1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DerKrebs [107]
4 years ago
13

You work for a company that builds custom PCs for select clients. You are training a new employee to evaluate and select appropr

iate components to meet customer specifications or needs. Which of the following are the requirements of a virtualization workstation and is true about virtualization? (Choose all that apply).
Computers and Technology
1 answer:
Artist 52 [7]4 years ago
6 0

Since you’re building custom PCs for a client, you would need to discuss a great deal of things in terms of the level of customization that you can offer to the client according to their budget and needs.

The categories that you would need to discuss are: graphic/CAD/CAM design workstation, thin client, home theater PC, gaming PC, audio/video editing workstation, and standard thick client. These things refer to the level of specifications that each equipment would require according to how the client would use them.

You might be interested in
14. Which commercial RDBMS product was the first to hit the market and is the biggest?
schepotkina [342]

The answer is definitely (A. SQL server) it was released back in 2010 and is huge!

Let us know if there is anything else you need to know.

Mark brainlest :)

3 0
3 years ago
which one of the following would not normally be found in an organization's information security policy?
kotegsom [21]

Requirement to use AES-256 encryption would not normally be found in an organization's information security policy.

When it comes to information security, organizations have a variety of different policies and requirements that they adhere to. One of those requirements is the use of AES-256 encryption.

However, not every organization has AES-256 encryption as a requirement in their information security policy. In fact, many organizations don't even know what AES-256 encryption is.

Why is AES-256 encryption relevant?

Well, AES-256 encryption is a strong form of encryption that is used to protect data. It is often used by governments and organizations to protect sensitive data.

AES-256 encryption is a requirement for many organizations because it provides a high level of security for data. Without AES-256 encryption, data could be compromised.

Learn more about information security policy here:

brainly.com/question/14292882

#SPJ4

4 0
1 year ago
Which standard is commonly used on the Internet to represent non-numeric data?
mezya [45]
ASCI is the standard that is commonly used on the Internet to represent non-numeric data. ASCI stands for American Standard Code fro Information Interchange. This character encoding standard represents text in computers, telecommunications equipment, and other devices.  It assigns letters, numbers, and other characters within the 256 slots available in the 8-bit code
4 0
3 years ago
A person upgrades their computer's processor. The processor is responsible for 80% of the system's computing effort. What is the
Ivan

Answer:A clock speed of 3.5 GHz to 4.0 GHz is generally considered a good clock speed for gaming but it's more important to have good single thread performance. This means that your CPU does a good job understanding and completing single tasks. This is not to be confused with having a single core processor

Explanation:

4 0
3 years ago
To include a text box, WordArt, SmartArt graphic, or a shape in a document, the user would need to navigate to the _____ tab. Ho
frosja888 [35]

The correct answer is:

Insert.

3 0
3 years ago
Read 2 more answers
Other questions:
  • Write a method isMultiple that determines, for a pair of integers, whether the second integer is a multiple of the first. The me
    8·2 answers
  • You want to discard your old computer and want to securely erase the data from your hard drive. What can you use to do this and
    10·1 answer
  • This is an attack that depends on the fact that duplicate values, also called collisions, appear much faster than you would expe
    11·1 answer
  • Which statement about comments is false? Select one: a. Lengthy comments can cause poor execution-time performance. b. Comments
    7·1 answer
  • Access Help defaults to searching for information on the _________.<br><br> Not multiple choice
    10·1 answer
  • In C++ :
    6·1 answer
  • Which graphic file format is used for commercial purposes.
    10·1 answer
  • What do you think is the importance of Science Technology and Society​
    8·1 answer
  • What are ways to create a study schedule? Check all that apply.
    5·2 answers
  • What maintains data about various types of objects, events, people, and places?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!