1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pickupchik [31]
2 years ago
12

What are the benefits and drawbacks of a desktop utilising virtualisation and a server?

Computers and Technology
1 answer:
Sholpan [36]2 years ago
6 0

•Cons of Virtualization. High Initial Investment. Data Can be at Risk. Quick Scalability is a Challenge. Performance Witnesses a Dip.

•Pros of Virtualization. Uses Hardware Efficiently. Available at all Times. Recovery is Easy. Quick and Easy Setup. Cloud Migration is Easier.

<h2>Mark as brainlest answer!!!!!</h2>
You might be interested in
Just help :(((((((((((((((((((((((((((((((((((
saveliy_v [14]

Answer:

I am sure the answer is A

Explanation:

As you can see from the graph, the first time they pumped air, the numbers were 6, 1.2, and 2. Once they start pumping the numbers decrease. Therefore, I think the answer is A. It went to 5.7, 4, and 2 from 6, 1.2, and 2.1.

5 0
3 years ago
Off topic lol but does anyone know of a free app that lets you track family and friends like their location? Thx
prohojiy [21]

Answer:Life360 has a free version and a paid

Explanation:Life360 let’s you track family by placing them in “family circles” and then allows you to track their location once they accept the invite to the circle, you May also place specific areas that it will alert them entering and exiting.

4 0
4 years ago
Read 2 more answers
Angela works for an identity protection company that maintains large amounts of sensitive customer information such as usernames
aksik [14]

Answer: (B) An insider

Explanation:

 According to the question, an Angela is an insider as she maintain all the sensitive and confidential information of the customer like the password, username,SSN (Social security number) and the personal information.

Angela and her co-worker has the right for using the customer sensitive information and data. An insider is the person who keeps all the sensitive information of the organization or company.

5 0
3 years ago
In the scenario below, select the evaluation factor that is most important.
jasenka [17]

Answer:

A. Connectivity

Explanation:

I just answered this question.

4 0
2 years ago
a solid state drive is a removable flash memory device that you insert and remove from a slot in a computer, mobile device, or c
yulyashka [42]
It is true, Because all the the drives or memories which doesn't have a plates spinning like hard disk are called solid state drives.
4 0
3 years ago
Other questions:
  • You’ve been hired to help with installing cable at a new office building for the local branch of the Social Security Administrat
    14·1 answer
  • Mark had been a resident of Larchmont for 17 years, and local folks thought of him as a solid citizen. "In this sentence, the wo
    7·2 answers
  • Consider a method defined with the header:
    13·1 answer
  • You are a network security administrator for a bank and you have noticed that an attacker has exploited a flaw in OpenSSL and fo
    9·1 answer
  • Which output will be displayed by the following program?
    5·2 answers
  • Lucy wants to develop a web page to display her profile. She wants to just start with a basic page that lists her accomplishment
    13·1 answer
  • The signature area in a cover letter includes the sender's first and last name, followed by his/her job title (if applicable). *
    13·1 answer
  • The ability to understand a person's needs or intentions in the workplace is demonstrating
    5·1 answer
  • Think about the five steps to writing an algorithm. Why is each step necessary?
    6·2 answers
  • Computing devices translate digital to analog information in order to process the information
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!