1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
luda_lava [24]
3 years ago
5

A single machine server that allows multiple users to access that machine simultaneously must have what type of os installed?

Computers and Technology
1 answer:
stepan [7]3 years ago
6 0
The server would have a Multiuser OS installed.
You might be interested in
Select all that apply. Purposes of writing include:
nalin [4]
All of these choices are reasons people write. they all appeal to different people
6 0
4 years ago
Read 2 more answers
Use set builder notation to describe these sets.
statuscvo [17]

Answer:

a) S1 = { 2^x | x belongs to the set of Whole Numbers}

b) S2 = { 2+3(x-1) | x belongs to Natural Numbers }

c) S3 = { x^2 | x belongs to the set of Natural Numbers  }

d) S4 = { x | x belongs to English Alphabet }

e) S5 = { x | x is a <em>Vowel</em> of English Alphabet}

Explanation:

Whole Numbers = {0, 1, 2, 3, ...}

Natural Numbers = {1, 2, 3, ...}

English Alphabet={a, b, c, d, e, ... , x, y, z }

Vowels of English Alphabet = {a, e, i, o, u}

8 0
3 years ago
Write an overview of your opinion of Digital Access
Zepler [3.9K]

Answer:

Digital access is the ability to fully participate in digital society. This includes access to tools and technologies, such as the Internet and computers, that allow for full participation.  Unfortunately, not everyone has complete digital access and therefore, are not able to fully participate in digital society. The separation between those who have complete access and those who do not is referred to as the Digital Divide.

5 0
3 years ago
Two technicians are discussing shielded cable. Technician A says that shielded wires are generally twisted in pairs to cancel th
Black_prince [1.1K]

Technician A is Correct. So this is actually a question I just had come up in my IT-140 Networking Fundamentals class but as a matter of fact I also know this because I've worked as a Network Technician for many years now both as a salaried employee and as an Independent Contractor. The reason Technician A is correct is because, indeed Wires in a Shielded Twisted-Pair (STP) cable or even Unshielded Twisted-Pair (UTP) cable are intentionally made this way for two reasons: the expressed purpose of actually twisting the wires in the first place is to protect them from interference called "EMI" (as stated in the question, Electromagnetic Interference!), however they are also twisted this way because of a similar interference (and in most cases, classified as the same kind of disturbance) called RFI or Radio Frequency Interference. As a technician, one of my jobs was hanging Access points in ceilings, and a requirement of that particular job was to make sure that these cables (which in this case were Cat6 which is short for Category 6, the exact cable that is referred to in the question, because Category 6 cable is shielded) were not to be left laying on the ceiling tiles in the drop ceilings! The reason being is, the light fixtures have electricity running through them, and anything with electricity running to it gives off Electromagnetic Interference. So, again Technician A is correct but... I have to say this as a side note... it would be <em>completely</em> pointless and utterly time consuming to remove these cables and replace them with a straight wire <u>just</u> because the warranty expired on a vehicle. Besides... Straight Though Wire and Twisted Pair are used for two completely different things.

Hope this helps! If you'd like to fact check me, google "emi interference"

CJ

3 0
4 years ago
You're setting up some VMs to test an application you're considering making available to employees of the small company you work
IgorLugansk [536]

Answer:

Snapshots in VirtualBox, Hyper-V, and please check explanation.

Explanation:

You should never test the software on your PC as you never know what virus or threat they bring with them. Even when you are a software company and testing your own new software, you should use the VM, as it is safe. Any adverse effect can be tackled as the VM is made to be destroyed some day.

You can install numerous OS on your VM. The two best are certainly Virtual Box and the Hyper-V from VMWare. Remember, if you dont want to use the licensed version of certain OS, the trial versions are always available for free, and you can install them on the VMs.

There is a snapshot option on the VirtuabBOX. You are only required to create the snapshot after creating and configuring the VM. It supports Windows, Linux and Mac. So you can install almost any OS. However, VMWare Player does not support the Snapshot, but it provides s similar option known as Checkpoints. However, VMware Workstation supports Snapshots, though they might be costly.

If you are on OS X you can make use of Parallels.

However, never enable file sharing, and stay away from Bridge mode as well as never use your original accounts. File sharing will inject the malware if any to all places on network. The bridge mode connects the VM directly to the network, which otherwise remain hidden behind NAT. And use of personal accounts can cost you them, and this can be quite a big loss definitely.  

6 0
3 years ago
Read 2 more answers
Other questions:
  • ____ allows someone browsing the internet to click on words or phrases, enter his or her phone number, and continue browsing
    11·2 answers
  • Describe the objectives of e-commerce?​
    13·1 answer
  • Which of the following statements is false? People tend to shortcut security procedures because the procedures are inconvenient.
    13·1 answer
  • Create a new file that builds a shopping list from a user. There should be a input query that asks the user to list an item and
    11·1 answer
  • QUESTION 1
    7·1 answer
  • Assume that the ciphertext C is computed from the plaintext P by C= P ⊕ K1 ⊕ K2 , where K1 and K2 are the encryption key and ⊕ d
    5·1 answer
  • when you enter a formula in a cell the result of the calculation displays in a cell. how do views of formula after entering it?
    9·2 answers
  • Why won't my ads load brainly? Is anyone else having this problem? Brainly company or whoever you are that is running this websi
    6·2 answers
  • assume a five-stage single-pipeline microarchitecture (fetch, decode, execute, memory, write- back) and the code given below. al
    7·1 answer
  • Under which license is open-source software available?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!