True or False: One benefit of virtualization is that it allows for better use of already existing hardware that may not be seeing full utilization.

Answers

Answer 1

Answer:

True.

Explanation:

Virtualization can be defined as a technique used for the creation of a virtual platform such as a storage device, operating system, server, desktop, infrastructure or computing resources so as to enable the sharing of resources among multiple end users. Virtualization is usually implemented on a computer which is referred to as the "host" machine.

Generally, to use the virtualization technology on a computer, it must be enabled in the BIOS/UEFI).

Additionally, VMware tools can be installed on host computers to check which processes are having high CPU usage by using vimtop, as well as checking if vCenter Server is swapping.

Hence, one benefit of virtualization is that it allows for better use of already existing hardware that may not be seeing full utilization. Hardware components such as storage devices, central processing unit (CPU), random access memory (RAM), host computers are extensively put into use.


Related Questions

how would i change this:
" try:
userChoice = input("Would you like to Add or Multipy?(A/M): ")
except:
print("Please enter 'A' or 'M'") "

so it only allows me to put "A" or "M" so that it runs the except part

Answers

You wouldnt use a try and except statement. Use a loop.

In case of a suspected data breach, what course of action should a chief information security officer (CISO) take

Answers

Answer

1. Assemble his team

2. Find reason for breach

3. Evaluate what was lost

4. Ensure password change

Explanation:

In case of a suspected breach, the Chief information security officer should first of all assemble his incidence response team. This team should have representatives from all areas of the organization.

Then the reason for the breach and how access was gained has to be found out. An evaluation of what has been lost in the breach would be carried out and it's likely impact on the company.

In case credentials were stolen the CISO has to ensure that the employees change passwords. Also he has to notify all the necessary parties about the breach.

The CISO has to ensure that all employees are trained properly on security and they comply to security policies.

What occurs during the mail merge process? Place the steps in the correct order.

Specify which records to

Insert merge fields.

Preview, print, or email the Connect to a data source.

Create the main

include

document

document


ANSWER:

1. creat the main document

2. connect to a data source

3. specify which records to include

4. insert merge fields

5. preview, print, or email the document

Answers

Answer:

1. Create the main document

2. Connect to a data source

3. Specify which records to include

4. Insert merge fields.

5. Preview, print, or email the document.

Explanation:

Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users type, format and save text-based documents.

A Mail Merge is a Microsoft Word feature that avails end users the ability to import data from other Microsoft applications such as Microsoft Access and Excel. Thus, an end user can use Mail Merge to create multiple documents (personalized letters and e-mails) at once and send to all individuals in a database query or table.

The sequential steps of what occurs during the mail merge process are;

1. Create the main document

2. Connect to a data source

3. Specify which records to include

4. Insert merge fields.

5. Preview, print, or email the document.

Answer:

1.Create the main document

2.Connect to a data source

3.Specify which records to include.

4.Insert merge cells

5.Preview, print, or email the document.

Explanation:

Just did it on e2020

Write a python program that: - Defines a tuple of 5 integer numbers - prints the tuple - Appends a new value to the end of the tuple - prints the tuple again Please note that appending a new value to a tuple will change the tuple. However, as you learned in Unit 5, tuples are immutable i.e. do not change. Therefore, to solve this problem, you need to find a way to change a tuple.

Answers

Answer:

The program is as follows:

my_tuple = (1,2,3,4,5)

print(my_tuple)

mylist = list(my_tuple)

mylist.append(6)

my_tuple = tuple(mylist)

print(my_tuple)

Explanation:

This defines a tuple of 5 integers

my_tuple = (1,2,3,4,5)

This prints the tuple

print(my_tuple)

To add new element to the tuple; First, we convert it to list. This is done below

mylist = list(my_tuple)

Then, an item is appended to the list

mylist.append(6)

The list is then converted to tuple

my_tuple = tuple(mylist)

This prints the tuple

print(my_tuple)

how do I make my own algorithms ​

Answers

Answer:

Step 1: Determine the goal of the algorithm. ...

Step 2: Access historic and current data. ...

Step 3: Choose the right model(s) ...

Step 4: Fine tuning. ...

Step 5: Visualise your results. ...

Step 6: Running your algorithm continuously.

