1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Oduvanchick [21]
2 years ago
6

What is the purpose of each component ?

Computers and Technology
1 answer:
Ilya [14]2 years ago
4 0

Answer:Purpose of component questions ask you to identify why the author referred to something in a certain part of the text. In other words, what was the point of ...

Explanation:

You might be interested in
Select the correct answer. Larry finds it easy to run legacy programs and applications in a virtualized environment. How does th
muminat

The answer is B: installs and runs different versions of an operating system on the same computing device

Virtual machines are like guest operating systems or application environments that give you the perception that you are physically connected to a different box. A system virtual machine, for instance, copies all the components and processes of a real computer. It helps the user experiment with different operating systems and applications without the need to install them on your physical hardware.


8 0
3 years ago
Which element of the security policy framework requires approval from upper management and applies to the entire organization?A.
Sav [38]

Answer: A) Policy

Explanation:

Security policy framework is the regulations that are links the information security of an organization with the professionals and business .It maintains the responsibilities and documentation with security .

  • Policy is the document containing expectation,importance, requirement and scope of an organization about security .This security plan is high level document that need to be approved by higher management for implementation in company.
  • Other options are incorrect because standard principles, guidelines in form of regulation and procedure is the manner that is not required for to be permitted by higher management for being implemented on the business organization.
  • Thus the correct option is option(A).
8 0
3 years ago
In what century was plastic invented ?​
Angelina_Jolie [31]

in the year 1907 plastic was invented

5 0
2 years ago
Two independent customers are scheduled to arrive in the afternoon. Their arrival times are uniformly distributed between 2 pm a
seraphim [82]

Answer:

1/3

Explanation:

T₁ , T₂ , be the arrival times of two customers.

See expected time for the earliest and latest below.

The formulas used will guide you.

4 0
3 years ago
you have a website that customers use to view product information and place orders. You would like to identify the maximum numbe
notka56 [123]

Answer:

a load tester.

Explanation:

Based on the information provided within the question it can be said that in this situation the tool that you should use is known as a load tester. This tool allows you to test your servers in order to see how it behaves under both normal conditions as well as the anticipated peak load conditions that it may be encountering in the near future. Which is exactly what you need for your website.

4 0
3 years ago
Other questions:
  • Which of the following is not an impact device?<br> Joy Stick<br> Track Ball<br> Mouse<br> Printer
    10·1 answer
  • Assume that
    7·1 answer
  • When numbers are changed in cells that are involved in formula is the formulas are automatically
    14·1 answer
  • Microsoft has developed the Active Directory Domain structure so that a central authority, called the __________, is the reposit
    7·1 answer
  • Limitations of the information systems used by tesco​
    7·1 answer
  • Fill up the blank:- The picture that graphically represents the items you use in Windows is called a/an .......
    5·1 answer
  • 4.2 lesson practice last one plzs help
    5·2 answers
  • What is problem scoping
    14·1 answer
  • As a member of the help desk administration team, you've been assigned to update the driver for the network adapter that is inst
    15·1 answer
  • If there is a secure socket layer in place, what will you need in addition to a user id in order to access the shared files?.
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!