1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
adell [148]
3 years ago
9

You're setting up some VMs to test an application you're considering making available to employees of the small company you work

for. You need to test the app in a variety of OSs, and you don't expect to need these VMs after testing is complete. You'd like setup to be as simple and straightforward as possible without needing to make any changes to the servers on your network. Which of these hypervisors will best serve your needs?
Computers and Technology
2 answers:
IgorLugansk [536]3 years ago
6 0

Answer:

Snapshots in VirtualBox, Hyper-V, and please check explanation.

Explanation:

You should never test the software on your PC as you never know what virus or threat they bring with them. Even when you are a software company and testing your own new software, you should use the VM, as it is safe. Any adverse effect can be tackled as the VM is made to be destroyed some day.

You can install numerous OS on your VM. The two best are certainly Virtual Box and the Hyper-V from VMWare. Remember, if you dont want to use the licensed version of certain OS, the trial versions are always available for free, and you can install them on the VMs.

There is a snapshot option on the VirtuabBOX. You are only required to create the snapshot after creating and configuring the VM. It supports Windows, Linux and Mac. So you can install almost any OS. However, VMWare Player does not support the Snapshot, but it provides s similar option known as Checkpoints. However, VMware Workstation supports Snapshots, though they might be costly.

If you are on OS X you can make use of Parallels.

However, never enable file sharing, and stay away from Bridge mode as well as never use your original accounts. File sharing will inject the malware if any to all places on network. The bridge mode connects the VM directly to the network, which otherwise remain hidden behind NAT. And use of personal accounts can cost you them, and this can be quite a big loss definitely.  

LenaWriter [7]3 years ago
4 0

Using snapshots on virtual machine software such as VirtualBox, Hyper-V, and others.

<h2>Further Explanation </h2>

Virtual is a term that originally came from optics, to understand objects in a mirror. An object in a mirror is a reflection of an actual physical object, but a mirror is not an object. This means that the image looks like an actual object and looks to be in the same location.

A virtual machine (VM) is a software implementation of a machine (for example a computer) that executes programs such as a physical machine. Virtual machines are separated into two main categories, based on usage and the level of correspondence for each real machine. A system virtual machine provides a complete system platform that supports the implementation of a complete operating system (OS). Conversely, a process virtual machine is designed to run a program, which means that it supports a single process. An important characteristic of a virtual machine is that the software that runs inside is limited in resources and the abstraction provided by the virtual machine cannot get out of the virtual world. A virtual machine was originally determined by Popek and Goldberg as "an efficient, isolated duplicate of a real machine". Current uses include virtual machines that do not have a direct correspondence to real hardware.

functions of a virtual machine

  1. Switch to a newer operating system version
  2. Virtualization from your desktop
  3. Perform tests with different operating systems
  4. Conduct software testing on many different platforms
  5. Compile different servers for business use

Learn more

definition of Virtual brainly.com/question/13994566

definition of A virtual machine (VM) brainly.com/question/13994566

Details

Grade: Middle School

Subject: Computers and technology

keywords: A virtual machine (VM)

You might be interested in
Which one of these are a valid IPv4 address? Check all that apply.
Illusion [34]
The answer is C.54.45.43.54
6 0
2 years ago
Compare Fibonacci (recursion vs. bottom up)
ipn [44]

Answer:

C++ code explained below

Explanation:

#include<bits/stdc++.h>

#include <iostream>

using namespace std;

int FiboNR(int n)

{

int max=n+1;

int F[max];

F[0]=0;F[1]=1;

for(int i=2;i<=n;i++)

{

F[i]=F[i-1]+F[i-2];

}

return (F[n]);

}

int FiboR(int n)

{

if(n==0||n==1)

return n;

else

return (FiboR(n-1)+FiboR(n-2));

}

int main()

{

long long int i,f;

double t1,t2;

int n[]={1,5,10,15,20,25,30,35,40,45,50,55,60,65,70,75};

cout<<"Fibonacci time analysis ( recursive vs. non-recursive "<<endl;

cout<<"Integer FiboR(seconds) FiboNR(seconds) Fibo-value"<<endl;

for(i=0;i<16;i++)

{

clock_t begin = clock();

f=FiboR(n[i]);

clock_t end = clock();

t1=double(end-begin); // elapsed time in milli secons

begin = clock();

f=FiboNR(n[i]);

end = clock();

t2=double(end-begin);

cout<<n[i]<<" "<<t1*1.0/CLOCKS_PER_SEC <<" "<<t2*1.0/CLOCKS_PER_SEC <<" "<<f<<endl; //elapsed time in seconds

}

return 0;

}

7 0
2 years ago
Conner has located a research source that is sponsored by a pharmaceutical company. Based on the sponsorship, Conner must be car
gogolik [260]

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer is:

Conner has located a research source that is sponsored by a pharmaceutical company. Based on the sponsorship, Conner must be careful that the information is not <u>Biased.</u>

<u></u>

When you evaluate and use information from multiple sources, you need to evaluate the information that it must be error-free and not biased and it should be accurate information as you needed.

As in this example, Conner needs to research that the information should not be biased because the information or research source is sponsored by a pharmaceutical company and there is chances of biasedness. So, Conner must be careful that information is not biased.

6 0
2 years ago
Assume you want to write a code to calculate the addition of two numbers digit by digit. Provide the running time for your algor
Sergio039 [100]

Answer:

Explanation:

Using Python programming language

Explanation:

1. I defined a function add and passed in two parameters (a,b).

2. In the block of the function, I added the two numbers and printed the result.

3. I decided to use a function so that the program is re-usable and can accept various inputs.

Find the code below. (# are used for comments)

#Addition of numbers

def add(a,b):

   print(a+b)

#Test Cases

add(2,4.5)      #Result=6.5

add(10,290)     #Result=300

add(2.567,4.58) #Result=7.147

5 0
3 years ago
According to ________ law, in a sealed chamber, the pressure and temperature of a gas are directly related to each other.
Vaselesa [24]

Gay- Lussac's Law.  <span>A law stating that the volumes of gases undergoing a reaction at constant pressure and temperature are in a simple ratio to each other and to that of the product</span>

<span>.</span>


6 0
3 years ago
Other questions:
  • Which connector is most commonly used to connect printers to desktop pc systems?
    10·1 answer
  • On an Android device, where can a user find the correct app to use to sync contacts and apps among devices?
    10·1 answer
  • How much does a Canon PowerShot G7X cost in America?
    14·1 answer
  • (Please answer! Correct answer gets brainliest!)
    5·2 answers
  • The traditional UNIX scheduler enforces an inverse relationship between priority numbers and priorities: the higher the numbe1~
    6·1 answer
  • What is a unique text-based Internet address corresponding to a computer's unique numeric IP address called
    14·1 answer
  • Explain the SCAN disk scheduling algorithm. Explain why it is sometimes called the Elevator Algorithm.
    9·1 answer
  • As Jane was setting up her projector, she realized that the images on the screen appeared blurred. How would Jane sort out the i
    6·2 answers
  • 4.(L.5.1.A) Select the sentence that includes an interjection,
    12·1 answer
  • Please define processor​
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!