a crime that uses mock (fake) sites to trick people into sharing information.

Answer: The correct answer is Pharming

A table cell contains how many pieces of data

Answers

Answer: One

Explanation: A table is simply rows and columns of data. The point where a row and column intersect is called a cell. A cell contains one piece of data, which can be in the form of text or graphics. For example, The Formatted Table shown contains three rows and four columns. The first row of the table contains titles. Formatting has been applied to help distinguish the titles from the data, and shading has been used to make it easier to read across a row of data. PF...

A grouping within a chart table used to store information or data is called a table cell. Vertical and horizontal rows of cells are used to group cells (columns of cells). Each cell includes data pertaining to the row and column titles with which it is aligned.

What table cell contains how many pieces of data?

A table contains rows and columns of data. A row and a column come together to form a cell. Each cell holds one piece of data, which could be in the form of text or images.

The Formatted Table, for instance, has three rows and four columns. The table's first row is made up of titles. The titles have been formatted to assist set them out from the data, and shading has been utilized to make a row of data easier to read. There are 32,767 possible characters in total for each cell.

Therefore, A table cell contains one pieces of data.

Learn more about table cell here:

https://brainly.com/question/8059827

#SPJ2

dot matrix and solid font printers are examples of

Answers

character printers is the answer

Dot matrix and solid font printers are examples of printing technology. Dot matrix printers are used for impact printing on continuous feed paper, while solid font printers are associated with high-quality digital printing.

Both dot matrix printers and solid font printers are examples of printing technology. Dot matrix printers create characters by striking pins against an ink ribbon, producing a series of dots that form text and images. They are known for their ability to print on multi-layer forms and continuous feed paper. Solid font printers, on the other hand, are usually associated with typeface in digital printing, referring to a specific style and weight of characters, though often confused with ‘typefaces’ which include multiple font designs in a single family.

Dot matrix printers are particularly popular for tasks needing duplicate forms, such as invoices and receipt printing. Whereas, solid font printers like laser and inkjet are used widely in both home and business environments for producing high-quality text and graphics swiftly.

In summary, both dot matrix and solid font printers play distinct roles in the evolution and application of printing technologies.

Theâ ______ is a large worldwide collection of networks that use a common protocol to communicate with one another.

a. local area network

b. personal area network

c. internet

d. wide area network

e. world wide web

Answers

LaN is the correct answer i believe

The internet (Option c) is the correct answer, as it is the large worldwide collection of networks using TCP/IP to communicate. This global system includes various types of networks linked by different technologies.

The internet supports numerous applications and services, including the World Wide Web, email, and file sharing.

The internet is a large worldwide collection of networks using the common protocol, TCP/IP, to communicate with each other. This global system of interconnected computer networks includes private, public, academic, business, and government networks, all linked together by various electronic, wireless, and optical networking technologies.The internet enables a wide range of information resources and services such as the inter-linked hypertext documents and applications of the World Wide Web, electronic mail, telephony, and file sharing, making it a crucial part of today's digital communication and information sharing infrastructure.

Therefore,The correct answer to the question is internet (Option c).

Which of the following statements about relays is correct? A. A relay is a type of rheostat. B. A normally closed relay closes a circuit when current is applied to the relay coil of wire. C. A relay is an electrical switch that works through electromagnetism. D. A normally open relay opens a circuit when current is applied to the relay coil of wire.

Answers

C. A relay is an electrical switch that works through electromagnetism. 

The statement about relay that is correct is a relay is an electrical switch that works through electromagnetism. The correct option is C.

What is a relay?

In a relay race, a team of four competitors runs equal predetermined lengths in a sprint race while passing a baton-like object to the following runner to continue the race. This event is performed at the Olympics and other World Athletics-sanctioned competitions.

Repeating what you've heard, or broadcasting a signal, message, or program on radio or television: I was the first to hear the news, and I then notified the others. Satellites transmitted television images of the fight all over the world.

Therefore, the correct option is C. A relay is an electrical switch that works through electromagnetism.

To learn more about the relay, refer to the link:

https://brainly.com/question/15274074

#SPJ2

When you select Insert and click on a shape the mouse pointer turns into a/an

A. double-headed arrow.
B. hand.
C. I-beam.
D. crosshairs.

Answers

Depending on the situation, the shape of the pointer may be an arrow, an I-beam, a hand, or an hourglass (Figure 5)

⇒The arrow pointer is displayed when the pointer is on a command or other selectable item. Click the pointer on the command to select it. Hover, don’t click, over any Ribbon command or icon to display a pop-up description.

⇒The I-beam pointer is displayed within a document. Move the I-beam with the mouse and then click to move the insertion point to that location.

⇒The hand pointer appears when pointing to a hyperlink, like that found in a help window displayed by the Tell Me box. When you click a link a browser window opens.

