How long will it take to perform a full backup of the data

Assignment Help Basic Computer Science
Reference no: EM131214029

Assume that a database contains approximately 500 gigabytes (GB) of data that is required to be backed up daily.

(a) Given a tape backup device based on LTO-2 technology (200 GB per tape and 24 megabytes per second (MB/s) transfer rate), how long will it take to perform a full backup of the data?

(b) Research the latest LTO-4 tape format (Hewlett-Packard and Tandberg Data are two possible vendors) and describe the difference in backup times that could be achieved using this new technology.

(c) Current Serial Attached SCSI (SAS) and Serial ATA (SATA) disk drives transfer data at up to 300 MB/s. Describe the difference in backup times that could be achieved using one of the technologies for ‘disk-to-disk' backup.

Reference no: EM131214029

Questions Cloud

What if we roll more than 2 dice : Suppose we roll three dice and observe the sum. What is the most likely sum and what is the probability of its occurrence?
Create a formal code of ethics for it : Suppose you have just joined a large financial services company as the head of IT and are asked to create a formal code of ethics for IT. What steps would you take to research this, and what resources would you consider?
Sign of coming recession : An inverted yield curve occurs when short-term interest rates are higher than long-term rates. It is often said that an inverted yield curve is a sign of coming recession. Why do you think the view makes sense? Why not?
Purchasing treasury bonds : An investor was considering purchasing Treasury bonds. Five-year bonds had a 3% yield and 2-year bonds had 2% yield. The investor chose the 5-year bond at a par price for a 3% yield.
How long will it take to perform a full backup of the data : Given a tape backup device based on LTO-2 technology (200 GB per tape and 24 megabytes per second (MB/s) transfer rate), how long will it take to perform a full backup of the data?
What is probability that at least one of diodes is defective : If two diodes are selected at random without replacement, what is the probability that at least one of these diodes is defective?
Define ways that preschool policy on compassionate treatment : You have been learning about key areas of growth and development related to prosocial behaviors. Describe three ways that a preschool policy on compassionate treatment and care of animals that visit or live in classrooms would foster this growth a..
What are the functions of working capital : 1. What are the functions of working capital? 2. What is concentration banking?
What is the probability that first is red and second blue : What is the probability of selecting a white ball on the second draw if the first ball is replaced before the second is selected?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Equivalent in a real cpu

He can do this by writing the value on a piece of paper and holding it until he retrieves the second address. The equivalent in a real CPU might be called the intermediate address register, or IAR.

  Identify five different it systems

Identify five different IT systems that have affected business in the past few years. For each system, briefly note the following: · A name for the system

  Implement in gui

Take one of the items in the following list and describe what it means. State why it is important. Describe how you would implement it in your GUI and describe what someone might do if he or she was ignoring the concept that you are discussing. Th..

  What is the maximum file size supported by this system

Assuming no information other than that the file inode is already in main memory, how many disk accesses are required to access the byte in position 13,423,956?

  Design a small network

In a Word document answer the question: How many Point-to-Point serial links could be assigned from this address? Also, list each subnet, and host addresses for each.

  Socrates noted that no man does evil intentionally

1.) Socrates noted that no man does evil intentionally. In modern society, hackers and identity thieves have become the scourge of working on the world wide web. How do the actions of cyberthieves fit into Socrates school of thought? What motivates t..

  Problem fit within the environmental context

How does the problem fit within the environmental context? Prepare a short report that clearly and fully defines the research problem for your product.

  Create a customer experience strategy

Include components of customer service model reognized within your text. How would you use them to create a customer experience strategy?

  Your first program will require the use of static methods

Your first program will require the use of static methods and for loops

  The organization code of ethics

The organization  code of ethics?

  Determine if a string is a palindrome

Using the stack and queue class, determine if a string is a palindrome. A palindrome is a string (empty to many sentences) that reads the same forwards and backwards.

  Write an equation for the problem

write an equation for the problem. then use the equation to answer the question.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd