1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
sukhopar [10]
4 years ago
12

You currently have an application server VM running on your Windows Server 2016 Hyper-V server. Your application server VM's per

formance would benefit greatly if the host machine's SSD drives could be accessed by allowing the application server VM to bypass the Hyper-V hypervisor. What feature in Windows Server 2016 Hyper-V can give your application server VM exclusive access to hardware devices on the host computer?
Computers and Technology
1 answer:
lord [1]4 years ago
8 0

Answer:

The correct answer is :  Discrete Device Assignment

Explanation:

This refers to a performance improvement that permits a specific physical PCI device to be directly controlled with the ability to take suitable PCI Express devices and pass them through directly to a virtual machine. you can pass the graphics processing unit through a VM  with DDA. Wireless network adapters are possible as well.

You might be interested in
Arrays enable the representation of a number of similar items (in terms of their datatypes). They represent these items in an or
frutty [35]

Answer:

Check the explanation

Explanation:

When there is a need to initialize a lot of element of same data types,tht time we use arrays.

We have to use array  whenever it involves simple programs and cases,

dx:saving age of 100 childrans of sametype

When all the ele,ents are of different data type,we hould not use arrays,even when we initialize at runtime,we dont need arrays.i.e when size is not fixed

Linked list can be used instead of arrays

ArrayList:It provides methods for creating, searching, manipulating, and sorting arrays, thereby serving as the base class for all arrays in the common language runtime.

Advantages:

Readymade properties availaible ,so lot of writing and remembering the code can be avoided.

Provide the reference for other arrays

Helps in faster execution

4 0
4 years ago
Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT
raketka [301]

Answer:

C. DAT-1

Explanation:

Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.

Common hashing algorithms applied, include;  the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.

4 0
3 years ago
Create a python program that display this
aleksley [76]

Answer:

vxxgxfufjdfhgffghgfghgffh

4 0
3 years ago
3. How has air - conditioning affected human life?​
meriva

Answer:

Sudden changes in temperature and humidity affect the respiratory system. ... The air circulation can transmit infectious respiratory diseases. Airborne dust and fungi can cause allergic reactions. Air conditioning is associated with chronic rhinitis and pharyngitis, throat irritation and hoarseness.

6 0
3 years ago
Because __________ software can block suspicious software in real-time, it has an advantage over such established anti-virus det
shutvik [7]

Because dynamic analysis software can block suspicious software in real-time, it has an advantage over such established anti-virus detection techniques as fingerprinting or heuristics.

<h3>What is dynamic program analysis?</h3>
  • The examination of computer software by means of the execution of programs on a physical or virtual processor is known as dynamic program analysis.
  • Effective dynamic program analysis requires running the target program with enough test inputs to account for almost all potential outputs.
  • Utilizing software testing tools like code coverage increases the likelihood that a sufficient sampling of the program's potential behaviors has been seen.
  • Additionally, it is important to take precautions to reduce the impact that instrumentation has on the target program's execution, especially its temporal characteristics.
  • Static program analysis contrasts with dynamic analysis. Dynamic testing is used in unit tests, integration tests, system tests, and acceptance tests.

To learn more about the topic, refer to the following link:

brainly.com/question/17209742

#SPJ4

8 0
2 years ago
Other questions:
  • When you want to print a page from the World Wide Web, select the print command in the _____.
    8·2 answers
  • Assume that scotus is a two-dimensional character array that stores the family names (last names ) of the nine justices on the S
    6·1 answer
  • What does this say:<br> √ans
    6·2 answers
  • Microsoft Word is ________________ software.
    8·1 answer
  • Consider the formula: G=D+(A+C^2)*E/(D+B)^3 Show the order that a processor would follow to calculate G. To do so, break down th
    10·1 answer
  • What is the latest date you can file the FAFSA if you're planning to start
    6·2 answers
  • ILL GIVE BRAINLIEST TO FIRST ANSWER David is adopting an iOS app from a non-retina screen to a retina screen. The app currently
    13·1 answer
  • Select the correct answer.
    6·2 answers
  • _____ are labels for data, while _____ tie values together into one entity.
    15·1 answer
  • List resource you can utilize if you are experiencing technology issued
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!