Get a basic understanding of the algorithm.
Find some different learning sources.
Break the algorithm into chunks.
Start with a simple example.
Validate with a trusted implementation.
Write up your process.

Two time series techniques that are appropriate when the data display a strong upward or downward trend are ___________ and ___________. Group of answer choices

Answers

Answer:

adjusted exponential smoothing; linear regression.

Explanation:

A time series can be defined as a technique used in statistical analysis and it involves indexing sets of data elements in a timely or successive order i.e sequentially.

Two time series techniques that are appropriate when the data display a strong upward or downward trend are adjusted exponential smoothing and linear regression.

An adjusted exponential smoothing is a statistical technique used for forecasting through the calculation of the weighted average of an actual value.

Write code to play a Tic-tac-toe tournament. Tic-tac toe is a game for two players who take turns marking the spaces with Xs and Os in a 3x3 grid. The purpose of the game is to place three of your marks in a horizontal, vertical or diagonal.

Answers

Answer:

Explanation:

The following code is written in Python and is a full Two player tic tac toe game on a 3x3 grid that is represented by numbers per square.

# Making all of the main methods of the game

board = [0,1,2,

        3,4,5,

        6,7,8]

win_con = [[0,1,2],[3,4,5],[6,7,8],

           [0,3,6],[1,4,7],[2,5,8],

           [0,4,8],[2,4,6]] # possible 3-in-a-rows

def show():

   print(board[0],'|',board[1],'|',board[2])

   print('----------')

   print(board[3],'|',board[4],'|',board[5])

   print('----------')

   print(board[6],'|',board[7],'|',board[8])

def x_move(i):

   if board[i] == 'X' or board[i] == 'O':

       return print('Already taken!')

   else:

       del board[i]

       board.insert(i,'X')

def o_move(i):

   if board[i] == 'X' or board[i] == 'O':

       return print('Already taken!')

   else:

       del board[i]

       board.insert(i,'O')  

 

# Creating the main loop of the game

while True:

   turn_num = 1

   board = [0,1,2,3,4,5,6,7,8]

   print('Welcome to Tic-Tac-Toe!')

   print('AI not implemented yet.')

   while True:

       for list in win_con: #check for victor

           xnum = 0

           onum = 0

           for num in list:

               if board[num] == 'X':

                   xnum += 1

               elif board[num] == 'O':

                   onum += 1

               else:

                   pass

           if xnum == 3 or onum == 3:

               break

       if xnum == 3 or onum == 3: # break loops

           break

       if turn_num > 9: # Check if there are any more moves available

           break

       show()

       if turn_num % 2 == 1:

           print('X\'s turn.')

       else:

           print('O\'s turn.')

       move = int(input('Choose a space. '))

       if turn_num % 2 == 1:

           x_move(move)

       else:

           o_move(move)

       turn_num += 1

   if xnum == 3:  #If game ends

       print('X Won!')

   elif onum == 3:

       print('O Won!')

   else:

       print('Draw!')

   play_again = input('Play again? Y or N ')

   if play_again == 'Y' or play_again == 'y':

       continue

   else:

       break

An alternative design for a canary mechanism place the NULL value just below the return address. What is the rationale for this design decision

Answers

Answer:

This is to prevent attacks using the strcpy() and other methods that would return while copying a null character.

Explanation:

Canary is a mechanism used to monitor and prevent buffer overflow. The alternative canary design that places a null value just before the return address is called the terminator canary.

Though the mechanism prevents string attacks, the drawback of the technique is that the value of the canary is known which makes it easy for attackers to overwrite the canary.

Explain the three major Subassembly
of a computer Keyboard​

Answers

The keyboard is divided into four sections: alphabetical keys, function keys, cursor keys, and the numeric keypad.  Additional special-purpose keys perform specialized functions.  The mouse is a pointing device used to input data.  Input devices enable you to input data and commands into the computer.

The  three major Subassembly of a computer Keyboard​ are as follows;  alphabetical keys, function keys, and the numeric keypad.

What are the three major Subassembly of a computer Keyboard​?

The keyboard is divided into four components as; alphabetical keys, function keys, cursor keys, and the numeric keypad.

An Keyboard is an input Device used to enter characters and functions into the computer system by pressing buttons.

