1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Daniel [21]
2 years ago
8

WILL MARK BRAINLIEST WORTH ALOT OF POINTS! HELP ME GET THIS DONE

Computers and Technology
1 answer:
Ann [662]2 years ago
6 0

Answer:

When you get home and pay your bill over your internet banking, you have no idea where this information is going through. When you send a picture to your friend that lives across the street, that information can go to Germany and back before reaching your friend. Everything seems and feels so simple and intuitive, but it all happens in the dark and we have no control. Privacy doesn't exist in the internet for any of us in our daily routine and it is naive to think otherwise. A password doesn't protect my privacy, it gives me the illusion of privacy.

Explanation:

You might be interested in
The main thing that adjusting the aperture controls when taking an image is?
Pani-rosa [81]
The temperature controller
6 0
3 years ago
what component of virtualization controls all physical memory, and thus has the ability to make any unused memory pages in each
svlad2 [7]

Since the hypervisor, a component of virtualization, is in charge of managing all physical memory, it can make any memory pages left over in each guest virtual machine available to other virtual machines or the host computer.

<h3>What Exactly Is A Hypervisor?</h3>

A hypervisor is a class of computer software, firmware, or hardware that builds and manages virtual machines (also known as a virtual machine monitor, VMM, or virtualizer). A host machine is a computer on which a hypervisor is running one or more virtual machines, and a guest machine is a specific virtual machine. The hypervisor controls how the guest operating systems are executed and provides them with a virtual operating environment. The visitor often uses the native hardware to carry out instructions, unlike an emulator. The virtualized hardware resources may be shared by several instances of various operating systems. For instance, Linux, Windows, and macOS instances can all operate on a single real x86 computer. Contrastingly, with operating-system-level virtualization, each instance (often referred to as a container) only needs to share a single kernel, while the guest operating systems—such as various Linux distributions using the same kernel—can differ in user space.

To know more about Softwares, visit:

brainly.com/question/1022352

#SPJ4

6 0
1 year ago
A school operated for the express purpose of giving its students the skills
miss Akunina [59]

Answer:

vocational school

Explanation:

These vocational schools are institution postsecondary and job training, these schools offer quickly programs, but with the knowledge to work in a company, if we're talking about technology programs we can consider, programming, network administrator, technician.

These institutes are for people like:

  • People without work experience
  • People want to start a new career
  • People want to reenter to the working market
3 0
3 years ago
Hdhdhrhdh you are not the intended recipient. xmp-qite-xsy.​
Aleks04 [339]

Answer:

ummmm... okay

Explanation:

3 0
3 years ago
How does modularity provide flexibility in a structured programming design?
Elanso [62]

Modular programming is the process of subdividing a computer program into separate sub-programs. Modularity provides flexibility in a structured programming design the following way: Modularity enables multiple programmers to work on a program at the same time. Correct answer: A

It provides developers flexibility in module maintenance.This makes the program easier to read and understand.

4 0
3 years ago
Other questions:
  • How useful do you find the creation of folders in your computer?
    8·2 answers
  • What is ment by creative middle way solution
    6·1 answer
  • Describe what is meant by the following:
    14·1 answer
  • A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________. Select one: A. assume your i
    6·1 answer
  • A Tracking Gantt chart is based on the percentage of work completed for project tasks or the actual start and finish dates. True
    12·1 answer
  • Which of the selections below is not a benefit of imaging the computers on your network? There are fewer licensing fees because
    11·1 answer
  • 9.1.3: Printing vector elements with a for loop. Write a for loop to print all NUM_VALS elements of vector courseGrades, followi
    5·1 answer
  • What allows users to connect via the Internet to its private network?
    11·2 answers
  • Small data files that are deposited on a user's hard disk when they visit a website are called _______.
    6·2 answers
  • Please help it’s timed
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!