1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
goldenfox [79]
3 years ago
9

what is it called when someone uses software to run multiple operating systems on one computer at the same time? A.functional vi

rtualization B.online virtualization C.operating system virtualization D.simulation
Computers and Technology
1 answer:
Ronch [10]3 years ago
8 0
The answer is C: Operating System Virtualization
You might be interested in
Which of the following CANNOT incorporate animation
Anarel [89]
Lost the following …
8 0
2 years ago
A network administrator is planning redundant devices and cabling in a switched network to support high availability. Which bene
a_sh-v [17]

Answer:

Redundant paths can be available without causing logical Layer 2 loops.

Explanation:

  • Spanning Tree Protocol is used to allow redundancy in the Layer 2 switched networks without creating cycles/circles also called loops.
  • These loops are called physical loops.
  • When two parts of the switched network are connected via two or more Layer 2 switches this result in a loop.
  • This affects the performance of the network as the result of broadcast packets flooding.
  • STP puts one port of the switch to forward mode and the rest of the ports within the same part of the network to the blocking mode to avoid broadcast packet flooding. STP puts all the ports that are allowing redundant paths to block mode and the one port that is left after this is placed in forward mode.
  • Spanning Tree Algorithm is used by STP to determine the optimal path  of switch to the network.
  • Bridge Protocol Data Units are used to share the information about the optimal path determined by the spanning tree algorithm with other switches.
  • This information helps STP to eliminate the redundant paths.
  • So this is how STP tracks all the links in the switched network and eliminates redundant loops by allowing only one active path to the destination while blocking all other paths.
7 0
3 years ago
Which devices are managed through device management?
Ratling [72]
Answer:
computers and Mobile phones ( including game consoles and tablets) are managed through device management
Explanation:
Device management includes a type of security software used to monitor,secure and manage systems such as mobile phones computer laptops and desktops, Tablets and smart televisions as well as Game consoles. It as well involves the management,operation and maintenance of the physical aspect of the systems from external threats/intruders
Anti virus software is an example of a device management software used to protect systems from malware, by detecting and removing them and also by preventing them.
Firewall is a complete device management tool because it detects and prevents intruders and virus from penetrating the system software
7 0
2 years ago
True or false? (a) Main memory is volatile. (b) Main memory is accessed sequentially. (c) Disk memory is volatile. (d) Disk memo
allochka39001 [22]

Answer:

The answer to your question is true

5 0
3 years ago
Becca is working on a program that will store data. The program will need quick access to data and data persistence is not
STALIN [3.7K]

Answer:

in memory

Explanation:

A database refers to a collection of data that is organized and stored in a computer system.

Flash memory is a non-volatile memory chip that helps to transfer data from a personal computer (PC) to a digital device.

A flat file comprises a single table of data.

Becca is working on a program that will store data such that the program will need quick access to data and data persistence is not  important.

Therefore,

data should be stored in memory.

5 0
2 years ago
Other questions:
  • If you delete an imessage does the other person see it
    12·1 answer
  • List five things that could cause premature bearing failure
    11·1 answer
  • There are several factors that can substantially affect the consumer search process. Match the factor with an example of how the
    5·1 answer
  • Mrs. Jackson wrote a newsletter to the customers of her housecleaning business that included some organizational tips they could
    8·2 answers
  • _____________ data is what is translated to digital format so it can be stored in a computer.
    10·1 answer
  • Once a virus has been removed by your anti-virus program, all traces of it are gone from your computer.
    9·1 answer
  • What are informational sessions?
    15·1 answer
  • Which country was the first in the world to launch a mass media campaign in response to population growth?
    14·1 answer
  • What's the maximum number of ad extensions that can show for a particular query or device at any given time?
    13·1 answer
  • Out put of Print (3**2*2)
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!