An Keyboard is a panel of keys that operate a computer or typewriter.

Additional special-purpose keys perform specialized functions.

The mouse is a pointing device used to input data.

The Input devices enable to input data and commands into the computer.

The  three major Subassembly of a computer Keyboard​ are as follows;  alphabetical keys, function keys, and the numeric keypad.

Learn more about the keybord here;

https://brainly.com/question/24921064

#SPJ2

Write a method that takes a Regular Polygon as a parameter, sets its number of sides to a random integer between 10 and 20 inclusive, and sets its side length to a random decimal number greater than or equal to 5 and less than 12. Use Math.random() to generate random numbers. This method must be called randomize() and it must take a Regular Polygon perimeter.

Answers

Answer:

Answered below

Explanation:

//Program is written in Java programming language

Class RegularPolygon{

int sides = 0;

int length = 0;

}

public void randomize(RegularPolygon polygon){

int randomSides = (int) 10 + (Math.random() * 20);

double randomLength = 5 + (Math.random() * 11);

polygon.sides = randomSides;

polygon.length = randomLength;

}

What is software piracy? Check all of the boxes that apply.


copying computer software or programs illegally


using someone’s ideas without giving them credit


making lots of copies and sharing with friends


breaking the security on software so it can be used illegally


knowing the laws regarding copyright and intellectual property

Answers

Answer:

Explanation:

Software Piracy includes all of the following:

copying computer software or programs illegallymaking lots of copies and sharing with friendsbreaking the security on software so it can be used illegally

All of these acts provide ways of individuals gaining access to the software illegally and without paying for it. Doing so ultimately prevents the software developers from making any money on the idea and all of the hard work that they have put into making that software.

Answer:

A C D

Explanation:

1. Discuss the pros and cons of human-computer interaction technology?
2. Discuss the ACID database properties in details ​

Answers

!

gcoo!!Exykgvyukhhytocfplanationufvhyg:

What is the advantage of using shortcuts

Answers

Answer: There can be advantages and disadvantages.

for example, if you were in the woods with a pathway, and a clear way that might be faster and a shorter way of getting out. You may take the shortcut leading to where you didn't want to go leading to you getting lost or, it could be the same time but with more challenges.

An example of shortcuts to it's advantage is when you're reading a text and you don't understand the word. It's much easier when you hear it being read out to you when the reader uses tone to kind of give you a hint if the connotation is negative or positive, A good example of this is the word unique let's use this sentence "She was very unique, and that's what made her cool!" We can use the words "cool" to see that unique is a positive connotation! For the word cool can usually mean that something is real nice or it's something/someone you'd typically like to be around. So therefore these are just a few examples of the advantages and disadvantages of shortcuts.

To lose weight, you must _______.

a.
increase exercise and increase caloric intake
b.
increase exercise and decrease caloric intake
c.
decrease exercise and increase caloric intake
d.
decrease exercise and decrease caloric intake

Answers

Answer:

B

Explanation:

because you need to exercise and eat or drink less calories

Answer: b. increase exercise and decrease caloric intake

Explanation:

Fill in this function that takes three parameters, two Strings and an int. 4- // Write some test function calls here! The Strings are the message that should be printed. You should alternate printMessage("Hi", "Karel", 5); between the Strings after each line. The int represents the total number of lines that should be printed. public void printMessage(String lineOne, String lineTwo, in For example, if you were to call 19.
printMessage("Hi", "Karel", 5);
// Start here! 12 the function should produce the following output:
Hi
Karel
Hi
Kare

Answers

Answer:

The function in Java is as follows:

public static void printMessage(String lineOne, String lineTwo, int lines){

       for(int i = 1;i<=lines;i++){

           if(i%2 == 1){

               System.out.println(lineOne);

           }

           else{

               System.out.println(lineTwo);

           }

       }

   }

Explanation:

This defines the function

public static void printMessage(String lineOne, String lineTwo, int lines){

This iterates through the number of lines

       for(int i = 1;i<=lines;i++){

String lineOne is printed on odd lines i.e. 1,3,5....

      if(i%2 == 1){

               System.out.println(lineOne);

           }

String lineTwo is printed on even lines i.e. 2,4,6....

           else{

               System.out.println(lineTwo);

           }

       }

   }

To call the function from main, use:

printMessage("Hi", "Karel", 5);

Sarah is having a hard time finding a template for her advertising business that she may be able to use at a later
date and also make it available to her colleagues.
What is her best option?

