1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ehidna [41]
4 years ago
5

The process by which a computer hosts several different operating systems is known as: virtualization cloud computing parallel c

omputing multiplexing normalization
Computers and Technology
1 answer:
GarryVolchara [31]4 years ago
5 0
I think it's actually virtualization. some computers use for example amd-v for that.
You might be interested in
ShellShock had the potential for an unauthorized user to gain access to a server. It affected many internet-facing services, whi
mina [271]

Answer: Windows

Explanation:

ShellShock: Also called Bashdoor, it is a security bug which is found in the Bash shell of operating system e.g. Unix. It allows the hacker to execute scripts and commands by gaining unauthorized access. This affects many machines, devices that use Bash. Servers like web servers are most affected as most of them run Unix based OS like OS X. Most vulnerable are those who use Unix or Linux operating systems.  

Microsoft Windows does not use Bash so it does not directly affect Windows os. For those who are using Windows PC, Windows phones and websites that are developed by MS software are non-vulnerable to ShellShock.

4 0
3 years ago
How many binary digits are in 10^100.
Basile [38]

Answer:

333 binary digits.

Explanation:

8 0
2 years ago
An “AI” (artificial intelligence) could be used in:
zhannawk [14.2K]
I would say D. But l may be incorrect. Al bots are not made for games, but are made for information.

Sorry l can't be much of help, but l do hope that I did help you out in a way.
8 0
3 years ago
Your manager has asked you to write a program that displays the percentage of males and female in your class. The program should
Blababa [14]

<u>Explanation:</u>

The program using <em>python programming language </em>would be:

First, we write the Input prompt.

<u>Input  prompt for the user</u>

number_of_males_in_class = int (input ('Enter the number of males: '))

number_of_females_in_class = int(input('Enter the number of females: '))

Next, we write the Process algorithm.

<u>Process  algorithm</u>

total_number_of_students_in_class = number_of_females_in_class + number_of_males

_in_class

percentage_of_males_in_class = number_of_males_in_class / total_number_of_students

_in_class

percentage_of_females_in_class = number_of_females / total_number_of_students

Finally, the Output process

<u>Output process</u>

print('Total number of males in class =', format(percentage_of_males_in_class, '.0%'))

print('Total number of females =', format(percentage_of_females_in_class, '.0%'))

7 0
4 years ago
A user reports that a file they shared out on their computer for another network user is not accessible to the third party. The
muminat

Answer:

i think it's going to be c

Explanation:

3 0
4 years ago
Other questions:
  • A network technician has configured a point-to-point interface on a router. Once the fiber optic cables have been run, though, t
    12·1 answer
  • Your brother is a video producer and is looking to buy some sort of new computing device. he needs a lot of memory and processin
    11·1 answer
  • Which one of the following is an example of hacktivism according to you and why?
    11·1 answer
  • Why is Abraham called the Father of Believers?
    6·1 answer
  • How does emotional awareness help you with non-verbal communication?
    13·2 answers
  • Which type of error occurred in the following lines of code?
    13·1 answer
  • Different between desktop application and web application ?​
    9·1 answer
  • Tuklasin<br>awain 2: Grapiko ng Pananagutan<br>Isulat sa graphic organizer pa​
    9·1 answer
  • In Subtractive empathy, the counselor responses gives back less (or distorts) than what the client has said. slightly add someth
    14·1 answer
  • Select one Layer 2 or wireless WAN technology presented in Lesson 3. Elaborate on its characteristics, pros and cons, and common
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!