What does virtualization do?

What Does Virtualization Do?

Answers

Answer 1

Answer:I believe the answer is D.

Answer 2

Answer:

I would say C

Explanation:


Related Questions

What elements collect input?
What items display output?
Do you think there are elements that can do both?

Answers

Answer:

input devices : keyboard, touch , mouse

output devices : microphone monitor, printer

Cameras and Modem can be both output and input.

Sara is developing a website for her friends to share their art projects. She designed a sign-up process so a user can first create an account with a unique STUDENT ID as a username and then enter a valid email address for further communication. Answer plz

Answers

Answer:

Explanation:

The two main things that I believe should be changed would be to require that the new user create a password alongside the Student ID and remove the email address from the sign-up process, instead add the e-mail to the students profile. Doing so would make sure that every student has their own personal account and no-body else can enter their account and take credit for their work. Also, by having the email address in the students profile, anyone that likes their work can easily click on their profile to see their email and send them a message if they need to.

After completing step 4, Which cells will be yellow?

Answers

Answer:

its C i just got it wrong both times haha

Explanation:

do you feel me?
take a look inside my brain
the people always different but it always feels the same
thats the real me
pop the champagne
the haters wanna hurt me and im laughin at the pain

Answers

stayin still eyes close let the wound just pass me by, pain pills nice clothes if i fall i think i'll fly touch me midas, make me part of your design. None to guide us I feel fear for the very last time

emerging technology that is becoming popular among consumers

Answers

IoT. IoT is driving business changes by providing the data needed to improve marketing, increase sales, and decrease costs, the report found. ...
Artificial Intelligence (AI) ...
5G. ...
Serverless computing. ...
Blockchain. ...
Robotics. ...
Biometrics. ...
3D printing.

give an example of empty tags in HTML​?

Answers

Answer:

An "empty tag" refers to HTML coding where the line of code stands alone and is not closed with slash characters. Empty tags are used to insert images, lists, breaks, meta tags, horizontal rules and hyperlinks. Empty tags are bracketed by "<" and ">" characters. Empty tags do not have any outside content from other programs, and they only contain a single code to place something on a Web page.

Explanation:

The empty elements in HTML:

<area>

<base>

<br>

<col>

<colgroup> when the span is present

<command>

<embed>

<hr>

<img>

<input>

<keygen>

<link>

<meta>

<param>

<source>

<track>

<wbr>

In three to four sentences, describe how you would insert a graph in your word-processing document.

Answers

Answer:

First, go to Insert. Then click on Table. Choose how many rows and columns you would need, or you can click on Insert table and you can tell it how many rows and columns you need. Then press OK.

Explanation:

Windows can't find the driver for your digital camera. Where is the best place to find the driver?
Call the local camera store.
The manufacturer's website.
The Window's store.
Search the Internet.

Answers

B. The manufacturing website will be the easiest way to find the driver.

Answer:

The manufactured website

Explanation:

An accompaniment to raw vegetables and sometime potato chips and crackers.

Answers

Dips – accompaniment to raw vegetables, and sometime potato chips and crackers. Any mixture of spreads can be used as dips. Appetizers are finger foods usually served prior to a meal, or in between mealtimes, and are also called hors d’oeuvres, antipasti, or starters, and may range from the very simple to the very complex, depending on the occasion and the time devoted to making them. They’re a common accompaniment to aperitifs, cocktails served prior to a meal.

At dinners, banquets and the like, appetizers may be served prior to a meal. This is especially common at weddings when it takes time for the wedding party and guests to get to a reception after the marriage has taken place. Appetizers may be served at long parties that occur after a regular mealtime. A mid-afternoon party where there is no intent to serve dinner, or an evening party that occurs after dinner may feature appetizers so that guests can have the opportunity to snack. . Many restaurants feature a range of appetizers that are ordered just prior to a meal as a first course.

Answer:

give me more points

Explanation:

salanghye ✌️✌️

Column A contains numbers from rows 1 to 20. You can use the formula
the total number of values.
to find the value of the largest number divided by the total number of values

Answers

Answer:

you can use the formula =MAX(A1:A20)/COUNT(A1:A20)

Explanation:

The formula for finding the value of the largest number divided by the total number of values is as follows:

MAX(A1:A20)/COUNT(A1:A20).

What is meant by Formula?

The Formula may be defined as a type of equation or set of numbers that significantly represents how one amount depends on one or more other amounts with respect to the same sense.

According to the context of this question, suppose column A consists of numbers from rows 1 to 20. And you want to find the value of the largest number divided by the total number of values. You must find the maximum number with the formula MAX(A1:A20) and then count by the equation COUNT(A1:A20) and divide one another.

Therefore, the formula for finding the value of the largest number divided by the total number of values is well mentioned above.

