1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
AURORKA [14]
3 years ago
7

A colleague asks you to research a CPU for a new server that will run Windows Server 2019. He explains the server roles that he

intends to install and says that the CPU must support Nested Page Table . What is your colleague most likely planning to install on the server ?
a. it doesn’t support AMD processors
b. You can upgrade from Windows Server 2008 x86
c. you can upgrade from Server Core to Server with a GUI
d. you can’t upgrade to a different language
Computers and Technology
1 answer:
SashulF [63]3 years ago
3 0

Answer:

a

Explanation:

just gesing

You might be interested in
Which type of network topology is the most common and easiest to use?
Airida [17]
<span>A network layout or topology that is the most common, the most simple and easiest to use out of the four network topologies is the Bus topology, one cable is used for installation so it is also the cheapest network type.</span>
5 0
3 years ago
The _________ operator returns the distance in bytes, of a label from the beginning of its enclosing segment, added to the segme
DanielleElmas [232]

Answer:

C. Offset.

Explanation:

An offset operator can be defined as an integer that typically illustrates or represents the distance in bytes, ranging from the beginning of an object to the given point (segment) of the same object within the same data structure or array. Also, the distance in an offset operator is only valid when all the elements present in the object are having the same size, which is mainly measured in bytes.

Hence, the offset operator returns the distance in bytes, of a label from the beginning of its enclosing segment, added to the segment register.

For instance, assuming the object Z is an array of characters or data structure containing the following elements "efghij" the fifth element containing the character "i" is said to have an offset of four (4) from the beginning (start) of Z.

8 0
3 years ago
Urgent. I will mark you brainliest. explain why cyber warfare is a real threat.​
stellarik [79]

Answer: Cyber warfare is a real threat since being able to hack another computer especially a countries computer with lots of info in their weaknesses can lead to their downfall. Since they can even possibly if their skilled enough hack their entire data base system and leak it to the public and that wouldn't be good for them not in a single possible way. That's the reason it's dangerous not only that but also because they can access their servers; which can let them access anything online from the whole country including banking information military info which can let them know which area there gonna go to next equipment there gonna bring and where they're gonna launch missiles, bombs, even nukes if they decide to launch one. And being able to hijack the computer that launches the nukes can make the hacker launch the nuke to a different place or launch the nuke on the country trying to launch the nuke.

Explanation:

3 0
3 years ago
Read 2 more answers
Which of the following gestures would you use if you want to activate a link on your new tablet?
Gre4nikov [31]

Answer:

press and hold

Explanation:

When you press and hold, some open a menu where you can add a link

8 0
3 years ago
Longitud de un circulo​
const2013 [10]

Answer:

circunferencia (o perímetro de una circunferencia) L es igual a dos veces el radio (r) por π, o lo que es lo mismo, el diámetro (D) de la circunferencia porπ. ... El concepto “longitud de una circunferencia” es igual al del “perímetro del círculo” y miden lo mismo.

5 0
3 years ago
Other questions:
  • Which method tries all possible passwords until a match is found?
    13·1 answer
  • What is one visual indication that a usb port can be used to charge a mobile device?
    13·1 answer
  • Write a program with total change amount as an integer input that outputs the change using the fewest coins, one coin type per l
    7·1 answer
  • How do you reduce computer screen flicker
    11·1 answer
  • For what kind of shot is a fisheye lens most appropriate?
    8·1 answer
  • The following function takes an array of n integers as its input and returns 1 if the array is sorted in non-decreasing order, 0
    15·1 answer
  • Eye wash stations should contain enough water to provide ______ minutes of continuous use
    5·2 answers
  • An IP address in the form 197.169.100.1 is called a(n) ________. dotted quad encryption key random number sequential access numb
    7·1 answer
  • For C++ ONLY please,
    14·1 answer
  • HOW TO GET RID OF THESE LINES?? PLS WILL GIVE BRAINLIEST
    8·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!