A machine where the operating system runs an application on top of an operating system is called?

Answers

Answer 1

A machine where the operating system runs an application on top of an operating system is called a virtual machine.

What is a virtual machine?

A Virtual Machine (VM) is known to be a kind of a tool that is known to often help one to be able to compute resource that make use of software to run programs and carry out apps.

An operating system (OS) is said to be the program that, is known to be one that is being first loaded into the computer as a result of a boot program, and it is one that handles all of the other application programs inside any computer.

Hence, A machine where the operating system runs an application on top of an operating system is called a virtual machine.

Learn more about operating system from

https://brainly.com/question/22811693

#SPJ1


Related Questions

What health issue did Feiler face that led him to consider his family? What was his family situation at this time?

Answers

The answers to the question is given below:

What health issue did Feiler face that led him to consider his family?

Feiler was known to have bone cancer and this led him to see or recognize his family.

What was his family situation at this time?

This was known to have caused him to to be away from his family a lot of times.

Bone tumor or cancer is known to be a kind of  mass that is composed of unusual cells that are said to be growing in a bone.

A lot of tumors are treatable and it is good that one discover it early.

Therefore Feiler was said to have bone cancer and this made him to look for his family.

Learn more about cancer from

https://brainly.com/question/11710623

What information will she need to know in order to obtain assistance from the chief medical officer to reduce the number of delinquent records?

Answers

The information that she need to know in order to obtain assistance from the chief medical officer to reduce the number of delinquent records is the Discharge Record Assembly .

What is  an incomplete health record or a delinquent health record?

An  incomplete health record is one that is often open after a set period of time such as more than 30 days and if not complete, the health record is said to be delinquent.

Note that Nurses are mandated to carefully maintain patient records. Therefore, The information that she need to know in order to obtain assistance from the chief medical officer to reduce the number of delinquent records is the Discharge Record Assembly .

Learn more about chief medical officer from

https://brainly.com/question/18696862

#SPJ1

What creates two completely separate user interfaces on the same device, one for work and one for personal use?

Answers

A technology which is designed and developed to create two (2) completely separate graphic user interfaces on the same device, one for work and one for personal use is referred to as dual persona technology.

What is technology?

Technology can be defined as a field of science that involves the process of creating, applying, and managing scientific knowledge and ideas, so as to effectively and efficiently proffer solutions to various problems and cause an improvement in human life.

What is a dual persona technology?

A dual persona technology can be defined as a type of technology which is designed and developed to create two (2) completely separate graphic user interfaces on the same electronic device, one to be used for work and the other one for personal use.

Read more on technology here: https://brainly.com/question/17893201

#SPJ1

Generic mouse and keyboard drivers are included with the os.
a. true
b. false

Answers

Answer:

This is true!

Explanation:

Mouse and keyboard drivers are standard and are usually included with the OS.

Trevor knows that he must be organized if he wants to develop good software. he decides to use __________ to create a budget, manage workloads, and plan the overall development of new software.

Answers

Trevor decides to use MS project to create a budget, manage workloads, and plan the overall development of new software.

What MS Project function as?

Microsoft Project is  known to be a kind of a project management software that is known to be often used to make schedules, project plans and also to handle resources and to know about time.

It has features is made up of Gantt charts, kanban boards, project calendars and others.

Note that Trevor wants to use Microsoft Project, which is said to be a project management tool that aid him as well as other users to plan, create, control, and handle a project's budget and resource.

Therefore, Trevor decides to use MS project to create a budget, manage workloads, and plan the overall development of new software.

Learn more about MS project  from

https://brainly.com/question/2704239

#SPJ1

The host computer in the computer network ?​

Answers

Answer:

The host computer in the computer network is any hardware device that has the capability of permitting access to a network through a user interface, specialized software, network address, protocol stack, or any other means.

or it is a computer that offers remotely accessible services to other computers.

Hardware refers to the _________________ of a computer

Answers

Answer:

physical component

Explanation:

Well, softwares are the applications and anything installed inside the computer but hardware isn't installed, it's just been connected by wires

The first operation is called the ________ and its purpose is to get the first input value that will be tested by the validation loop

Answers

The first input operation is referred to as the priming read, and its main purpose is getting the first input value that would be tested by the validation loop.

The five Vs of big data.

In Computer technology, big data comprises five Vs and these include the following:

VolumeVeracityValueVarietyVelocity

What is input validation?