To learn more about Formulas, refer to the link:

https://brainly.com/question/28488730

#SPJ5

A plug-in is:

a. a program that users must install on their computers to extend the computers'

functionality.

b. a program that users must associate with files on their computers to extend their

browsers' functionality.

c. a program that is launched by a browser to extend the browser's functionality.

d. a program that acts as a separate process when accessed.



3. Which of the following best describes online installation of a plug-in?

a. The user downloads the plug-in file, quits the browser and installs the file, but

does not restart the computer.

b. The user downloads the plug-in file, quits the browser and installs the file, then

must restart the computer.

c. Installation of the plug-in is performed with the browser open and may occur

without prompting the user.

d. The plug-in is already installed by default in the browser when the user installs

the browser initially.

Answers

Answer:

C.

Explanation:

As you know, you can download plug-ins, or extensions as I call them, to extend the browsers functionality. You can stop them by uninstalling them or going to the task manager and exiting out of the program.

Which situations are the most likely to use telehealth? Select 4 options.

A Your doctor emails you because of your heart monitor readings.

B You use your health app to request a refill on a prescription.

C You cut your hand badly when you broke a glass.

D You use a smartphone to upload your diet and exercise log.

E You go online to see test results.

Answers

Answer:

A,B,D,and E

Explanation:

Its not C because it doesn't have to do with virtual topics, such as the options I chose as answers. C is something you should take care of yourself, and if it gets worse you use telehealth to seek advice on what to do.

What is the missing line of code?
>>> sentence = "Programming is fun!"
ogr
O sentence[2:6)
O sentence[3:6)
O sentence[2:5)
O sentence[3:5)

Answers

Answer:

sentence[2:5]

Explanation:

In a paragraph of 125 words, write a sample response to this behavioral interview question: Describe a team project in which you were not the leader. Evaluate the strengths and weaknesses of the leader. Suggest one thing you would have done differently.

Answers

Answer:

A team situation when I wasn’t the leader would be when I was working as a lifeguard. I was the assistant manager and my manager made it clear to everyone to listen to him, not me so I might as well have been a regular lifeguard. As a leader he failed to be an example and to lead them in the right direction. He let the power kind of get to him and started to not do his own job and make everyone else do it. He would make himself appear productive when the supervisor would come in but other than that he was never actually doing his job. He was a very personable and confident person so it’s not a surprise my supervisor above him actually believed he was doing his job. But when i told our supervisor about it, he told me he had poor confrontational skills and that it was”drama”, so we couldn't exactly fix the problem.

The weakness of the leader was that he didn't carry the team along and this affected our performance.

A team project that I engaged in where I wasn't the leader was when I was in school and had a group project with my colleagues.

During the group project, the leader took all the decisions regarding the project and didn't allow the members have a say in the project. This eventually affected our performance as we had a low score.

The inability of us to work as a team has a negative impact on our score. If I was in such a position, I'll carry the team along, be honest and listen to the opinions of everyone. I'll also delegate tasks to make the work easier.

Learn more about a leader on:

https://brainly.com/question/12522775

Todds manager has asked him to write a report on ways to increase safety in the warehouse Todd use the Internet to research statistics in recommendations for improving safety in the workplace he feels like he put together a really strong document that is manager will be pleased however when he is called into the managers office his manager is concerned and tells him that he has been unethical in his work what did todd do

Answers

Answer:

Todd has likely committed plagiarism by not giving citations.

Explanation:

In This question Todd was asked to write a report. And he has used internet resources in his research but from the words of his manager it is very likely that He has committed plagiarism in his report since it is about ethics.

The act of plagiarism is committed when one uses the work(ideas, words, speech, writing) of others without any form of citations to acknowledge the original owner of the work. Plagiarism is unethical and it is considered as fraud. It is a punishable offence since it involves passing off someone else's work as your own idea.

Answer:

He likely did not cite his research, committed plagiarism

Stear Corp. decides to deposit $1,000 in its bank account. This cash was paid from the cash register of the company. What will be the entry made by the accountant in the company’s journal?

Answers

Answer:

This is the WRONG answer

Cash Account (debit) 1,000

Cash in Bank Account (Credit) 1,000

Explanation:

Which file extension indicates the file is a Microsoft Word document?
.doc
.dot
.ppt
.txt

Answers

Answer:

DOC

Extension Format

doc Microsoft Word document before Word 2007

docm Microsoft Word macro-enabled document

docx Microsoft Word document

dot Microsoft Word template before Word 2007

Explanation:

Doc ....... is a document

Name this Cartoon character and just get points I guess because I have no actual questions for the smart people out there so this question can help the people who aren't so smart because it's about cartoons!

