1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vampirchik [111]
3 years ago
14

I'll mark you the brainlest please help

Computers and Technology
2 answers:
nikklg [1K]3 years ago
3 0

Hello There!

<u>ANSWER:</u>

<u></u>

C.

Hopefully, this helps you!!

AnimeVines

Fynjy0 [20]3 years ago
3 0

Answer:

Yeah, the answer is definitely C.

You might be interested in
Destinguish between qualitative data and quantitave
Elden [556K]

For quantitative data, notice the root word 'quantity', which focuses on the amount of something, for example, there are more players on team a than on team b.

For qualitative data, notice the root word quality. Qualitative data focuses on the condition or state of something rather than the amount, for instance, player a does not run as fast as player b.

Hope this helped.

4 0
3 years ago
Quick!<br>who can solve this?<br><br>:}<br>:}<br>:}<br>:}<br>:}​
Musya8 [376]

Answer:

1.server

2.container

3.empty

4.lead

5.body

6.conttribute

i just know this much

sry

4 0
2 years ago
What is Virtual Storage Configuration and Management, as well as Virtual Machine Management?
AveGali [126]

Answer:

Virtual storage configuration and management refers to the process of configuring and managing the storage resources of a virtualized environment. This typically involves creating and configuring virtual disks, assigning storage space to virtual machines, and managing the allocation of storage resources among different virtual machines.

Virtual machine management, on the other hand, refers to the process of managing the virtual machines in a virtualized environment. This typically involves creating and configuring virtual machines, installing and configuring operating systems and applications on the virtual machines, and managing the allocation of computing resources such as CPU, memory, and network bandwidth among different virtual machines.

An example of virtual storage configuration and management would be creating a virtual disk with a specified size and assigning it to a virtual machine to use as its primary storage. An example of virtual machine management would be creating a new virtual machine with a specified operating system and allocated resources, and then installing and configuring applications on it.

Both virtual storage configuration and management and virtual machine management are important tasks in a virtualized environment, as they help to ensure that the virtual machines have access to the necessary storage and computing resources to function properly. These tasks are typically performed by system administrators or other IT professionals who have expertise in virtualization and IT infrastructure management.

7 0
2 years ago
Why is being distracted by the sights and sounds of our devices dangerous?​
11111nata11111 [884]

Answer:

because we lose our reflexes and our lucidness... if we r in our devices we dont see the world. we dont see the dangers we dont see or feel what we need to to survive. we find safety in things like electronics but they will never help us when it comes to real life problems. like if we are going to get hit by a car we are reading our phone not looking at our surroundings not listening to the warnings.

Explanation:

hope this helps

8 0
3 years ago
What term refers to a hacker that uses
miss Akunina [59]

Answer:

Hacktivist

Explanation:

A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denialof- service attacks.

5 0
2 years ago
Other questions:
  • Which trait depicts honesty?
    10·1 answer
  • Which lossless image type is best suited for webpages but it’s not suitable to print
    8·1 answer
  • A Chief Information Security Officer (CISO) needs to establish a KRI for a particular system. The system holds archives of contr
    13·1 answer
  • If you download a virus onto ur computer which is the best way to get rid of it
    9·2 answers
  • The current standard for RFID is based off of Group of answer choices MIT standards IEEE standards ISO standards there is no agr
    12·1 answer
  • Drivers are concerned with the mileage obtained by their automobiles. One driver has kept track of several tankfuls of gasoline
    10·1 answer
  • Write a program that takes a first name as the input, and outputs a welcome message to that name.
    9·1 answer
  • Cual es la constante de proporcionalidad de la función f(x)= 4x-6 ​
    7·1 answer
  • In excel online what is it called when you join connecting cells together to span across more than one column and/or row?
    7·2 answers
  • 1. Give one reason why data is represented in binary in a computer [1]
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!