1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pickupchik [31]
2 years ago
12

What are the benefits and drawbacks of a desktop utilising virtualisation and a server?

Computers and Technology
1 answer:
Sholpan [36]2 years ago
6 0

•Cons of Virtualization. High Initial Investment. Data Can be at Risk. Quick Scalability is a Challenge. Performance Witnesses a Dip.

•Pros of Virtualization. Uses Hardware Efficiently. Available at all Times. Recovery is Easy. Quick and Easy Setup. Cloud Migration is Easier.

<h2>Mark as brainlest answer!!!!!</h2>
You might be interested in
SNMP is a protocol used to query hosts, servers, and devices about performance or health status data. This protocol has long bee
masha68 [24]

Answer:

b. It uses community string that is transmitted in clear text.

d. It is used by all network devices on the market.

Explanation:

SNMP is an acronym for Simple Network Management Protocol and it is a standard protocol which allows network administrators to manage network devices and client computers remotely.

SNMP is a protocol used to query hosts, servers, and devices about performance or health status data. This protocol has long been used by hackers to gather great amount of information about remote hosts.

The SNMP agent on a network device such as a router authenticates any SNMP Get requests that are being received from the network management software (NMS) using either the read-write or read-only community string.

The features which makes this possible are;

I. It uses community string that is transmitted in clear text.

II. It is used by all network devices on the market.

6 0
2 years ago
HELP ME PLEASEEEE
GalinKa [24]

Answer:

hey look I don't think anyones doing a full on essay for 5 points

Explanation:

i could for a bit more

8 0
3 years ago
Find the smallest value of n such that LCM of n is 15 is 45​
raketka [301]

Answer:

n=9

Explanation:

LCM(n,15)=45

LCM(9,15)=45

8 0
2 years ago
Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integer
meriva

Answer:

package b4;

import java.util.Scanner;

public class TresholdValue {

public static void main(String[] args) {

 // Create an object of the Scanner class to allow for user's input

 Scanner input = new Scanner(System.in);

 // Create a prompt to allow users to enter the set of integers

 System.out.println("Please enter the set of integers, each followed by a space : ");

 // Get the first integer from the set of inputs.

 // Parse the input and convert it into an integer

 // by using the Integer.parseInt() method.

 // Store the result in an integer variable.

 int first = Integer.parseInt(input.next());

 // Create an integer array to hold the other numbers (first number excluded).

 // The array should have a length equal in value to the first number in the set.

 // This has been stored in a variable called "first".

 int[] intarray = new int[first];

 // Create a while loop that populate the intarray with the set of numbers

 int i = 0;

 while (input.hasNext() && i < intarray.length) {

  intarray[i] = Integer.parseInt(input.next());

  i++;

 }

 // Get the last value (threshold) from the intarray.

 // The threshold value is the last element in the array.

 int lastvalue = intarray[intarray.length - 1];

 // Create a prompt before displaying the set of values that are less than or

 // equal to the threshold value.

 System.out.println("Values less than or equal to the threshold value (" + lastvalue + ") are : ");

 // Create a loop to cycle through the array.

 // At each cycle, the element is checked if or not it is less than or equal to

 // the threshold value.

 // If it is less than or equal to, the number is printed.

 for (int j = 0; j < intarray.length - 1; j++) {

  if (intarray[j] <= lastvalue) {

   System.out.print(intarray[j] + " ");

  }

 }

 // (Optional) Close the Scanner object to prevent resource leak

 input.close();

}

}

Explanation:

The program has been written in Java. The source code file has been attached to this response. Please download it for better readability. The code contains comments explaining what goes on on each segment of the code.

Hope this helps!

Download java
3 0
2 years ago
Read 2 more answers
A system that monitors network use for potential hacking attempts and takes preventative action to block, isolate, or identify a
yarga [219]

Answer:

Intrusion detection systems

Explanation:

Intrusion detection systems (IDS) are systems designed to monitor network use for any potential hacking or suspicious activity and then take measures to issue alerts upon discovery of such activity. IDS are applications that help secure a network or system from policy breaching or other activities that may be harmful to the network. There are four major types of IDS and they are: Perimeter Intrusion Detection System (PIDS) , Network intrusion detection system (NIDS), VM based Intrusion Detection System (VMIDS), and Host-based intrusion detection system (HIDS) .

7 0
3 years ago
Other questions:
  • Desktop, laptop, and tablet computers, and mobile devices are classified as _______.
    7·1 answer
  • What is the day adopt me launched its game on roblox?​
    14·2 answers
  • Is it possible to make teleportation with a fusion device
    15·1 answer
  • Which network component blocks status?
    9·1 answer
  • Exercise 4: Bring in program grades.cpp and grades.txt from the Lab 10 folder. Fill in the code in bold so that the data is prop
    12·1 answer
  • VEE Physics 2006 E.C
    7·1 answer
  • Write the correct statements for the above logic and syntax errors in program below.
    12·1 answer
  • What is the output of the following code:
    12·1 answer
  • What is the meaning of url <br>​
    7·1 answer
  • What do hard disk drive use to store data
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!