1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nady [450]
2 years ago
8

You have received an update package for a critical application you are running on a virtual machine. You have been told to insta

ll the update package and that you cannot very little downtime. What should you do first?
Computers and Technology
1 answer:
erastovalidia [21]2 years ago
6 0

The first thing to do install the package without having downtime is; Virtualization.

<h3>What is virtualization? </h3>

Virtualization is defined as the ability to install and run multiple operating systems simultaneously on a single physical computer virtually.

Now, virtualization has many advantages for server administrators. This is because as an administrator, your job is made easier due to the several tasks you can perform on a virtual machine instead of on a physical machine.

Since there should be no down time, then it is advisable to first carry out virtualization.

Read more about virtualization at; brainly.com/question/26462832

You might be interested in
Which type of communication protocol converts data into standard formats that can be used by applications?
larisa86 [58]
<span>Arrival protocols are the type of data protocols that convert data into standard formats that can be used by applications, such as email, Web browsers and Skype</span>
8 0
3 years ago
A researcher wants to do a web-based survey of college students to collect information about their sexual behavior and drug use.
finlep [7]

The answer is already given at the end of the question; solely by the magnitude or severity of expected harm

When assessing risks of harm associated with participation in a research study, the probability of harm and the risk of the severity of harm are two distinctive elements of risk that must be considered. In probability of harm, the fact that not all possible harms are equally probable should be considered. How these two elements occur is a crucial factor in determining the level of risk of harm in a study. Given the sensitivity of the information in the case scenario above, the probability that an individual subject could be identified is low while the magnitude of the possible risk of harm is high.


5 0
3 years ago
Read 2 more answers
Where can I find answer key for electrician systems based on NEC 2017
lisov135 [29]

google or search through pvps

6 0
3 years ago
Type the correct answer in the box. Spell all words correctly.
Pie

Answer:

Eveidence

Explanation:

<3

7 0
2 years ago
Read 2 more answers
This program needs to be written in Java. Along with NO For/while loops, and no methods.
Umnica [9.8K]
The only way without a while loop and no method I can think of is use switch with every possible variation of the four digit binary which is 15.

Here is the starter code:

import java.util.Scanner;
public class MyClass {
public static void main(String args[]) {
Scanner sc = new Scanner(System.in);
int digit = sc.nextInt();
switch(digit) {
case 0000:
System.out.println("0");
break;
case 0001:
System.out.println("1");
break;
case 0010:
System.out.println("2");
break;
case 0011:
System.out.println("3");
break;
case 0100:
System.out.println("4");
break;

… (fill in other cases)


}
}
}

Use this link: https://www.electronics-tutorials.ws/binary/bin_3.html

There might be a better way, but without loops or methods this is all I got.
6 0
2 years ago
Other questions:
  • What is a motherboard?
    6·2 answers
  • Chat messages are most likely to be found where on a computer? firewall nic internet history ram
    7·1 answer
  • Explain the history of computing of mechanical era
    14·2 answers
  • You decide to begin your presentation by providing your audience an overview of networking, with an emphasis on security and why
    11·1 answer
  • For the past three years, the interviews conducted at Gavallet, an e-commerce site, have been following the same pattern. Candid
    9·1 answer
  • Consider a system consisting of m resources of the same type, being shared by n processes. Resources can be requested and releas
    13·1 answer
  • Describe the difference between the while loop and the do-while loop.
    7·1 answer
  • Which button do you click to add up a series of numbers
    10·1 answer
  • For a direct-mapped cache design with a 64-bit address, the following bits of the address are used to access the cache
    7·1 answer
  • Write 3 3 advantage and disadvantage of computer​
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!