Input validation can be defined as a process that typically involves the inspection of data that has been input (entered) into a software program, in order to ensure it is valid before it is used for any computation.

In Computer programming, the first input operation is referred to as the priming read, and its main purpose is getting the first input value that would be tested by the validation loop.

Read more on big data here: https://brainly.com/question/14273643

#SPJ1

Complete Question:

The first input operation is called the ________, and its purpose is to get the first input value that will be tested by the validation loop.

A. first input

B. loop set read

C. loop validation

D. priming read

The combat and operational stress continuum model is a tool that assists leaders in identifying the level of distress and the:________

Answers

The combat and operational stress continuum model is a tool that assists leaders in identifying the level of distress and the level of injury.

What is operational stress continuum model?

The combat operational stress continuum was designed by the United States Navy and Marine Corps as indicator for injury.

It has different color depending  on the severity of injurie and it is used to measure how much of deployment-related stress.

The color ranges from green which is ready to yellow which means reacting and orange which means injured.

Therefore, the combat and operational stress continuum model is a tool that assists leaders in identifying the level of distress and the level of injury.

Lear more on leader below

https://brainly.com/question/12522775

#SPJ1

explain the following joke: “There are 10 types of people in the world: those who understand binary and those who don’t.”

Answers

In Binary language 10 stands for two. So this means that there are 2 types of people, one who understand binary and others who don't.

Column text that is aligned to both the left and right margins is referred to as?

Answers

Answer:

The column text that is aligned to both the left and right is called Justify

Explanation:

When your are in a text editor the aligning of a text can be determinate for four options:

Left alignRight align Center alignJustify align

Justify text is align in both cases (you can proof this with a text editor and testing the differents types of alignements).

____ is the study of how computers can potentially improve without human programming.

Answers

Answer:

Machine Learning and/or Artificial Intelligence (AI)

"ICT in education is very helpful for all types of learner" justify

Answers

"ICT in education is very helpful for all types of learner" because:

ICTs is one that often boast the quality of educationIt  increases the learner motivation and also their engagement in learning.It boast or quickens the acquisition of a lot of basic skills.It is known to often  enhance teacher training.

What are the benefits of using ICT in education?

ICTs are known to be a kind of transformational tools that when it is used in the right way can lead to a shift to a form of learner-centered environment.

The Advantages of ICT are:

They are known to be Cost Effective. They are known to be  AutomatedThey tend to act as a Bridging of cultural divide. They help in the Creation of new jobs.

Therefore, "ICT in education is very helpful for all types of learner" because:

ICTs is one that often boast the quality of educationIt  increases the learner motivation and also their engagement in learning.It boast or quickens the acquisition of a lot of basic skills.It is known to often  enhance teacher training.

Learn more about ICT from

https://brainly.com/question/20717870

#SPJ1

Brian is selecting a CASB for his organization and he would like to use an approach that interacts with the cloud provider directly. Which CASB approach is most appropriate for his needs

Answers

The cloud access security broker (CASB) approach which is most appropriate for Brian's needs is: D. API-based CASB.

What is an API?

API is an acronym for application programming interface and it's a software intermediary (computing interface) that is made up of tools, set of executable codes, and protocols that help software applications and computers to function properly, as well enable the exchange of data.

In Computer technology, an application programming interface (API) is designed and developed to allow a network device and a server or two servers to share data and functionality within the cloud. Also, a software developer integrates an application programming interface (API) into the software.

In this context, we can infer and logically deduce that the cloud access security broker (CASB) approach which is most appropriate for Brian's needs is an API-based CASB.

Read more on API here: https://brainly.com/question/20910074

#SPJ1

Complete Question:

Brian is selecting a CASB for his organization and he would like to use an approach that interacts with the cloud provider directly. Which CASB approach is most appropriate for his needs?

A. Inline CASB

B. Outsider CASB

C. Comprehensive CASB

D. API-based CASB

Vanessa is creating some graphic images for a page layout. what is the minimum resolution (in dots per inch) for graphic images that vanessa must ensure so that she gets crisp images in the final printed product?

Answers

The minimum resolution (in dots per inch) for graphic images that Vanessa exists 300.

What is Website image?

Choosing high-quality images that exist interesting, include a good resolution, and stand in an appropriate size will help to create your website look better professional. Avoid images that will be easily dismissed, such as blurry images or images that exist too small.

