1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Bingel [31]
4 years ago
7

Larry finds it easy to run legacy programs and applications in a virtualized environment. how does the virtualization provider m

ake this possible?
a) combines workloads of several underutilized servers to fewer machines

b) installs and runs different versions of an operating system on the same computing device

c) moves virtual machines from one server to another server at a different location

d) streamlined and automated management tasks
Computers and Technology
2 answers:
Doss [256]4 years ago
8 0

b) installs and runs different versions of an operating system on the same computing device

Debora [2.8K]4 years ago
4 0

The answer is d) streamlined and automated management tasks . btw i did this 5 weeks ago

You might be interested in
Write a program to find the sum of given series: (a) S = 1 + (1/2) + (1/3) + ...... + (1/20)
Snowcat [4.5K]

total = 0

numerator = 1

denominator = 1

while denominator != 20:

   total += numerator/denominator

   denominator+=1

print(total)

I wrote my code in python 3.8. I hope this helps.

3 0
3 years ago
When do I use while loops
Marat540 [252]

Answer:

When you dont know how long the loop is going to run for

Explanation:

7 0
3 years ago
What is the limitation of the procedure forward()?
Rina8888 [55]

Answer:

sandwich breadtughug

Explanation:

Katty bread

5 0
3 years ago
A security operation center (SOC) analyst investigates the propagation of a memory-resident virus across the network and notices
masya89 [10]

A type of virus that influences this circumstance in the network bandwidth is a worm.

<h3>What is Virus in technology?</h3>

In computers and technology, viruses may be characterized as a sort of malicious software, or malware, that extends between computers and provokes a deterioration of data and software either partially or completely.

The complete question is as follows:

  • A micro virus
  • a multipartite virus
  • A worm
  • a program virus.

Worms are memory-resident viruses that duplicate over the network resources. The primary consequence of this type of virus is to rapidly eradicate network bandwidth with its duplication.

This virus may also be competent to accomplish a Denial of services invasion by slamming O.S and servers.

Therefore, the correct option for this question is C, i.e. a worm.

To learn more about Computer viruses, refer to the link:

brainly.com/question/26128220

#SPJ1

5 0
2 years ago
From the perspective of the prosecution, the safest legal means of obtaining incriminating documents from a suspect is by: a. Su
never [62]

Answer:

a. Subpoena duces tectum

Explanation:

<u>Options C </u>(an informant steal the documents)<u> and D</u> (discrete copy of the documents) <u>would be considered illegal and/or inadmissible in most places</u>, so you should avoid these.

Options A (subpoena) and B (search warrant) are usually issued by a judge after considerations, so they are both legal ways to obtain something.

In a subpoena duces tecum, the court orders an individual (or a moral person) to produce (usually very specific) documents to court or face penalty.

<u>A search warrant is executed by law enforcement officials who are seeking information to help in their investigation</u>, usually not highly specific (not 'search for a copy of the April 10 minutes of the meeting.').

3 0
4 years ago
Other questions:
  • What are the advantages and disadvantages of it?
    14·1 answer
  • What command would you use to list the text files in your
    7·1 answer
  • Double clicking a word selects the entire word?
    10·1 answer
  • Modify your solution to Problem 8.24 so that one (and only one) child installs a Segmentation-fault handler which prints an erro
    10·1 answer
  • Joining strings together is known as?
    7·1 answer
  • What area displays the title of the document
    15·2 answers
  • I will give Brainliest to the best answer, I need urgent HELP
    7·1 answer
  • “Artificial intelligence is the tool of education in the near future”. Research on the possibility of “AI technology” in scienti
    15·1 answer
  • Write an application that prompts a user for two integers and displays every integer between them. Display There are no integers
    14·1 answer
  • 3. What of the following is the main components of computer system?
    9·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!