What does the PAE/NX option do when it is enabled?

A. It prevents a virtual machine guest from accessing the memory of another guest.
B. It allows for the use of virtual disks larger than 2 TB in size.
C. It enables the ability for virtual network cards to reach 1 gbps throughput.
D. It enables 32-bit operating systems to access more than 4 GB of RAM.


Answer: D

Computer Science & Information Technology

You might also like to view...

The __________ function returns the number of characters in a string.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

When implementing an interface, a class can choose which interface methods to define.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Your e-mail ____________________ may be required to access the mail server.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Create an applet Nim that will allow two players to play the game of nim. Initially, there are three rows of coins. During his or her turn, a player can take as many coins as desired from a single row. The rows have 3, 5, and 7 coins each. The last person to take a coin loses. Use buttons with icons for the coins. As a player clicks the button, it will become invisible. There should be a Turn over button that is visible only when a player has taken at least one coin. Use a label to let the players know whose turn it is and who has won the game.

This application makes use of icons and visibility. One interesting feature of the solution is that it uses a non-regular two-dimensional array of buttons. Each row in the array corresponds to a row of coins in the game. You will need to have a state variable that records the row that the first coin in a turn was removed from. Subsequent removals must be checked against the row. Determining which coin button was pressed is an interesting challenge. One way to accomplish this is to set the label for each of the coin buttons with its location in the array; Example: “Coin 1,3”. You will then need to parse the action command to determine what to do. This solution takes a slightly different and less efficient approach. It scans the array of buttons and checks to see if any of them is the source (uses the getSource method). This gives it the location of the button. Other than that, it is pretty straightforward.

Computer Science & Information Technology