Note that a website exists one that often utilizes about 700-800 pixels wide. this, therefore, means that an image that is said to be around 400 or 500 pixels wide will bring a lot of space and will be very big on a monitor. Note that The minimum resolution (in dots per inch) for graphic images that Vanessa stands at 300 and less than that will be too big.

In general, the term graphic guides to a design or visual image depicted on a variety of surfaces, including canvas, paper, walls, signs, or a computer monitor. They exist designed for entertainment, branding, or furnishing information. Hence, The minimum resolution (in dots per inch) for graphic images that Vanessa exists 300.

To learn more about Website image refer to:

https://brainly.com/question/26344788

#SPJ4

The complete question is,

Vanessa is creating some graphic images for a page layout. What is the minimum resolution (in dots per inch) for graphic images that Vanessa

must ensure so that she gets crisp images in the final printed product?

A 72

B.300

C. 220

D. 150

E. 120

which things computer case contains

Answers

Inside the case are the components that make up the computer itself, such as the RAM memories, the processor and the hard disk, all of which are directly or indirectly connected to the motherboard. In addition, the case allocates the power suplly, which is responsible for supplying power to the computer.

What is a computer case?

The case is the hardware component used to house most parts of a computer. It is inside it that components such as CPU, motherboard, SSD, video card and power supply are placed.

In addition, it is where the outputs for connections to other equipment are found, such as USB and HDMI outputs, plug for sound box and microphone and input for memory card.

The case has the important function of protecting the internal components of a computer from knocks, heat, light, moisture and dust. That's because most of the electronic components inside a computer are very sensitive and need this protection.

It is also used to connect to other hardware components, such as a monitor, keyboard, mouse and headset, through the various outputs provided on its exterior.

See more about computing at: brainly.com/question/15707178

#SPJ1

Which function is responsible for ensuring that the Agile Release Train has the Program Vision and Backlog needed to successfully engage in Program Increment Planning?

Answers

Product management is the  function is responsible for ensuring that the Agile Release Train has the Program Vision and Backlog needed to successfully engage in Program Increment Planning.

What is agile training?

This is the term that is used to refer to all of the systematic processes that a team would have to pass through because they would want to improve on the performance of that team. This is done by teaching the concepts of agile to the team or to a particular firm or an organization.

The result when implemented would be an increased performance as well as efficiency of the team that is involved. Hence the product management is  responsible for ensuring that the Agile Release Train has the Program Vision and Backlog needed to successfully engage in Program Increment Planning

Read more on agile training here: https://brainly.com/question/26079067

#SPJ1

Helen designed a new payroll system that she offers to her customers. She hosts the payroll system in AWS and her customers access it through the web. What tier of cloud computing best describes Helen's service

Answers

Helen designed a new payroll system that she offers to her customers. She hosts the payroll system in AWS and her customers access it through the web. Software as a service tier of cloud computing best describes Helen's service

This is further explained below.

What is Software?

Generally, The term "software" refers to a collection of instructions, data, or programs that are used to control computers and carry out certain activities. In contrast to hardware, which refers to the tangible components of a computer, this refers to the software that runs on the device. The phrase "software" refers to apps, scripts, and programs that may be executed on a device. Software is a general term.

In conclusion, Helen is now providing her clients with a newly developed payroll system that she devised herself. Her clients log in to the AWS-hosted payroll system using the web interface that she provides for them. The layer of cloud computing known as software as a service is the one that most accurately reflects Helen's service.

Read more about Software

https://brainly.com/question/1022352

#SPJ1

A technician is troubleshooting a slow wlan and decides to use the split-the-traffic approach. which two parameters would have to be configured to do this?

Answers

Answer:

Configure the 5 GHz band for streaming multimedia and time sensitive traffic & Configure the 2.4 GHz band for basic internet traffic that is not time sensitive.

Microsoft recommends when that you create passwords with upper and lowercase letters, numbers, symbols, and use at least ________ characters.

Answers

Answer: 8 characters

Explanation:

Answer:

10 characters

Explanation:

If the columns to be matched in a join have the same name, you can use the _________ clause followed by the column name.

Answers

If the columns to be matched in a join have the same name, you can use the period (.) clause followed by the column name.

What is a clause?

A clause is known to be a set or group of words that  is said to be made up of a verb which is known to usually have other components.

