1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Shkiper50 [21]
3 years ago
9

You are running a virtual machine that must boot through the network adapter and provide the best networking performance. Which

type of virtual machine and virtual network adapter should you choose?
a. Generation 1, synthetic
b. Generation 2, synthetic
c. Generation 1, emulated
d. Generation 2, emulated
(THIS IS FOR MY EXAM)
Computers and Technology
1 answer:
VMariaS [17]3 years ago
8 0
The answer I got is b generation 2, synithetic

You might be interested in
Create a database with information about products in a catalog. As you plan, keep in mind that later you will want to sort this
nika2105 [10]

pro.no. Qty  Price  Description

1            23   1.00     Apple

2           90   1.00     Banana

3           16    1.00     Orange

4           124  1.00     Pear

5           98   1.00     Blue Berry

6           25   1.00     Raspberry

7           76   1.00     Black Berry

8           00   1.00     Pineapple

9           231  1.00     Green Grape

10          689 1.00     Red Grape

11           2      1.00     Watermellon

3 0
3 years ago
Read 2 more answers
Christina has been asked by the firewall administration group to identify secure network protocols that can be used to prevent n
kotegsom [21]

Answer:

SSH, HTTPS and SMTP

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.

Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.

Hence, SSH, HTTPS and SMTP are considered as secure network protocols.

HTTPS is acronym for Hypertext Transfer Protocol Secure while SSL is acronym for Secure Sockets Layer (SSL).

SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services.

6 0
3 years ago
Software on your computer is taking a long time to load. What could help solve this problem?
Andrei [34K]

Answer: close the program and reopen it.

Explanation: This is one of the 5 common problems in a computer.  When a program wont load, Try closing and reopening the program.

Reboot the computer.

Check for known issues on the web or updates to the software.

Use Task Manager (Ctrl+Alt+DEL) if program is non-responsive to "end task."

4 0
3 years ago
I need this ASAP anyone pleas help me i have to do this by tonight
tigry1 [53]

Answer:

IDk

Explanation:

8 0
3 years ago
Which type of computer network ensures high security
Gwar [14]

Answer:

I elieve the answer for this is Juniper Network Firewall

Hope this helps

3 0
3 years ago
Other questions:
  • You are in charge of designing a menu tree for navigating 1,250 books in a digital library. Present an argument of whether the m
    12·1 answer
  • What is the name of the option in most presentation applications with which you can modify slide elements?
    14·1 answer
  • What protocol suite below is the most commonly used protocol for local area network (lan) communication?
    8·1 answer
  • You can apply several different worksheet themes from which tab?
    10·2 answers
  • Which of these is the largest?<br> terabyte<br> exabyte<br> gigabyte<br> kilobyte<br> PLEASE HELP
    5·1 answer
  • Select the correct answer.
    13·1 answer
  • What is NOT a built-in function in python?<br> sqrt()<br> string()<br> fabs()<br> O print()
    12·2 answers
  • Which of the following statements is/are correct? a. At the network layer, entitlement can map identity and/or attributes to fun
    8·1 answer
  • I really need help in this!!!
    11·1 answer
  • What happens when you restrict someone on messenger?.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!