answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kodGreya [7K]
2 years ago
15

A ____ is a software implementation of a computer that executes programs as if it were a real physical computer within the physi

cal memory of the host machine, but completely separated from the underlying hardware of the host machine.
Computers and Technology
1 answer:
Brums [2.3K]2 years ago
3 0

Answer:

The answer is "Virtual machine ".

Explanation:

The VM stands for Virtual machine, it is a portable device, that operates on the actual hardware framework as a virtual software to its Processor like, ram, network access, and data. It is a project called hypervisor splits the assets of the system from both the hardware and distributes the resources directly.

  • It runs the program as if the host's internal memory is a true physical device, but is isolated from the host's underlying hardware.
  • It can run an operating system on your desktop in an app window, that functions as a full, separate device.
You might be interested in
An administrator has been working within an organization for over 10 years. He has moved between different IT divisions within t
rodikova [14]

Answer:

User roles and access authorization

(Explanation of this question is given below in the explanation section.

Explanation:

As noted in question that a terminated employee comeback in office and installed some malicious script on a computer that was scheduled to run a logic bomb on the first day of the following month. And, that script will change administrator passwords, delete files, and shut down over 100 servers in the data center.

The following problem can be with that account

  • Unauthorized user access and privileges

The user may be given unauthorized access to system resources. If a user has unauthorized access to system resource then he can modify or destroy the system function easily.

  • The firewall may be disabled to detect the malicious script

The firewall should be enabled to detect such types of attack from unauthorized access to the system

  • Role

May be user role is not defined properly. If role would be defined according to user role then there are very fewer chances in doing unauthorized changes in the system that will result in an unexpected outage.

5 0
2 years ago
The following code should take a number as input, multiply it by 8, and print the result. In line 2 of the code below, the * sym
Juli2301 [7.4K]

Answer:

num = int(input("enter a number:"))

print(num * 8)

Explanation:

num is just a variable could be named anything you want.

if code was like this num = input("enter a number:")

and do a print(num * 8)

we get an error because whatever the user puts in input comes out a string.

we cast int() around our input() function to convert from string to integer.

therefore: num = int(input("enter a number:"))

will allow us to do  print(num * 8)

6 0
2 years ago
The c++ operator _______________ is used to destroy dynamic variables.
UNO [17]
<span>The c++ operator delete is used to destroy dynamic variables.</span>
6 0
2 years ago
A contact list is a place where you can store a specific contact with other associated information such as a phone number, email
Arte-miy333 [17]

Answer:

# The user in prompted for input and stored in userInput

userInput = str(input("Enter the contact: "))

# The user input is splitted and stored in splitUserInput

# splitUserInput is a list because split returns a list

splitUserInput = userInput.split(" ")

# The user is prompt to enter the search contact

# The search contact will have the first letter capitalize

# should it be entered in lower case all through

searchContact = str(input("Enter the search contact: "))

# loop through the list

for i in range(len(splitUserInput)):

   # compare if the string at any value of i

   # is the same as the searchContact

   # we display the string ahead of it

   # by adding 1 to the index

   if(splitUserInput[i] == searchContact):

       print(splitUserInput[i + 1])

Explanation:

A sample screenshot is attached. The code is written in Python 3 and well commented.

The program prompt the user for input then split the input into a list. It then asked for a contact to search for. It begins looping through the list, if the search contact is found at any index, then it prints what is in front of the index.

5 0
2 years ago
Before buying his 12-year-old daughter her very own cell phone and laptop complete with internet access, John requires her to co
Ratling [72]

Answer:

D.

Explanation:

brainliest?

5 0
2 years ago
Other questions:
  • If the computer has an encrypted drive, a ____ acquisition is done if the password or passphrase is available. a. passive b. sta
    8·1 answer
  • Initialize the list short_names with strings 'Gus', 'Bob', and 'Zoe'. Sample output for the givenprogram:Gus Bob Zoeshort_names
    13·1 answer
  • In a ____________________ attack, the attacker sends a large number of connection or information requests to disrupt a target fr
    14·1 answer
  • A spreadsheet keeps track of student scores on all the exams in a course. Each row of the spreadsheet corresponds to one student
    14·1 answer
  • The variable grade can have any real number value from 0 to 100. Ask the user to enter a grade in numerical form. Write an if-el
    9·1 answer
  • Nathan would like to save his PowerPoint presentation as a video that can be replayed easily on any device at full quality. Whic
    14·1 answer
  • In the next five years there are expected to be over _____ unfilled jobs in the US in computer science.
    10·1 answer
  • A(n) ___________________ is a set of characters that the originator of the data uses to encrypt the text and the recipient of th
    10·1 answer
  • Chinh wants to have a program print, "Sorry, but that isn’t one of your options" until the user enters the correct information.
    13·1 answer
  • Identify the tips to create a well-designed digital portfolio.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!