1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bija089 [108]
3 years ago
9

When a virtual machine is

Computers and Technology
1 answer:
egoroff_w [7]3 years ago
8 0

Answer:

Resources, RAM

Explanation:

May be another choice for resources but the second one is definently RAM

You might be interested in
Among the following protocols, terminology or considerations, indicate those that are associated with routing within a single ne
nexus9112 [7]
I believe your answer will be F. Intra domain routing
3 0
3 years ago
Read 2 more answers
Explain the security mechanisms available for a database and how the data will be protected.
Stolb23 [73]

Answer: Views, unauthorized access, encryption are some of the security mechanisms.

Explanation:

The database of any application or software contains all the important data, therefore it is utmost necessary to protect the data from falling into dangerous hands. Most databases use authentication measures in form of passwords or bio metrics to avail access. Besides these users can use views to see the data but cannot change anything into the database. Some databases also use encryption systems to encrypt the passwords for better safety. There are some databases which grants user with two types of privileges such as system and  object privileges, whereby with system privileges one can change the system environment variables.

8 0
3 years ago
To undo changes to the column width, right-click the field selector, click Field Width on the shortcut menu, and then click the
svetoff [14.1K]

Answer:

standard width

Explanation:

Based on the information provided within the question, to accomplish this you then click the standard width check box in the dialog box. This will adjust the column width back to the default specifications. The default width of all columns is 8.43 characters, which is roughly 64 pixels long.

4 0
3 years ago
Question #5<br> How does the computer decide which path to follow in a selection control structure?
konstantin123 [22]

Answer:

to answer your question in my thoughts the material of the coding structure helps the software or the cpu translate or guide the programming  .

Explanation:

6 0
3 years ago
Write a letter to your friend explaining about the geographical confitions of Nepal's hilly region​
cricket20 [7]
I don’t know your friend so you should be able to answer
3 0
2 years ago
Read 2 more answers
Other questions:
  • which of the following is not a name of one of the central features of Facebook timeline activity log Graph Search for Daily New
    6·1 answer
  • The act of engaging in crime through the use of a computer or similar type of device is called:
    8·1 answer
  • The laws governing search and seizure in the public sector are much more straightforward than those in the private sector. TRUE
    11·1 answer
  • How is technology closely linked to creativity
    15·1 answer
  • What is used to monitor the activity of a network and notify network administrators when it identifies something as suspicious?
    15·1 answer
  • Due to the difficult economic times, increased global competition, demand for customization, and increased consumer sophisticati
    9·1 answer
  • Explain the need for data structures when developing software.
    12·1 answer
  • photoshop Curves, photoshop an image and manipulate the curves on a selection of the photo. upload the original photo and The ph
    5·2 answers
  • The photo shows a group of girls reacting to comments they have read about a classmate on a social media site.
    10·1 answer
  • Please please help I don’t understand this
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!