With this approach only a small piece of the application is installed on the end user device. Just enough for the end user device to be recognized as an authorized user. This only requires just a small portion of the application to be downloaded.

A. Virtual NIC
B. virtual application streaming
C. container virtualization
D. virtual desktops


Answer: B. virtual application streaming

Computer Science & Information Technology

You might also like to view...

Successful dashboards should help summarize complex data so users can interpret the information at a glance

Indicate whether the statement is true or false.

Computer Science & Information Technology

The standard mask used with a Class C IP address is _______

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following statements about unions is false?

A. All union elements can be initialized when the union is defined. B. Elements in a union occupy the same memory addresses. C. The elements in a union are referenced using the direct selection operator. D. Structures can contain unions. E. When a union is defined, C reserves enough room to store the largest data object in the union.

Computer Science & Information Technology

The Magnetic Pen tool is an option on the ____________________ Pen tool.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology