1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sidana [21]
3 years ago
14

Virtual machines are not susceptible to the threats and malicious attacks like other operating systems.

Computers and Technology
1 answer:
Nonamiya [84]3 years ago
3 0

Answer:

flamingo was here

Explanation:

You might be interested in
Which resources could be used a lot when installing a desktop app for synchronization purposes? Choose two answers.
Sergeu [11.5K]

Answer:

While installing desktop sync app such as drop box following two resources will be used a lot

  1. CPU
  2. RAM

Explanation:

CPU usage has been increased while installing desktop sync application, because it depends on the number of files that need to be synced. If the number of files is high the CPU usage will increase.

The need of memory such as RAM is also increased while installing the desktop sync application. As the number of files that need to be synced increases the RAM usage is also increases.

4 0
3 years ago
Ms office suite comes with its own set of pictures in the​
goldfiish [28.3K]

Answer:

clipart ...........................

Explanation:

clipart is the correct answer for the above question.

6 0
3 years ago
BRAINLIEST A compact disc stores information on a plastic ______________________________ with billions of pits? 100PTS
Cloud [144]

Answer:

area

Explanation:

7 0
3 years ago
Read 2 more answers
When we insert a new node into a red-black tree, we set the color of the newly inserted node n to red. observe that if we had ch
Vika [28.1K]
Cause u didnt want to
4 0
4 years ago
In a random digit telephone survey, homeless people or people with only cell phones do not have telephones that can be called wi
AURORKA [14]

Answer:

a. Undercoverage bias

Explanation:

Based on the information provided within the question it can be said that the bias being mentioned is Undercoverage bias. This refers to when a population of a sample are not being represented correctly, which in this scenario is because these people cannot be contacted. Therefore the correct bias that results from this is Undercoverage bias.

4 0
4 years ago
Other questions:
  • What is unique about being an administrative professional in a government job?
    8·2 answers
  • If Pam clicks Rotate Right on the Drawing toolbar twice, how many degrees will her image rotate?
    7·1 answer
  • The hot wires in a service entrance panel are most likely to be covered with ________ insulation. A. red B. green C. gray D. whi
    14·1 answer
  • What happens if two functions are defined with the same name, even if they are in different arguments within the same .py files?
    10·1 answer
  • Ancler Corporation wants to calculate how much their profits were in the first quarter of the year. They should use a
    6·2 answers
  • Which of the following is not an example of debugging? looking for errors in programming code. fixing misspelled commands in pro
    13·1 answer
  • Computer data that is suitable for text​
    5·1 answer
  • It is acceptable to create two TCP connections on the same server/port doublet from the same client/port doublet. True False
    9·1 answer
  • What skill would be easiest to learn from a simulation video game?
    8·2 answers
  • A small _____ at the lower right corner of a tool indicates that it contains hidden tools​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!