1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sergeinik [125]
3 years ago
15

Computer hardware had been designed to run a single operating system and a single app, leaving computers vastly underutilized. o

ne solution to optimizing the use of computing resources is to use one physical machine and specialized software to create multiple ______.
Computers and Technology
1 answer:
leva [86]3 years ago
4 0
Answer is Multiple Virtual Machines

Virtualization can be thought of multiple OS allowed to share hardware at the same time using specialized Virtualization software. It enables several virtual machines to run on one physical machine. Each virtual machine will end up sharing resources of that single computer

 

You might be interested in
Will mark brainliest! What does this code do? What kind of code is this called?
gavmur [86]

Answer:

lol u can barly call this a code

Explanation:

its just a type error code i think

3 0
3 years ago
Write a Python program that has subprograms nested four deep and in which each nested subprogram references local variables, var
Juliette [100K]

Answer:

Check the explanation

Explanation:

CODE:

global_var = "global" #accessible to all functions

def level0():

level0_var = "level 0" #accessible to level 0,1,2,3

print();

print("Level 0 function:")

print("global variable: ",global_var)

print("local variable 0: ",level0_var)

def level1():

print();

print("Level 1 function:")

level1_var = "level 1" ##accessible to level 1,2,3

print("global variable: ",global_var)

print("local variable 0: ",level0_var)

print("local variable 1: ",level1_var)

def level2():

print();

print("Level 2 function:")

level2_var = "level 2" #accessible to level 2,3

print("global variable: ",global_var)

print("local variable 0: ",level0_var)

print("local variable 1: ",level1_var)

print("local variable 2: ",level2_var)

def level3():

print();

print("Level 3 function:")

level3_var = "level 3" #accessible to level 3

print("global variable: ",global_var)

print("local variable 0: ",level0_var)

print("local variable 1: ",level1_var)

print("local variable 2: ",level2_var)

print("local variable 3: ",level3_var)

level3()

level2()

level1()

level0()

Kindly check the attached image below to see the output  (indentations are important):

6 0
4 years ago
List the different generation of computers with its main component​
Dennis_Churaev [7]

Answer:

1940 – 1956:  First Generation

1956 – 1963: Second Generation

1964 – 1971: Third Generation

1972 – 2010: Fourth Generation

2010-  : (Present )Fifth Generation

Explanation:

  1. First Generation Computers (1940-1956):In this Generation the main component of computers were Vacuum Tubes.
  2. Second Generation Computers (1956-1963):In this generation the main component of computers were Transistors.
  3. Third Generation Computers (1964-1971):In this generation the main component of computers were Integrated Circuits.
  4. Fourth Generation Computers (1972-2010):In this generation the main component of computers were Microprocessor
  5. Fifth Generation (2010-Present):In this generation the main component of computers is Artificial Intelligence
4 0
3 years ago
The technique helps you explore possible risks by providing access to risk areas identified in the past. It also provides the so
Elza [17]

Answer:

The technique helps you explore possible risks by providing access to risk areas identified in the past is explained below in details.

Explanation:

Risk administration commences with the system of classifying risks. In this method, we examine future developments or circumstances that may influence our understanding and capacity to accomplish our aims. Risk identification incorporates estimating out where, when, how, and why such situations may happen.

7 0
3 years ago
A wireless mesh network with 17 computers would need _______________ connections.
malfutka [58]
Oneeee hundreeeed and thirdy six
4 0
4 years ago
Other questions:
  • Create and test an HTML document that describes nested ordered lists of cars. The outer list must have three entries: compact, m
    7·1 answer
  • Which of the instances below is an example of a Trojan horse? Question 2 options: a) An attachment in an email that is really a
    8·2 answers
  • Write about the future of Reliability and Security in Software Engineering.
    13·1 answer
  • What specific tool allows you to create GPOs, view a GPO's settings, link and unlink GPOs with containers, and manage the inheri
    10·1 answer
  • ____________ define the allowable interactions between subjects and objects. credentials responsibilities procedures access cont
    15·2 answers
  • Cryptography has requirements include:
    8·1 answer
  • I need ur oppinion about this paragraph.
    10·2 answers
  • What breakthrough in sound recording facilitated stereophonic recording? Ο Α. overdubbing O B. multitrack recording O C. digital
    10·1 answer
  • It destructs microorganisms in containers
    8·1 answer
  • When using the text command, what needs to be around the word or words you<br> want to appear?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!