1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vivado [14]
3 years ago
10

A business might want to use virtual machine to

Computers and Technology
1 answer:
charle [14.2K]3 years ago
3 0

Answer:

Allow outside customers to access files

Explanation:

A VM doesn't eliminate the need for additional load balancing hardware, an intranet is maintained with multiple computers typically, and remotely maintaining servers can be accomplished with SSH.

The reason you would want a VM for outside customer access is so that they can't interfere with anything outside of the sandboxed environment, this helps to mitigate hacking and easily isolate specific customer information.

You might be interested in
What are the main dimensions of information systems
anastassius [24]

\huge\mathcal\colorbox{yellow}{{\color{blue}{AnSwEr~↓~↓~}}}

There are three dimensions of information systems

  • organizational
  • management
  • technology.

\huge \colorbox{blue}{hope \: it \: help \: u}

8 0
3 years ago
Print ___________ command is used for adding numbers.​
quester [9]

Answer:

phyton is the answer....

5 0
3 years ago
The fastest way to get help is to type a word or two in the search box.
Elanso [62]
The fastest way to get help is to type a word or two in the search box. TRUE.
5 0
4 years ago
Write an expression using a variable that shows how much 3 pairs of jeans will cost if you do not know the price of the jeans.as
stich3 [128]
Maybe y = 3 * x, that is my guess
8 0
4 years ago
Really need help with these PLZ
snow_lady [41]

1. B joint application design

2. A it is necessary to write most of the new code manually

3. D since users have been involved in the pro typing, managers can be confident that the system can handle large numbers of users

4. B extreme programming

5. C code that is produced using OOD is easy to secure

6. A more testing is preferable to less testing

7. C object-oriented development

8. D component-based development

9. A object

10. B the code can only represent information as objects

4 0
3 years ago
Other questions:
  • Suppose that the following regular expression is used to recognize real numbers in scientific notation in a programming language
    14·1 answer
  • You have created a number of different documents using several applications including word, excel, and powerpoint. these files a
    10·1 answer
  • Five aplications of ict​
    10·1 answer
  • Which of the following is not a metamorphic agent?
    8·2 answers
  • What is a feature of audio editing software
    11·1 answer
  • 1. Hypothesis: It is easier to establish an ethical work environment in a non-profit organization than in a for-profit organizat
    9·1 answer
  • 2. What is software conflict?<br>​
    11·1 answer
  • What network problems can be solved on your<br> end?
    13·2 answers
  • Are you familiar with measuring using a ruler? When have you ever used a ruler to measure, and who taught you how to use the rul
    13·1 answer
  • PUBG mobile id and name plz
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!