⇒The hourglass pointer is displayed to indicate that Word is working on an action.

The answer is C. I-beam

Which of the following describes what a manufacturing engineer does?

Answers

what's the following is there a b c d or is it just writing it out

A battery with an ampere l-hour rating of 200 (200Ah) will theoretically provide

Answer choices on picture

Answers

D. All of the above. Depending on how much current is being drawn, the charge will last longer.
1A * 200h = 200Ah
10A * 20h = 200Ah
200A* 1h = 200Ah

Please note that this would likely not be true in real life since some of the energy will be turned into heat as it is conductedd thrugh the wires etc. Especially for a large load of 200A

To move a file, you use the ____ command along with the source file name and destination name

Answers

To move a file, you use the mv command along with the source file name and destination name

Write a program that can convert an integer between 0 and 15 into hex number (including 0 and 15). the user enters an integer from the console and the program displays the corresponding hex number. if the user enters an integer out of range, the program displays a warning message about the invalid.

Answers

Range check what the user enters, if it's legit, a character array can be used.

The question involves writing a program that converts an integer in the 0-15 range to its hexadecimal representation, displaying a warning message for out-of-range inputs.

The student's question is about writing a program that converts an integer to a hexadecimal number. Hexadecimal is a base-16 number system commonly used in computing, which includes the digits 0 to 9 and the letters A to F to represent decimal values 10 to 15. If a user enters a number from 0 to 15, the program should display the corresponding hex number; any other input results in a warning.

Here's a simple program example written in Python:

user_input = int(input("Enter an integer between 0 and 15: "))
if 0 <= user_input <= 15:
   print("The hexadecimal representation is:", hex(user_input)[2:].upper())
else:
   print("Invalid input! Please enter a number between 0 and 15.")

Notice that we use the hex() function to convert the integer to hexadecimal and remove the initial '0x' by slicing the string. For numbers less than 10, the hexadecimal representation is the same as the decimal. For numbers 10 to 15, it will display A to F respectively.

Which plot element is typically the turning point and the most intense moment of the story

Answers

Answer: Climax is typically the turning point and most intense moment of a story
The climax is the most intense moment of the story because it is what the exposition and rising action lead to. It is then followed by the falling action and resolution, which can be considered the "end" of the story.

True or false? when intel places a sticker on computers showing their chip is inside, they are demonstrating their visible value.

Answers

It is true, it shows visible value 

Gabe wants to move text from one document to another document. He should _____.
A.)copy the text, paste the text, and open the new document
B.)highlight the text, select the cut command, move to the new document, make sure the cursor is in the correct location, and select the paste command
C.)select the save as command, navigate to the new document, and click save D.)highlight the text, open the new document, and press Ctrl and V

Answers

B.)highlight the text, select the cut command, move to the new document, make sure the cursor is in the correct location, and select the paste command 


hope this helps
B.

He should highlight the text, select the cut command, move to the new document, make sure the cursor is in the correct location, and select the paste command.


When creating a résumé, other experiences should be included only if they are relevant to the job objective.
True or False?

Answers

very true! why else would you put irrelevent info? hope this helped!

In creating a resume, it is very important to only include information related to the job objective that you are trying to aim. If you are applying to an administrative position, it is best to highlight any past experiences you have that emphasizes your ability to manage these type of tasks.

If you are applying to a sales role, it will be better to include any previous jobs or organizational experiences in your previous education institution that highlights your skills for the job.

Thus, the answer for the question is True.

How many bits are required to address a 1mx8 main memory if main memory is byte addressable?

Answers

Yes they will be. Hope this helps

A television camera is positioned 4000 ft from the base of a rocket launching pad. the angle of elevation of the camera has to change at the correct rate in order to keep the rocket in sight. also, the mechanism for focusing the camera has to take into account the increasing distance from the camera to the rising rocket. let's assume the rocket rises vertically and its speed is 800 ft/s when it has risen 3000 ft. (round your answers to three decimal places.)