Note that A clause can be made to form part of a sentence or it is said to be able to a complete sentence itself.

The period of agreement is seen as the contract period that is the  number of days that exist between a given start date and its end.

Hence, based on the above, in regards to java,  If the columns to be matched in a join have the same name, you can use the period (.) clause followed by the column name.

Learn more about  Clause from

https://brainly.com/question/541212

#SPJ1

A(n) __________ is a sequence of primitive data elements stored in sequential storage locations.

Answers

An array is a sequence of primitive data elements stored in sequential storage locations

What is the term used to designate that a particular operating system will no longer be supported by its manufacturer or managing entity?

Answers

The term that is used to designate that a particular operating system will no longer be supported by its manufacturer or managing entity is End-of-life.

What is an Operating System?

This refers to the interface that is used to connect the application and system software in a computer and enables it to function.

Hence, we can see that when a particular operating system will no longer be supported by its manufacturer or managing entity, this is known as End-of-life.

Read more about operating systems here:

https://brainly.com/question/1763761

#SPJ1

A __________ is more concerned with copying and running code, rather than the code's maintainability or documentation.

Answers

Answer: system architect

Explanation:

A system architect is more concerned with copying and running code, rather than the code's maintainability or documentation

QUESTION 44 To determine whether a character entered is a letter of the alphabet, use the ________ function. isdigit fromkeyboard alpaok isalpha None of these

Answers

In order to determine whether the character you entered is a letter of the alphabet, you should use this function: C. isalpha ().

What is a function?

A function can be defined as a named portion of a block of executable code that is written to perform a specific task, which is usually a single, related action.

This ultimately implies that, a function comprises a group of related statements (executable blocks of code) that would only run and return a data whenever it is called by a software program.

In Computer programming, you should use the isalpha () function to determine whether the character you entered is a letter of the alphabet because it would return a true (a non-zero number), if the argument is a letter of the alphabet.

Read more on a function here: brainly.com/question/19181382

#SPJ1

The hardware component of a computer system consists of programs written in computer languages. a. True b. False

Answers

Answer: true

Explanation:

according to the most typical basic paradigm of programming theory, a computer program is an algorithm written in a programming language, a series of instructions satisfying certain exact conditions and requirements (predefinedness, clear execution, etc.)

What tool allows you to discover, cleanse, and transform data with built-in operations?

Answers

Watson Studio Refinery tool allows you to discover, cleanse, and transform data with built-in operations.

What is meant by data cleaning?

Data cleaning is known to be the act putting together or the fixing/removing any data that is found to be incorrect, corrupted, or one that is incorrectly formatted, copied , or incomplete data that is seen inside a dataset.

Note that in combining multiple data sources, there are a lot of room for for data to be copied or mislabeled.

Watson Studio Refinery, which is known to be obtained via IBM Watson Studio is said to be a tool that  allows a person to discover, cleanse, and transform data using built-in operations.

Therefore, Watson Studio Refinery tool allows you to discover, cleanse, and transform data with built-in operations.

Learn more about data cleaning from

https://brainly.com/question/13085801

#SPJ1

If a document is stored on a file server but team members can edit the document anonymously, the content on the file server is

Answers

If a document is stored on a file server but team members can edit the document anonymously, the content on the file server is shared content with no control.

What is the single most vital skill for effective collaboration?

The one most vital skill for effective collaboration is when or to give and take critical feedback.

What is file server used for?

A file server is known to be a form of a computer that is known to be responsible for the act and the storage and also the management of data files in order that other computers found on the same network can be able to access the files.

Therefore, If a document is stored on a file server but team members can edit the document anonymously, the content on the file server is shared content with no control.

Learn more about file server from

https://brainly.com/question/19551484

#SPJ1

You work as a network administrator in an organization. The company has three locations. A user is unable to access a shared folder located on a desktop in another location. You try to ping the IP address of the desktop, but it fails. You are unable to ping any IP address from that subnet. What is the next step you should perform on your router

Answers

In this scenario, the next step that you should perform on your router is: D. verify the LAN interface status.

What is a router?

A router can be defined as a network device (node) that is designed and developed to connect two (2) different computer networks together, in order to allow them communicate by forwarding and receiving packets.

What is IP address?

IP address is an abbreviation for Internet protocol address and it can be defined as a unique set of numbers that are assigned to a computer, website or other network devices, in order to successfully differentiate them from one another in an active network system.

