1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adell [148]
2 years ago
9

You're setting up some VMs to test an application you're considering making available to employees of the small company you work

for. You need to test the app in a variety of OSs, and you don't expect to need these VMs after testing is complete. You'd like setup to be as simple and straightforward as possible without needing to make any changes to the servers on your network. Which of these hypervisors will best serve your needs?
Computers and Technology
2 answers:
IgorLugansk [536]2 years ago
6 0

Answer:

Snapshots in VirtualBox, Hyper-V, and please check explanation.

Explanation:

You should never test the software on your PC as you never know what virus or threat they bring with them. Even when you are a software company and testing your own new software, you should use the VM, as it is safe. Any adverse effect can be tackled as the VM is made to be destroyed some day.

You can install numerous OS on your VM. The two best are certainly Virtual Box and the Hyper-V from VMWare. Remember, if you dont want to use the licensed version of certain OS, the trial versions are always available for free, and you can install them on the VMs.

There is a snapshot option on the VirtuabBOX. You are only required to create the snapshot after creating and configuring the VM. It supports Windows, Linux and Mac. So you can install almost any OS. However, VMWare Player does not support the Snapshot, but it provides s similar option known as Checkpoints. However, VMware Workstation supports Snapshots, though they might be costly.

If you are on OS X you can make use of Parallels.

However, never enable file sharing, and stay away from Bridge mode as well as never use your original accounts. File sharing will inject the malware if any to all places on network. The bridge mode connects the VM directly to the network, which otherwise remain hidden behind NAT. And use of personal accounts can cost you them, and this can be quite a big loss definitely.  

LenaWriter [7]2 years ago
4 0

Using snapshots on virtual machine software such as VirtualBox, Hyper-V, and others.

<h2>Further Explanation </h2>

Virtual is a term that originally came from optics, to understand objects in a mirror. An object in a mirror is a reflection of an actual physical object, but a mirror is not an object. This means that the image looks like an actual object and looks to be in the same location.

A virtual machine (VM) is a software implementation of a machine (for example a computer) that executes programs such as a physical machine. Virtual machines are separated into two main categories, based on usage and the level of correspondence for each real machine. A system virtual machine provides a complete system platform that supports the implementation of a complete operating system (OS). Conversely, a process virtual machine is designed to run a program, which means that it supports a single process. An important characteristic of a virtual machine is that the software that runs inside is limited in resources and the abstraction provided by the virtual machine cannot get out of the virtual world. A virtual machine was originally determined by Popek and Goldberg as "an efficient, isolated duplicate of a real machine". Current uses include virtual machines that do not have a direct correspondence to real hardware.

functions of a virtual machine

  1. Switch to a newer operating system version
  2. Virtualization from your desktop
  3. Perform tests with different operating systems
  4. Conduct software testing on many different platforms
  5. Compile different servers for business use

Learn more

definition of Virtual brainly.com/question/13994566

definition of A virtual machine (VM) brainly.com/question/13994566

Details

Grade: Middle School

Subject: Computers and technology

keywords: A virtual machine (VM)

You might be interested in
A digital certificate system: Group of answer choices uses digital signatures to validate a user's identity. is used primarily b
kompoz [17]

Answer:

uses third party CAs to validate a user's identity

Explanation:

The Digital Certificate is the only means that technically and legally guarantees the identity of a person on the Internet. This is an essential requirement for institutions to offer secure services over the Internet. Further:

The digital certificate allows the electronic signature of documents The recipient of a signed document can be sure that it is the original and has not been tampered with and the author of the electronic signature cannot deny the authorship of this signature.

The digital certificate allows encryption of communications. Only the recipient of the information will be able to access its content.

4 0
3 years ago
Find out the names of at least 20 programming languages and their developers.
arlik [135]

Answer:

lala

Explanation:

6 0
2 years ago
Read 2 more answers
Choose all items that represent HTML characteristics.
hram777 [196]

Answer:

A,C,D,E are the answers at least on the test i took

Explanation:

3 0
3 years ago
Read 2 more answers
Jamie has to enter the names, grades, and scores of a group of students into a worksheet. Which option will Jamie use to describ
inessss [21]

Answer:

B. Graphs

Explanation:

Graphs are used to put certain things into categories. In this case Jamie has to enter different categories such as names, grades and the scored of the students. C and D don't make sense for this problem since they aren't actually what he is looking for. A is plausible but he needs it into a worksheet and labels aren't worksheets they are just labels. So B would be your answer. Also I took the quiz this is the correct answer.

8 0
2 years ago
What did Bill Gates invent?
Viktor [21]
He invented microsoft.
8 0
3 years ago
Read 2 more answers
Other questions:
  • What is the most effect way to include space after each paragraph
    14·1 answer
  • How would you print from 1 to 1000
    13·1 answer
  • At the coffee shop where they work, Jen is the safety officer, Richard is in charge of administering first aid, Ashley is respon
    13·2 answers
  • Declaring single arrays is done with a0 set(s) of straight brackets.
    10·1 answer
  • Which of the following methods is the easiest way to set up a VPN client on a computer for a user who is not technical?
    12·1 answer
  • Describe two circumstances where access services might get implemented by organizations please.​
    9·1 answer
  • How did you generate a random number for the user to guess?
    9·1 answer
  • Instructions
    8·1 answer
  • GOOD EVENING, FRIENDS, I WANT TO ASK ON THE ACCOUNT OF HIS NAME‏BENJEMIN360 . THIS ANSWERS ARE VERY WONDERFUL, BUT I CAN'T COMMU
    6·1 answer
  • In object-oriented analysis, an object is a member of a(n) _____, which is a collection of similar objects.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!