1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
leonid [27]
2 years ago
10

What is an advantage of using a dynamic hard drive in a vm?

Computers and Technology
1 answer:
Nikolay [14]2 years ago
7 0

The advantage of using a dynamic hard drive in a vm is that the space on the physical computer hard drive us used only when it's needed.

<h3>What is a virtual machine?</h3>

It should be noted that a virtual machine simply means a machine that allows one to run an operating system on your desktop.

The advantage of using a dynamic hard drive in a virtual machine is that the space on the physical computer hard drive us used only when it's needed.

Learn more about virtual machine on;

brainly.com/question/19743226

#SPJ12

You might be interested in
Your organization has started receiving phishing emails. You suspect that an attacker is attempting to find an employee workstat
EastWind [94]

Answer:

E). User education and training.

Explanation:

In the context of network security, the most significant aspect of ensuring security from workstation cyberattacks would be 'education, as well as, training of the users.' <u>If the employee users are educated well regarding the probable threats and attacks along with the necessary safety measures to be adopted and trained adequately to use the system appropriately so that the sensitive information cannot be leaked</u> while working on the workstation and no networks could be compromised. Thus, <u>option E</u> is the correct answer.

3 0
3 years ago
What materials where used to make the first gps
8090 [49]
You need a radio transmitter that transmits some kind of radio wave signal, and an array of satelites to compare the postion to other parts of the world.
Hope this helps!
8 0
3 years ago
1. Create an anonymous block that will count the number of students whose gr_t1 grade is higher than the average on gr_t1 and di
sweet [91]

Answer:

The Anonymous Block will be:

 1 DECLARE

 2  

 3  lv_grade_row grade%rowtype;

 4  lv_gr_avg grade.gr_t1%type;

 5  lv_std_name varchar2(80);

 6  cursor cursor_grade is select * from grade;

 7

 8  BEGIN

 9

10  select avg(gr_t1) INTO lv_gr_avg from grade;

11  open cursor_grade;

12  fetch cursor_grade INTO lv_grade_row;

13

14  while cursor_grade%found loop

15

16  if

17  lv_grade_row.gr_t1>lv_gr_avg then lv_std_name :=  

lv_grade_row.std_fname|| ' ' ||lv_grade_row.std_lname|| ' ' ||

lv_grade_row.gr_t1;

18  dbms_output.put_line(lv_std_name);

19

20  end if;

21  fetch cursor_grade into lv_grade_row;

22

Explanation:

4 0
3 years ago
If you are logged on to Windows Live Messenger, why would you be unable to engage
Mazyrski [523]

Answer:

I'm not sure i haven't had that problem

Explanation:

7 0
3 years ago
When creating a report, you should consider all of the following EXCEPT (Points : 4) who will use the report
barxatty [35]

Answer: Number of records input into the report

Explanation: Creating the report includes the factors like maintaining the record, updating data, designing content etc. The content of the report has the parameter to maintain so that it can be up to date and can be efficient to the user.

The parameters that are considered while making the report are confidential content should be specially considered ,user of the report , purpose of the report,etc. The only factor that is not accountable is input.There can be number of inputs that can be entered in the report because they have huge sheet space.

8 0
3 years ago
Other questions:
  • An intranet is a way for a company or organization to protect copyrighted and other important information?
    15·2 answers
  • Write a program to add two number marie simulator.
    15·1 answer
  • How do keystroke dynamics determine whether to authenticate an individual or not?
    14·1 answer
  • If you cause a car accident, which type of insurance will require you to pay the least out of pocket?
    5·2 answers
  • Explain why a document created by word processing software is stored as a binary file.​
    14·1 answer
  • Which is a form of cyber bullying??
    9·1 answer
  • When you are almost done with your soup and want to get at the last little bit, how should you do this 2
    5·1 answer
  • Why are formulas used in spreadsheets?
    10·1 answer
  • 6
    14·1 answer
  • Computer is a major source of informarion why​
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!