Answers

Answer:

Making a custom template.

Answer:

Creating a custom template

Explanation:

Hope that helped.

Maria wants to create a simple logo for her new flower shop. She would like to use the computer to create this logo. Maria should use a machine diagramming software CAD ​

Answers

Answer:

graphics software

Explanation:

Maria should use a graphics software

Other Questions
Theodore Judah was an engineer whoO built the first railroad in the United States.O owned and ran a large shipping company.O began the Union Pacific Railroad.O helped start the Central Pacific Railroad. Which sentence is punctuated correctly? A. At the age of 46, Bill Clinton was elected, president, for the first time. B. At the age of 46, Bill Clinton, was elected president, for the first time. C. At, the age of 46, Bill Clinton, was elected president for the first time. D. At the age of 46, Bill Clinton was elected president for the first time. A grain that is ground into a fine powder (flour) and stripped of nutrients Do you believe that all individuals have the same ability to reach their dreams? Write your answer in the form of (Yes or No because it has ___ml more or less) * Which change happens during evaporation?A. A gas turns into a liquid.B. A liquid turns into a gas.C. A solid turns into a liquid.D. A liquid turns into a solid. Define the following propositions: c: I will return to college. j: I will get a job. Translate the following English sentences into logical expressions using the definitions above: (a) Not getting a job is a sufficient condition for me to return to college. (b) If I return to college, then I won't get a job. Angela hiked 4 miles one day and 216 miles the next day. How many total miles did Angela hike? 15. Compare and contrast food webs based on photosynthesis and chemosynthesis. Triangle PQR is similar to triangle XYZSelect all angles that have a cosine of 9/15 Read the sentence from paragraph 13."I could scarcely breathe, silently willing the fugitives to be as still as stone, waiting for atriumphant shout of discovery that would announce our undoing."What is the meaning of undoing as it is used in the sentence?AslaveryB.successlocationDdownfall Complete each sentence below with the correct preterite form of tener.Yo ____________________ que hacer reservaciones.Complete each sentence below with the correct preterite form of tener.Nosotros ____________________ que buscar nuestros pasaportes.Complete each sentence below with the correct preterite form of tener.T ____________________ que llamar al agente de viajes. What is the correct sequence of events for the cell cycle ? Which of the following best describes the gods and goddesses of Ancient Greek mythology? A.A human could become a god if he or she did something heroic. B. There were some god who were mortal and some who were immortal. C. The gods were not interested in the daily activities of humans. D. Although they were immortal, they had many characteristics of humans. The number of visits to public libraries increased from 1.3 billion in 1998 to 1.5 billion in 2002. Find the average rate of change in the number of public library visits from 1998 to 2002. PLZZ HELP ME!!!!!:(Question 1Part ABased on "'Equal Justice Under Law': Thurgood Marshall," what can the reader infer about how segregation affected the self-image of African American children?(A)It was dangerous because it caused negative feelings toward themselves and others. (B)Children of different races played together outside of school, which boosted self-image.(C)It was damaging because they were wrongly convinced that it was preferable to be white.(D)Segregation only occurred in the South, so it had little effect on most African American children. Question 2Part BWhat evidence from the text best supports the answer in Part A?(A)"He showed each child two white dolls and two brown dolls. Then he asked which dolls they liked best."(B)"Anything from a water fountain to a movie theater or public park might have a sign saying 'Whites Only.'"(C)"The facilities for black Americans, the Court said, simply had to be as good as those for whites'separate but equal.'"(D)"The children said the white dolls were 'nice' and 'pretty.' The brown dolls, they said, were 'ugly' and 'dirty.'" Casey's grandmother sent her an $85 gift card for her birthday last year. This year, she sent her a $125 gift card. Which proportion can be used to find what percent of last year's gift this year's gift is, if n represents the unknown percent? What messages does the poem convey you Always there are children What is the MAIN use of amino acids by the cells? 1-For building and repairing body parts 2-For energy 3-For breathing 4-For going through cellular respiration Please help this is due today.