In this scenario, the next step that you should perform on your router is verifying the status of the local area network (LAN) interface.

Read more on router here: brainly.com/question/24812743

#SPJ1

Complete Question:

You work as a network administrator in an organization. The company has three locations. A user is unable to access a shared folder located on a desktop in another location. You try to ping the IP address of the desktop, but it fails. You are unable to ping any IP address from that subnet. What is the next step you should perform on your router?

Verify the WAN interface status

Check the ARP cache

Check the IP routing table

Verify the LAN interface status

Check the MAC address table

Participating in pi planning enables teams to gain alignment and commitment around a clear set of what?

Answers

Participating in pi planning enables teams to gain alignment and commitment around a clear set of prioritized objectives.

What is planning?

Planning is a form of management function,  that involves thinking regarding the activities or project to be done in other to decide beforehand on things to do.

It also involves how the task or assignment is carried out to get  a specified result.

Human resource to be used, materials and possible time frame are involved in planning. It is on of the major objectives in effective business or project management.

Therefore,

Participating in pi planning enables teams to gain alignment and commitment around a clear set of prioritized objectives.

Learn more on Planning below

https://brainly.com/question/25453419

#SPJ1

Other Questions
What value is needed to complete the square? Show all stepsX^2-2x+___ How do you apply force field analysis and brainstorming techniques to a complex business An open-faced box is to be constructed by cutting squares out of the corners of a 12in by 12insheet of tin and folding up the sides. Which of the following describes the volume of such abox?* (5 Points) So you them the answer you submit must be the d operators; they are pald $8. 10 an hour each and work 40 hours a week and 52 weeks a year. The machines break down periodically, resulting in annual repair costs of $1,320 for each and supplies cost $960 a year for each machine. Vill have a life of 5 years and a total disposal value at that time of $1, 500. The kodak system will require only 2 regular operators. Supplies wil be $3,600 per year. Kodak has offered the college a maintenance contract that covers all machine breakdowns; the cost of the contract is $1,020 per year. Total cost for all favor keeping the canon copiers, enter your net present value difference as a positive number; if. When managers give instructions to front-line employees, they should follow the indirect strategy. a) true b) false find the price, discount, markup, or cost to store.Markup=80%Selling price= $21.60Cost to store? The Ancient Tea Horse Road is an ancient Chinese commercial road network comparable to the "Silk Road". It is located between the Hengduan Mountains in southwestern China and the Qinghai-Tibet Plateau. It starts from Chengdu and Ya'an in Sichuan Province, China, and Kunming and Pu'er in Yunnan Province. And other places, the end point is Lhasa in the Tibet Autonomous Region and Southeast Asia and other places. The road network covers Sichuan Province, Yunnan Province, Guizhou Province and Tibet Autonomous Region, spanning the four major river basins of Yangtze River (Jinsha River), Lancang River, Nu River and Brahmaputra River. It is a link for economic and cultural exchanges among various ethnic groups in Southwest China. WHAT IS PRECIPITATION REACTION 9. Persons who have suffered a stroke may be prone to depression due to all of the followingEXCEPTa. Loss of independenceb.Loss of their role in the familyC. Loss of ability to communicated. Loss of dependence A 5 -ounce container of Greek yogurt contains 150 calories. Find the unit rate of calories per ounce. If you are planning a vacation to the beach and find out that the town has prevailing winds coming from the ocean. What is the weather likely to be explain the following joke: There are 10 types of people in the world: those who understand binary and those who dont. What are the 3 most populous countries in this region? what are the major climate patterns of the middle east? 100 points please hurry! What is a right or responsibility of the executive branch?Carry out laws.Pass laws.Approve constitutional amendments.Make a vetoed bill a law. What is the most appropriate use of competitors in the development of new-product ideas? Advertisers who market products like deodorants, mouthwashes, and long distance services succeed (in general) because they:____________ A 25. 0-ml sample of 1. 00 mnh3is titrated with 0. 15 mhcl. what is the ph of the solution after 15. 00 ml of acid have been added to the ammonia solution? kb= 1. 8 10-5 Pythagorean TheoremIn a right triangle, the square of the _____ equals the sun of the squares of the ______. How many milliliters of an 16m (h2so4) solution is required to prepare 2. 010^3ml of 0. 15m solution? If the magnitude of the sum of two vectors is greater than the magnitude of either vector, then?