Answers

The distance from the t.v. camera to the rocket increasing at Let be the distance from the camera to the rocket, and the height of the rocket. We have x*x =h*h +(4000)(4000) When h=3000 , x*x=(3000)(3000)+(4000)(4000) , which gives x= 5000 We are told that at that instant,dh/dt 800 ft/s So, at that instant 5000dx/dt =3000(800) and dx/dt=3000(800)/5000 =480 ft/s
Other Questions
Which process causes the easterlies to flow in the direction they do? A. movement of a convection cell B. even heating of the earth at all places C. solar wind D. Coriolis effect Where was thomas jefferson during the signing of the constitution? If farmers on the Great Plains had practiced crop rotation in the late 1800s and early 1900s, List the types of substances that most readily diffuse through a cell membrane How does the date of this article compare with the date on the new york journal and advertiser article? About the spanish-american war When moses' leadership of israel was challenged, how was moses vindicated? What's best? An adverb or an adjective? Mitali plays the guitar ______. Choose 1 answer: A skillful B skillfully How much work will be done on a 30kg object traveling at 20 m/s from the rest? Examine the two functions below. Use the equation and table given to answer the question below.Which of the following statements is true?A.Both functions have the same y-intercept.B.f(x) has a negative slope while g(x) has a positive slope.C.Both functions are linear functions.D.g(x) has a common ratio of 4. One atom of carbon _____. A.has four electron shells B.can bond with up to four other atoms C.forms a special shape called a tetrahedron D.is part of all inorganic compounds "Coined compounds" are words that A.are made up by writers to express an idea in a particularly concise or vivid way. B.accountants use. C.have numerical values. D.are trite expressions that college writers should avoid using. The Indian removal act opened up__ million acres of land in the south Select the pair of words that best expresses a relationship similar to that expressed in the pair below. retreat : advance Which statement is true about independent clauses? They are connected by a coordinating conjunction. They have a subject but do not have a predicate. They do not make complete sense on their own. They are never combined with a dependent clause. They always start with a subordinating conjunction. Which condition in a nebula would prevent nuclear fusion?A) the presence of nitrogen and carbonB) a decrease in the overall volume of gasesC) a core temperature of only ten thousand KelvinD) Physical contact between bare nuclei Analysts say visitors stay an average of how many seconds on any webpage?a. 1-2 secondsb. 45-60 secondsc. 5-15 secondsd. 10-20 seconds Find constants a and b in the function f(x)=axe^bx such that f(1/5)=1 and the function has a local maximum at x=1/5. 1. Kites: Birds of GloryAs a rule, raptors, or birds of prey, are among the most admired and adored birds in the world. From the California condor to the snowy owl, few birds compare to the tigers of the air: the great hunters whose beauty and skill have inspired art and literature for centuries. The most glorious feathers of the peacock or the vibrant plumage of a bunting cannot compete with the power of a peregrine falcon or the determination of an osprey. Included in this group of hunters, however, is one bird of prey that is little known but equally impressive. The kites of the world are generally smaller than most raptors, but just as astonishing in skill and grace as any other hunter of the skies.Most people think of paper or cloth structures flown with string from the ground when the word 'kite' is used. In addition to these popular toys, kite can also refer to a type of raptor. Kites have a small head, a short beak and long narrow wings and tail. Kites can be found all over the world in mostly warm regions. Kites live on a variety of preyfrom insects to small rodents or reptiles. Some kites eat only one kind of prey. Kites are generally masterful in the air and represent a group of birds that are among the most acrobatic of fliers.Two of the most familiar kites in the Southern United States are the swallow-tailed kite and the Mississippi kite. The Mississippi kite is rather plain to look at: a light brown and gray body with a buff or white colored head. But to watch a Mississippi kite fly is to watch a ballet in the air. These raptors eat primarily flying insects, so they do most of their hunting on the wing. As you might imagine, catching flying insects requires a great deal of agility and speed. If you are lucky enough to see one in flight, you will be amazed at the quick turns, graceful moves, and speedy pursuits of this bird. Look for them above large fields, especially during the summer.The swallow-tailed kite, also common in the South, is more easily identifiable and often seen flying over roads. With black wings and tail, white head and body, and a forked or swallow-like tail, this raptor is just as acrobatic as the Mississippi kite. Swallow-tailed kites like flying over highways in the summer as they can take advantage of the thermals, or columns of warmed air, that rise above the pavement. Once they have climbed to sufficient height, swallow-tails will glide, looking for snakes and reptiles and insects. They also eat small rodents, frogs, and other birds on occasion. Watching a swallow-tail fly is a lot like watching a gymnast perform a floor routine. Rarely flapping its wings, it uses its forked tail to make sharp turns, trace circles in the sky, or simply maintain a heading. Skilled, accomplished, and graceful, this bird is as entertaining as it is beautiful.Both kites are known to eat while flying, unlike most other birds of prey. This practice conserves energy and allows them to hunt almost continuously. While these kites are not listed as endangered, they are rare and in some states are listed as critical. Loss of habitat is the main reason for the decline. If you are lucky enough to see one, count yourself among the few. These magnificent birds are a sight you won't soon forget.Based on the text, how are raptors different from other types of birds? They are brightly colored and vibrant. They are powerful and skilled hunters. They are smaller and cuter. They eat insects and reptiles. Maximum rate at which the population of a given species can increase when there are no limits on its rate of growth. Based on the fuction of DNA polymerase explain why each part of the name DNA polymerase DNA, polymer, ase makes senceDNA:polymer:ase: Steam Workshop Downloader