1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ozzi
3 years ago
11

QUESTIONS

Computers and Technology
1 answer:
Agata [3.3K]3 years ago
3 0
C. Only when you sleep

Hope I helped ( :
Please Thank Me
You might be interested in
Describe the relative benefits of routing over a broadcast style of communication. Is routed traffic more secure than broadcasti
iren2701 [21]

Routing is process of selecting and establishing the routes that data packets take on their way to a particular destination (specific IP addresses). Broadcasting on the other hand is the simultaneous transmission of the same message to multiple recipients. In contrast to routing, broadcasting lacks the ability to direct packets to a specific address. When it comes to security, routing is not necessarily more secure than broadcasting. Without goof security protocols other users can read messages even if they aren't the recipient of the packet.

8 0
3 years ago
What is an administrator?
Drupady [299]
A person responsible for running a business, organization, etc.
3 0
3 years ago
A user is unable to install virtualization software on a Windows 8.1 computer. The user verified the host has sufficient RAM, pl
Phantasy [73]

Answer:

The correct option is C. The user does not have a valid product license key. Both the OS installed on the bare metal (that the host) and the client OS must have a valid license key.

Explanation:

There is a powerful virtualization tool is built into every copy of Microsoft Windows 8.x Pro and Windows 8.x Enterprise, Client Hyper-V.

This is the very same Type-1 hypervisor that runs virtualized enterprise workloads and comes with Microsoft Windows Server 2012 R2. The virtual machines you create on your desktop with Client Hyper-V are fully compatible with those server systems as well.

If you need to do testing as a software developer, or simply want an additional operating system(s) running on your computer, such as Linux, Hyper-V can be a great feature to have enabled on your PC.

To have the Hyper-V feature on your PC, you'll need to meet some basic requirements like your computer will need 4GB of RAM with a 64-bit processor that has Second Level Address Translation (SLAT).

Many PCs on the market have this feature, while many PC BIOSes have virtualization features turned on by default, your PC might not.

As BIOS menu layouts are not universal, you'll want to consult your PC BIOS documentation as to where the feature is located in your firmware setup and what it is called.

a.   Windows 8.1 does not support Type 2 hypervisors.

 This option is wrong. All 64-bit Windows 8.1 OS except for the Home version supports hypervisors type 2 as well as type 1

b.   The motherboard does not support hardware-assisted virtualization.

Most of the PC that can run Windows 8.1 has visualization, all that is needed is to have it enabled if it was it enabled by default in the BIOS

c.   The user does not have a valid product license key.

This is the correct answer. For you to successfully install visualization software on Windows 8.1, both the host OS and the client OS must have a valid product key

d. The system is incompatible with Type 1 hypervisors.

This option is wrong. The Windows 8.1 OS does not only support the installation of visualization software, it came with its hypervisor called Hyper-V.

7 0
3 years ago
Assume that the classes listed in the Java Quick Reference have been imported where appropriate.
Taya2010 [7]

Answer:

Attached is a screenshot of my code for 'PasswordGenerator' and the tests necessary.

Explanation:

If you need any explanation, please ask!

3 0
3 years ago
Read 2 more answers
One way to prepare for filing the PROFILE is to:
kozerog [31]
I think I am not sure that it is probably b
8 0
3 years ago
Read 2 more answers
Other questions:
  • What is one way for an entrepreneur to decrease risk?
    8·1 answer
  • The word computer consists of 64 bits, which is equivalent to _____ bytes.
    5·1 answer
  • Please help, Tech class!!
    14·1 answer
  • Identify a stressor in your life. Conduct an internet search to locate at least two reliable sources of information on effective
    6·1 answer
  • Which shape is used for input or output?
    15·1 answer
  • Domestic refers to things that happen __________ of the united states
    15·2 answers
  • Write a programmer defined function that compares the ASCII sum of two strings. To compute the ASCII sum, you need to compute th
    6·1 answer
  • Function of pons for class 7​
    15·1 answer
  • Imagine an everyday scenario in which you are using the internet: downloading a file, uploading a photo, checking your email, et
    5·1 answer
  • The designers of a database typically begin by developing a​ __________ to construct a logical representation of the database be
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!