A ____________ allows for system duplication of a VM.

a. replacement
b. emulation
c. virtualization
d. snapshot


Answer: d. snapshot

Computer Science & Information Technology

You might also like to view...

The preferred method for setting page layout is ____.

A. layout tables B. CSS C. XHTML coding D. data tables

Computer Science & Information Technology

What is not true about using the AND function in a custom conditional formatting rule?

A) All the tests must be of the same data type, for example: all numbers or all text. B) You must have at least two tests in the formula. C) You may have as many tests as you need in the formula. D) All the logical tests must be true for the formatting to be applied.

Computer Science & Information Technology

Users first started bringing their PCs to work to improve their productivity in the 1970s; this is similar to the __________ phenomenon today.

A. AI B. BYOD C. ERP D. RFID

Computer Science & Information Technology

A security control is a technical or nontechnical mechanism that enforces an organization's security policy.

a. true b. false

Computer Science & Information Technology