in Education by
Which one of the following is a Stripping technique? (a) Byte level stripping (b) Raid level stripping (c) Disk level stripping (d) Block level stripping The question was posed to me during an online exam. My doubt stems from RAID topic in chapter Storage and File Structures of Database Management Select the correct answer from above options Interview Questions and Answers, Database Interview Questions and Answers for Freshers and Experience

1 Answer

0 votes
by
Correct answer is (d) Block level stripping For explanation: Block-level striping stripes blocks across multiple disks. It treats the array of disks as a single large disk, and it gives blocks logical numbers.

Related questions

0 votes
    The RAID level which mirroring is done along with stripping is (a) RAID 1+0 (b) RAID 0 (c) ... and Answers, Database Interview Questions and Answers for Freshers and Experience...
asked Oct 11, 2021 in Education by JackTerrance
0 votes
    I am working on an Angular 6 application and I would like to read the id of an item that resides ... JavaScript Questions for Interview, JavaScript MCQ (Multiple Choice Questions)...
asked Apr 21, 2022 in Education by JackTerrance
0 votes
    Which one of the following refers to the technique used for verifying the integrity of the message? Digital signature Decryption algorithm Protocol Message Digest...
asked Mar 4, 2021 in Technology by JackTerrance
0 votes
    With reference to satellite communication, the anti-jamming technique preferred is select one: a. Key leverage ... spectrum modulation Select the correct answer from above options...
asked Dec 1, 2021 in Education by JackTerrance
0 votes
    ___________ is the technique to obtain permission from a company for using, manufacturing & selling one or more products ... questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 3, 2021 in Education by JackTerrance
0 votes
    Which of the following technique/techniques is/are used by Einstein on Data to turn them into insights? A. Automate B. Recommend C. Discover D. Predict E. All the options...
asked Nov 1, 2022 in Education by JackTerrance
0 votes
    Which of the following refers to a technique used to gain unauthorized access to a computer system or network? (i ... (iv) hacking Select the correct answer from above options...
asked Dec 24, 2021 in Education by JackTerrance
0 votes
    Which of the following is not a reconnaissance tool or technique for information gathering? (a) Hping (b) NMAP (c ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Which of the following is the technique used to look for information in trash or around dustbin container? (a) ... Security questions and answers pdf, mcq on Cyber Security pdf,...
asked Nov 5, 2021 in Education by JackTerrance
0 votes
    Which of the following is a non-technical type of intrusion or attack technique? (a) Reverse Engineering (b ... for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Nov 1, 2021 in Education by JackTerrance
0 votes
    Which of the following is not an example of web application hacking technique? (a) LDAP injection (b) ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Which of the following is not a technique used by spanners? (a) Spoofing the domain (b) Sending attached ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Which of the following is not an anti-spam technique? (a) Signature-based content filtering (b) DNS ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Which of the following is not an anti-spam technique? (a) Reputation control (b) Sender policy framework ( ... -for-Cyber Security:,Cyber Security-Jobs:,Cyber Security Applications...
asked Oct 31, 2021 in Education by JackTerrance
0 votes
    Which of the following data mining technique is used to uncover patterns in data? (a) Data bagging (b) ... questions and answers pdf, Data Science interview questions for beginners...
asked Oct 31, 2021 in Education by JackTerrance
...