1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nady [450]
3 years ago
8

You have received an update package for a critical application you are running on a virtual machine. You have been told to insta

ll the update package and that you cannot very little downtime. What should you do first?
Computers and Technology
1 answer:
erastovalidia [21]3 years ago
6 0

The first thing to do install the package without having downtime is; Virtualization.

<h3>What is virtualization? </h3>

Virtualization is defined as the ability to install and run multiple operating systems simultaneously on a single physical computer virtually.

Now, virtualization has many advantages for server administrators. This is because as an administrator, your job is made easier due to the several tasks you can perform on a virtual machine instead of on a physical machine.

Since there should be no down time, then it is advisable to first carry out virtualization.

Read more about virtualization at; brainly.com/question/26462832

You might be interested in
Your ___ can provide hardware firewall protection for your home network where it connects to the ISP's network, just as ISP netw
zalisa [80]

Answer:

router.

Explanation:

Router is the main connection for a house network to the Internet, the firewall function is combined to the router. Every house network must have a firewall to protect their privacy.

The router provides the hardware firewall while the windows provides the software firewall.So the answer to this question is router.

5 0
3 years ago
Discuss the technologies that implements an infrastructure for component communication
Akimi4 [234]

Explanation:

Consulting and system integration services are relied on for integrating a firm's legacy systems with new technology and infrastructure and providing expertise in implementing new infrastructure along with relevant changes in business processes, training, and software integration. Legacy systems are generally older transaction processing systems created for mainframe computers that continue to be used to avoid the high cost of replacing or redesigning them.

THE IT INFRASTRUCTURE ECOSYSTEM

There are seven major components that must be coordinated to provide the firm with a coherent IT infrastructure. Listed here are major technologies and suppliers for each

4 0
3 years ago
Discuss the OSI Layer protocols application in Mobile Computing
Oduvanchick [21]

Answer:

The OSI Model (Open Systems Interconnection Model) is a conceptual framework used to describe the functions of a networking system. The OSI model characterizes computing functions into a universal set of rules and requirements in order to support interoperability between different products and software.

7 0
3 years ago
The Internet is a hierarchical structure linking different levels of service providers whose millions of devices supply all the
STatiana [176]

Answer:

Explanation:

These are the three diffrent levels listed below;

1) NSP (National Service Provider)

2) RSP (Regional Service Provider)

3) ISP (Internet Service Provider)

4 0
3 years ago
What are the parts to an
bazaltina [42]

Answer:

B) recipient subject body signature

5 0
3 years ago
Other questions:
  • When studying an information system, illustrations of actual documents should be collected using a process called _____.
    12·1 answer
  • Jennifer frequently uses a few programs on her laptop. Where will she find all the frequently used program icons in her computer
    13·1 answer
  • Why can a "group by" or "order by" clause be expensive to process? What is the difference between a where and having clause?
    14·1 answer
  • Assume that strikeCounter has already been declared to be a "pointer to int". Assume further that strikeCounter has been initial
    5·1 answer
  • Administrators who are wary of using the same tools that attackers use should remember that a tool that can help close an open o
    6·1 answer
  • Convert 11/10 to Decimal​
    14·1 answer
  • An IP packet to be transmitted by Ethernet is 60 bytes long, including all its headers. If LLC is not in use, is padding needed
    15·1 answer
  • Given the following word addresses: 3, 180, 43, 2,191, 88, 190, 14, 181, 44, 186, 253
    15·1 answer
  • 2.
    9·1 answer
  • A(n) _____ is a data validation rule that should be applied to mandatory data items.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!