________ is a technique where the underlying operating environment of an application is virtualized.

A) Container virtualization
B) Traffic engineering
C) CCN
D) COTS


A) Container virtualization

Computer Science & Information Technology

You might also like to view...

Counter-controlled iteration is also known as:

a. Definite iteration b. Indefinite iteration c. Multiple-iteration structure d. Double-iteration structure

Computer Science & Information Technology

A(n) ________ operator is an operator in VBA that uses Boolean logic to test conditions

Fill in the blank(s) with correct word

Computer Science & Information Technology

Backing up a shortcut or alias will back up the file or folder to which it links

Indicate whether the statement is true or false

Computer Science & Information Technology

PGP and S/MIME is compatible at the protocol level.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology