1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andreas93 [3]
3 years ago
7

A system administrator needs to create a high-performance SQL server. What type of disk configuration will allow the administrat

or to connect an offline physical disk that is connected to the host machine to a VM to maximize a VM's performance?
Computers and Technology
1 answer:
Studentka2010 [4]3 years ago
4 0

Answer:

Pass-through disk

Explanation:

Pass-through disk configuration will allow the administrator to connect an offline physical disk that is connected to the host machine to a VM to maximize a VM's performance.

VMs access a physical hard disk by way of a "pass-through disk," a special virtual disk that directly accesses the physical disk if it is made exclusively available to the VM.

A pass-through disk must be offline in the parent partition of the Hyper-V server.

You might be interested in
Manuel owns a small business. He needs to calculate the amount each employee owes in Federal taxes. Manuel should
liraira [26]
I think a database because if he’s calculating then he won’t need a printer or email
6 0
3 years ago
Read 2 more answers
A(n) _________ is any system resource that is placed onto a functional system but has no normal use for that system. If it attra
Kisachek [45]

Answer:

Honeytoken

Explanation:

Honeytokens (aka honey traps or honeypots) may be described as bogus or dummy IT resources which are created or placed in a system or network for the sole purpose of attracting the attention of cyber-criminals and being attacked. These might be servers, applications, complete systems or datasets which are placed online (via the public internet, or a public-facing gateway to a private network), in order to attract cyber-attackers.

Honeytokens may be specifically defined as pieces of data which on the surface look attractive to potential attackers, but actually have no real value – at least, not to the attacker. For the owners of the tokens (i.e. the people who set the trap), they can be of great value, as they contain digital information which is monitored as an indicator of tampering or digital theft.

8 0
3 years ago
Write the line of code to calculate the area of a circle with radius 3 and store it in a variable called
zloy xaker [14]

Answer:

area = 2.14 * 3 ** 2

Explanation:

No clue what language you use but this should be pretty universal. To find the area of a circle you use pi(r) ^ 2 or pi times radius squared

\pi r^{2}

In python it looks like this:

>>> area = 3.14 * 3 ** 2

>>> print(area)

28.26<em> <Printed text</em>

3 0
3 years ago
An individualized course plan for the 4 years of
spin [16.1K]

Answer:

.....

Explanation:

8 0
3 years ago
Read 2 more answers
Data with values that change continuously or smoothly over time is known as:
Alexeev081 [22]

Answer:

A.  \:  \boxed{analog  \: data}

5 0
3 years ago
Read 2 more answers
Other questions:
  • Achieving a degree in computer forensics, information technology, or even information systems can provide a strong foundation in
    11·1 answer
  • An attacker compromises the Washington Post's web server and proceeds to modify the homepage slightly by inserting a 1x1 pixel i
    12·1 answer
  • What can search the internet and select elements based on important words
    10·1 answer
  • Technician A says that as volume decreases, pressure increases. Technician B says that as temperature increases, pressure decrea
    15·2 answers
  • What would a digitizing application create?
    13·2 answers
  • when files on storage are scattered throughout different disks or different parts of a disk, what is it called
    10·1 answer
  • What is the best stratiget to avoid paying intrest in your credit cared
    13·1 answer
  • In this exercise, you are asking the user to set a alpha numeric password for any website. Put some conditions.
    8·1 answer
  • Please help with question
    14·1 answer
  • True or False? The background color block should be inserted after all the images are added.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!