Answers

Answer:

Baby PEPE

Explanation:

I gave it a name bc its cute

Answer:

BABY PEPE

Explanation:

Why is traversal with a for loop a good method for accessing and updating items in a lengthy list?

Answers

Answer:

Because you want to process every item in the list in a similar way, you can use a loop to iterate through every item and take some action with it.

Explanation:

hopefully this helped

A for loop provides a simple and efficient method of performing ;

a particular operation on every item in a specified range or listUsing every item in a list to achieve a certain objective.

The for loop method provides a straight forward process of picking items or values in a specified range one after the other.

The selected values in the range may be used to perform a particular operation such as multiplying each number in a range by another value.

When a specified task is to be accomplished requiring that items in a certain range are required, then a for loop provides the convenience to achieve such task.

Therefore, for loops are very popular in programming due to their capability in handling repetitive task on a range of items.

Learn more :https://brainly.com/question/18768438

Protocol layering can be found in many aspects of our lives such as air travelling. Imagine you make a round-trip to spend some time on vacation at a resort. You need to go through some processes at your city airport before flying. You also need to go through some processes when you arrive at the resort airport. Show the protocol layering for the round trip using some layers such as baggage checking/claiming, boarding/unboarding, takeoff/landing.

Answers

Answer:

From the Greek protókollon, it means "first sheet glued to the papyrus rolls, and on which a summary of the manuscript's content was written", and today, according to the same source, it means, among other things, "international convention ". But what interests us most is the definition of a communication protocol, which is: "Set of rules, standards and technical specifications that regulate the transmission of data between computers by means of specific programs, allowing the detection and correction of errors; data transmission".

Explanation:

The flowchart is attached.

A _____________ is a piece of information sent to a function.

Answers

Answer:

argument

Explanation:

 

A research lab in San Francisco has built a robot that is able to walk, talk, and interact with humans. The robot is built of small bits of metal and plastic, which, when put together, create the circuits, pistons and support structures that organize the robot’s interior. These circuits, pistons and support structures are divided into a collection of working parts based on the jobs that they perform together. For example, some are information parts, some are signal parts, and some are movement parts. These collections of working parts are further organized into groups to perform a specific job related to a key task, such as moving the robot body. Together, all of the groups make the whole robot function in some ways like a living thing.

What part of the robot is most similar to the organ level of a live human?

A: Small Bits
B: Circuits, Pistons, and Support Structures
C: Collections
D: Groups

Answers

Answer:

is it

Explanation:

Answer:

the answer would be C.

Explanation:

If oldSeq is "1100000111" and segment is "11", then "00000111" should be stored in newSeq. If oldSeq is "0000011" and segment is "11", then "00000" should be stored in newSeq. If oldSeq is "1100000111" and segment is "00", then "11000111" should be stored in newSeq. Write the code segment below. Your code segment should meet all specifications and conform to the examples.

Answers

Answer:

Written in Java

The complete program is as follows:

import java.util.Scanner;

public class RemoveString{

public static void main(String [] args){

String oldSeq, newSeq, segment;

Scanner input = new Scanner(System.in);

System.out.print("oldSeq: ");

oldSeq = input.next();

System.out.print("Segment: ");

segment = input.next();

newSeq=oldSeq.replaceFirst(segment, "");

System.out.print("newSeq: "+newSeq);

}

}

Explanation:

This line declares necessary variables

String oldSeq, newSeq, segment;

Scanner input = new Scanner(System.in);

This line prompts user for oldSeq

System.out.print("oldSeq: ");

This line gets oldSeq

oldSeq = input.next();

This line prompts user for Segment

System.out.print("Segment: ");

This line gets segment

segment = input.next();

This line computes newSeq and it works perfectly for the given instances in the question

newSeq=oldSeq.replaceFirst(segment, "");

This line prints newSeq

System.out.print("newSeq: "+newSeq);

I WILL MARK BRAINLIEST!!!!!!!! PLZ HELP GUYS AND GIRSL.

Answers

Answer:

I would say the best answer is logic gates

Explanation:

Which sequence of transformations proves that shape I is similar to shape II
A. a 90° counterclockwise rotation about the origin, and then a dilation by a scale factor of 2

B. a reflection across the x-axis, and then a dilation by a scale factor of 3

C. a reflection across the x-axis, and then a dilation by a scale factor of 2

D. a 90° counterclockwise rotation about the origin, and then a dilation by a scale factor of 3

Answers

Answer:

The answer is B :)

Explanation:

Answer:

b

Explanation:

What is the output of the following program?
if<- 1
repeat
j+1
repeat
display i *j
j<- j+2
until j = 5
if <- i +1
until i = 5

Answers

What subject is this for I’m kind of lost here

Instructions
Test if a number grade is an A (greater than or equal to 90). If so, print "Great!"
Hint: Grades may be decimals.
Sample Run
Enter a Number: 98.5
Sample Output
Great!

