1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
harkovskaia [24]
3 years ago
12

Why is a virtual machine useful?

Computers and Technology
1 answer:
Allisa [31]3 years ago
6 0

Answer:

The correct answer to this question is given below in the explanation section.

Explanation:

The given options of the question are:

  1. it creates an extra file backup.
  2. it increases internet speeds.
  3. it stimulates multiple computers with one physical computer.
  4. it connects multiple computers together.

The correct option to this question is 4. i.e:

The virtual machine is useful because it stimulated multiple computers with one physical computer.  You can run many operating systems on a virtual machine at one physical computer. It will reduce the cost of buying a new computer and internet connectivity cost among computers.

While other options are not correct because:

VM does not create an extra file backup, it will create a backup according to your assigned needs. It does not increase the internet speed and does not connect multiple computers together but it connects multiple virtual machine operating systems togethers.

You might be interested in
1. Different algorithms are used to make decisions on load balancing. These include random allocation, round-robin, weighted rou
jok3333 [9.3K]

Answer:

The algorithms and their advantages-disadvantages are given below.

Explanation:

1. Least Connection

Advantage:

The load balances track the transfers constantly, as well as read the details.

Disadvantage:

Server efficiency is indeed not optimal because there are different application computing abilities.

2. Round robin:

Advantage:

Implementation is simple and easily understandable.

Disadvantage:

This methodology or algorithm seems to be suitable for more than just clusters composed of servers with similar specs.

3.  Least Loaded Algorithm

Advantage:

We relate to that as the base technique, and then use it as the basis for comparison with several other strategies results.

Disadvantage:

Such knowledge is almost always unclear when the demands appear, and therefore it is quite hard to accomplish to be using the standard algorithm.

4. Dynamic Round Robin

Advantage:

Easy to execute, it calculates almost all of the server pressures in real-time.

Disadvantage:

Might trigger one processor to overrun while some are underutilized.

5. Weighted Round-Robin Allocation

Advantage:

This is an evolved round-robin edition that removes the shortcomings of that algorithm in a straightforward round.

Disadvantage:

It doesn't quite recognize the specialized criteria for high availability, including response times for each application.

3 0
3 years ago
An over-target baseline (OTB) is a comprehensive rebaselining effort that is best categorized as an internal replanning effort.
masha68 [24]

Answer:

The answer is "option B".

Explanation:

An OTB stands for an over-target baseline, it is a new management benchmark when an original target can't have coincided and new goals for management purposes are required.

  • It is also known as a reference to the foundation for calculating or constructing.
  • It is an understanding between the client and the contractor that the cost base, which is not part of the original contract budget, should include an extra budget

6 0
4 years ago
Quinn recently launched a Display campaign for his women's clothing store. Since the launch, his website traffic has increased,
photoshop1234 [79]

<u>Full question:</u>

Quinn recently launched a Display campaign for his women’s clothing store. Since the launch, his website traffic has increased, but sales have remained flat. Which story shows Quinn using remarketing to drive action?

A. Quinn remarkets using his original business objectives and campaigns, with new users from an uploaded compatible list. By leveraging existing materials, he aims to extend his reach while saving cost.

B. Quinn creates a list of cart abandoners that identifies users who visited his website, considered buying his clothing, but didn’t purchase. He shows them an ad with a promotional discount code.

C. Quinn uses the In-Market audience segment for baking supplies with the intent of reaching potential customers while they’re actively browsing for women’s apparel and are close to a conversion.

D. Quinn creates a custom audience segment using keywords and URLs as inputs. He hopes to extend his audience to customers interested in women’s accessories.

Option B

Quinn creates a list of cart abandoners that identifies users who visited his website, considered buying his clothing, but didn’t purchase. He shows them an ad with a promotional discount code shows Quinn using remarketing to drive action

<h3><u>Explanation:</u></h3>

Remarketing is a manner of online advertising that allows sites to exhibit targeted ads to users who have previously hit their site. Remarketing consists of practicing special tracking code to order cookies on the browsers of somebody hitting your website and then assisting ads to those with that cookie.

Because Quinn is dispensing promotional discount code ads to the personality who hit his website, consider purchasing his clothing, but didn’t acquire. Remarketing lets you target those people who have toured your website or entered your app.

4 0
4 years ago
Required by the Fair and Accurate Credit Transaction Act of 2003 (FACTA), which of the following is an anti-identity theft rule
oksian1 [2.3K]

Answer:

Red Flags Rule

Explanation:

The Red Flags Law relies upon commercial banks and investors to put red flags in order to identify and deter identity fraud. Institutions must have a documented policy for the protection of fraud to control the organization and secure their clients.

Other options are incorrect because they are not related to the FACTA that is anti-identity theft rule.

3 0
3 years ago
Write a python program to calculate the sum of numbers from 1 to 20 which is divisible by 3.
Ksivusya [100]

Answer:

Input : N = 5

Output : 7

sum = 3 + 4

Input : N = 12

Output : 42

sum = 3 + 4 + 6 + 8 + 9 + 12

4 0
3 years ago
Read 2 more answers
Other questions:
  • (a) Show how to use (the Boolean formula satisfiability program) satisfiable num (and substitute) to find a satisfying assignmen
    9·1 answer
  • Which of the following is a Microsoft solution that runs on a Microsoft Terminal Services server but appears, to end users, as i
    10·1 answer
  • Assume the integer variable num has been assigned a valid value. What is the purpose of the following code segment?
    14·1 answer
  • How do you take a screen shot on hp pavilion dm3
    12·1 answer
  • Google analytics is an example of which of the followinga) search engine
    14·1 answer
  • Which term refers to a fact that naturally occurs in the universe?
    8·2 answers
  • Kendra is taking a class in Finance and she has been asked to give a speech about a case study in which she's been working. She
    5·1 answer
  • Which of these parts of a computer produces an observable result?
    11·2 answers
  • Which document outlines the activities carried out during testing?
    9·1 answer
  • Add definitions for the following keywords to your glossary of words.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!