1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
faltersainse [42]
3 years ago
6

A _______________ hypervisor improves the performance of virtualization by removing the underlying operating system.

Computers and Technology
1 answer:
elena-14-01-66 [18.8K]3 years ago
6 0
Type 1 hypervisor. also referred to as a
Bare-metal hypervisor
You might be interested in
WILL UPVOTE ALL plz
OverLord2011 [107]
D-ash is the answer.
8 0
3 years ago
Finish the code where it says //YOUR CODE HERE
victus00 [196]

Answer:This is basically the issue of permutations and calculations. It revolves around the best depiction of accuracy.

Explanation: It hitherto explains the nitty-gritty of our day-to-day activities in connection with our social interactions and securities...

6 0
3 years ago
Please submit the following assignment prior to Sunday at 11:59 pm. Eastern time: 1. Using a Microsoft Word document, please dis
GenaCL600 [577]

Answer:

Answer explained

Explanation:

United States of America versus Ross Ulbrecht :-

The Fourth Amendment guards against unreasonable searches and seizures by requiring (with limited exceptions) that government agents first obtain a warrant before they go snooping around or confiscating someone’s property. But what exactly does this mean in the modern world of smart phones, wi-fi, and extended Socratic dialogues with Siri? If the New York-based U.S. Court of Appeals for the Second Circuit is to be believed, it means that the government can monitor and collect your internet traffic if this information is merely “likely” to be “relevant” to an ongoing criminal investigation.

That is exactly what happened to Ross Ulbricht, the creator of a website known as “Silk Road,” which enabled users to anonymously buy and sell goods and services. In the course of an investigation into illegal activities associated with the website, the government obtained five “pen/trap” orders authorizing law enforcement to collect IP (internet protocol) addresses for any internet traffic going to or from Ulbricht’s wireless router and other electronic devices. These orders were obtained in lieu of a warrant under a statutory “relevance” standard that falls well short of the Fourth Amendment’s requirement for probable cause.

How could this standard possibly not be constitutionally insufficient? The Second Circuit relied on the “third party doctrine,” ruling that there was no Fourth Amendment issue because users voluntarily conveyed their information to ISPs (internet service providers) and third-party servers, and thus assumed the risk that it would later be turned over without their permission or knowledge. This doctrine, which was developed in the days of pay phones and file cabinets, cannot be fairly extended to online activity given that internet access is—for all intents and purposes—a necessity of modern life for any functioning member of society. Recognizing this simple fact undermines any claim that users have somehow assumed the risk of disclosure to the government, which would have assumed that these users had any real choice in the matter to begin with.

The court also reasoned that because pen/trap devices only reveal IP addresses associated with the user’s online browsing, the collected information doesn’t count as “content” worthy of protection—despite the direct correlation between individual IP addresses and websites, along with the ample information that can be gleaned from knowledge of an individual’s browsing history. The court seemed to conclude that there was no content revealed because an IP address only uncovers the website visited rather than any individual webpage within that site. This superficial approach utterly ignores digital reality.

Finally, the court failed to recognize that the statute authorizing pen/trap data seizure imposes virtually no limits on government attorneys’ discretion. These orders are exceedingly broad in scope and available to nearly any government agency conducting a criminal investigation. Worse still, the court’s role in approving the orders is merely ministerial, with the statute mandating that “the court shall enter an ex parte order authorizing the installation” of these devices.

Because the Second Circuit has stretched both the third-party doctrine and the content/non-content distinction far beyond their logical limitations, Cato—along with the Reason Foundation, Competitive Enterprise Institute, and R Street Institute—has filed an amicus brief asking the Supreme Court to take this case and firmly establish that the internet doesn’t constitute some sort of Constitution-free zone.

5 0
3 years ago
A large computer software firm promised a client that it could deliver a new operating system on a tight deadline and put Keith
daser333 [38]

Answer:

The correct option is b. He is a good communicator , he is a motivator, he can keep a secret and lastly he can quickly learn about operating systems.

Explanation:

Based on the information given what best explains why Keith was in charge of the project and was qualified for such a position was that he has a great Communication skills because he communicate and relate with customers in a great ways and he is a good listener.

Secondly he posses confidentiality skills which is a very important skills for a business or an organization.

Lastly he his a fast learner who has the ability to quickly learn and know about everything that has to do with an operating system which is the reason why he was qualified to be in such position and was put in charge of the project based on all the important skills mentioned above that he possess.

5 0
3 years ago
Read 2 more answers
You are the CISO of a company and you need to create logging policies. Please review NIST SP800-92, specifically sections 4–3 th
Kitty [74]

<u>The various systems on a network and develop a logging policy based on the information in the aforementioned sections:</u>

Cisco is router, which is physical device appliance where placed in LAN OR WAN for connecting workstation or desktop or laptop of other offices in organization.

It is a security device and purpose to make organization to access or connected to end use of other networks.

Basically there routers are used ISDN LINE, LEASE LINE or VPN for connecting varies WAN

Purpose of keeping the logging polices to do further analysis how the network packets or traffic is executed and passed different tcpip address. If case any hackers or packet loss the network administrator will do further analysis and protect the system form packet loss or from hackers.  Keeping network logs is policy driven. So network administrator keeps logs for no. of days.

Some network administration export log and keep as reference.

4 0
4 years ago
Other questions:
  • Changeover means that ____. (select all that apply)
    7·2 answers
  • When do on loop conditions happen? (1 point)
    5·1 answer
  • Help fast pls will mark brainliest - What model is best to use for large complex accounting software that can be broken down int
    6·1 answer
  • Disadvantages of Batch<br>operation system​
    5·1 answer
  • On the Format tab, which group allows you to select a different font for a chart?
    7·2 answers
  • ---------- is a flat fish which swims using its huge side fins.​
    7·1 answer
  • One advantage of a PAN​
    10·2 answers
  • Which tab contains the Spell Check feature?
    7·2 answers
  • I don't want my large video files using up all my hard drive space . can i archive my videos in on dvds or blu rays?
    7·1 answer
  • In the context of in-house software development options, a firm that enhances a commercial package by adding custom features and
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!