1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Sidana [21]
3 years ago
14

Virtual machines are not susceptible to the threats and malicious attacks like other operating systems.

Computers and Technology
1 answer:
Nonamiya [84]3 years ago
3 0

Answer:

flamingo was here

Explanation:

You might be interested in
A nested folder can best be described as what?
Fed [463]
A folder contained within a folder
6 0
3 years ago
Whats a computer scientist.
Kazeer [188]

Answer:

computer scientist is a person who has acquired the knowledge of computer science, the study of the theoretical foundations of information and computation and their application.

4 0
3 years ago
Read 2 more answers
What is ur Favorite anime
jok3333 [9.3K]

Answer:

one piece lol

Explanation:

8 0
3 years ago
is there an app i can use to make a picture appear in the corner of a video then disappear after being up for a second?
Nuetrik [128]
Umm i really do not know i'm sorry
7 0
3 years ago
Read 2 more answers
Jeff has created a table to calculate the cost of raw materials that he purchases monthly. Cell A2 shows the fixed cost of the r
Luda [366]
=A2*D2
The above formula will allow calculation  of monthly cost of the first raw material.This is done by Multiplying the contents of cell A2 (Column A, Row 2) and cell D2 (Column D, Row 2). Here Cell A2 contains cost of the first raw material and Cell D2 contains number of units of the raw material produced  each month. After finding the monthly cost of the first raw material in this way, the monthly cost of other raw materials can simply be calculated by dragging down the formula to apply to the rows below.
3 0
4 years ago
Read 2 more answers
Other questions:
  • Gina's teacher has sent her a Word document that contains the names of all the students who are participating in the
    11·2 answers
  • When using vlookup, the _____argument is optional?
    8·1 answer
  • With network management software, a network manager can ____.
    6·1 answer
  • Many 12-15 yrs hv access to the internet which cannot be supervised by an adult.i need 5 problems tht this might cause
    5·1 answer
  • Discuss the different types of user-friendly interfaces and the types of users who typically use each.
    12·1 answer
  • For this exercise, you'll use the Rectangle class below (you can assume that the length and width are measured in feet).
    12·1 answer
  • Which of the following extends a network over a large geographic area by connecting local area networks together?
    14·2 answers
  • The price of an item you want to buy is given in dollars and cents. You pay for it in cash by giving the clerk d dollars and c c
    6·1 answer
  • In what situations might you need to use a function that calls another function?
    11·1 answer
  • A user generates printouts consisting of several pages of seemingly random characters every time he prints to a network printer.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!