1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Kobotan [32]
2 years ago
13

In an interview, Tom was asked to give a brief on how containers perform virtualization. How should Tom reply

Computers and Technology
1 answer:
defon2 years ago
6 0

There is great improvement in technology. Tom should reply that Containers uses Containers use operating system (OS) components for virtualization.

  • That is a kind of operating system (OS) virtualization where leverage features is placed on the host operating system so as to separate or isolate processes and control the processes' access to CPUs, memory and desk space.

Container based virtualization often makes use of the kernel on the host's operating system to run multiple guest instances. By this, one can run multiple guest instances (containers) and each container will have its specific root file system ascribe to it, process and network stack.

Learn more from

brainly.com/question/24865302

You might be interested in
A list is a collection that ______________
BigorU [14]

Answer:

free points?

Explanation:

jk d

5 0
3 years ago
Why when i do a speed test is my internet download speed slower when downloading a game
Vitek1552 [10]

Answer:

because if your doing a test it will be easier for the computer to understand and recognize if you are trying to download a game then it is more Data and it has to download witch takes time because its new

4 0
3 years ago
What kind of networking is only for the use of people within the company
zaharov [31]
LAN = Local Area Network
6 0
3 years ago
Read 2 more answers
Susan is assisting a web designer to create a promotional web page on eco-friendly classroom designs. She uses color combination
Nadusha1986 [10]

Answer:

D. Complementary Color Chord

Explanation:

I took the test

8 0
3 years ago
what type of authentication does the dod require to accesss sensitive data on mobile devices and /or email
nikklg [1K]
Dod required a car to access data gahagsgssgsg
3 0
3 years ago
Read 2 more answers
Other questions:
  • Which Internet appliance can take action to potentially stop a network attack from taking place?
    6·1 answer
  • How should you decide what to wear to an interview? What kind of things should be considered?
    5·1 answer
  • Charles is having a lot of problems with errors in a very complicated spreadsheet that he inherited from a colleague, and he tur
    8·1 answer
  • ​what is the best advice to follow when using texting or instant messaging (im) in the workplace
    5·1 answer
  • Next, Sue decides to embed a chart from Microsoft Word. She copies and pastes data from a table that she has already created in
    8·1 answer
  • What is the function of this logical comparator! =?
    8·1 answer
  • How do I mark brainlyist
    7·2 answers
  • What is 11x12x12x14x15x16
    7·1 answer
  • A common business practice is to include a worksheet named Documentation that contains a description of the workbook, the name o
    7·1 answer
  • How could each of the two-proposed changes decrease the size of an mips assembly program? On the other hand, how could the propo
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!