Answers

In python 3:

grade = float(input("Enter a Number: "))

if grade >= 90:

   print("Great!")

Following are the Program to check the input value:

Program Explanation:

Defining the header file.Defining a main method.Inside the method a float variable "num" is declared that inputs the value.After input the value a conditional statement is defined num value greater than equal to 90, if its true it will print the message "Great! ".

Program:

#include <iostream>//header file

using namespace std;

int main()//main method

{

   float num;//defining a variable

   cout<<"Enter a Number:";//print message

   cin>>num;//input value

   if(num>= 90)//defining if block that checks num value greater than equal to 90

   {

       cout<<"Great!";//print message

   }

   return 0;

}

Output:

Please find the attached file.

Learn more:

brainly.com/question/14267584

What is an error code?

A.)numbers that are used to identify a specific type of computer error in a program

B.)numbers that are used to count the number of times a specific error occurs

C.)a programming language that is used to creat error messages

D.)a programming language that is used to troubleshoot error messages​

Answers

Answer:

A

Explanation:

The error code is a specific number that identifies what the error is to the system. ... It also can be helpful in finding a resolution to the problem. If you're getting an error code, search for the error code number and where you're getting the error to find a resolution.

Answer:

In computer programming, a return code or an error code is a numbered or alphanumeric code that is used to determine the nature of an error, and why it occurred. So, B.

Explanation:

HELP FAST PLZZZ. Madison loves to play multi-user games with very realistic graphics. How much RAM should she have in her laptop??
Group of answer choices

6 GB

8 GB

16 GB

4 GB

Answers

Answer:

16.

Explanation:

Explain why IT has become a vital part of all business?​

Answers

Answer:

IT has become part of a major role in businesses is because technology has evolved over the past decades. It helps businesses keep their safety from viruses and other malicious attacks. Also, it provides tools for businesses to complete their work.

Explanation:

Other Questions
You are a supervisor at a health clinic, and two of your staff members are in adisagreement over their duties. What is the first step you should take in orderto help them resolve their conflict?A. Consider your company's code of conduct and whether theconflict violates it in any way.B. Ask the coworkers to identify why their opinion is more importantthan the other person's opinion.C. Ask the coworkers how they will prevent future conflict.D. Decide which person you agree with more. read these lines from act 1 scene V of Romeo and Juliet.Juliet: then have my lips the sin that they have took.Romeo: send from my lips? O trespass sweetly urg'd!Juliet: you kiss by the book.Shakespeare uses the structure of these lines to.A. explain the great differences between feuding families.B. demonstrate the playful affection of a new relationship.C. persuade readers that kissing is sinful Behavior.D. Contra is Romeo's impulsiveness with Juliet calm Neil buys a refrigerator that costs him $995 plus a 9.3% sales tax rate. what is the sales tax of the retail purchase. round to two decimal place I need help ASAP.......... How is the number of states electors determined? match each part of a virus with the best description of it. Respond truthfully using information from the reading. I did some don't know if it's right pls help me i dont need the work shown i just need the answer Give the letter of the equation that matches the graph. PLZZZZZZZZZZZZZZZZZ HELP ME WITH THIS IT DUE TODAY and explain!!!!!1 is the first image question2 is second image question3.-(- )-3(-2) A line includes the points (-7, -4) and (-3, -8). What is its equation in point-slope form?Use one of the specified points in your equation. Write your answer using integers, properfractions, and improper fractions. Simplify all fractions. Who still uppppppppp PLZ HELP FASTWhich statements describe Sharia? Choose four correct answers.It is Islamic law.It draws from the Quran and the Sunna.It is contained in a set of writings and opinions.It provides guidance for society and for personal behavior.It is a record of stories that describe Muhammads life and actions.It is the holy book of Islam that was revealed to Muhammad, according to Islamic tradition. Select all names that apply.100100AwholeBrealrationalDInteger bro i got the name ovhs lol but heres a 100 point gveawayy The Greater Seminole fields became a top US oil producer in the 1920s. This caused a spike in population in the town ofSeminole and ____ Write an equation of the line that passes through (-1, 3) and has a slope of -4.HELPPP Bm2= 540(4.x - 10)(2x + 7)(741-25) A factory makes 50 cauldrons in 4 hours. What is the unit rate? The first Tacoma Narrows Bridge in Washington crossed over a strait in Puget Sound. At the time the suspension bridge was built, construction workers noticed that it moved up and down in the wind. Measures to stop the bridge's movement were ineffective, but the bridge was opened to the public on July 1, 1940. The bridge collapsed on November 7, 1940. Luckily, no people were seriously injured. Determine which technological design criteria the Tacoma Narrows Bridge did and did not meet. Explain your answer.