A physical host machine has four quad-core CPUs, 16GB of RAM, 1TB of hard drive space, and two 1Gbps NICs. If we need to create four Windows 2008 servers, what will be the first bottleneck we should upgrade?a. CPUb. RAMc. Hard drived. NIC

Answers

Answer 1

Answer:

B. Ram

Explanation:

A random access memory (RAM) can be defined as the internal hardware memory which allows data to be read and written (changed) in a computer. Basically, a random access memory (RAM) is used for temporarily storing data such as software programs, operating system (OS), machine code and working data (data in current use) so that they are easily and rapidly accessible to the central processing unit (CPU).

Additionally, RAM is a volatile memory because any data stored in it would be lost or erased once the computer is turned off. Thus, it can only retain data while the computer is turned on and as such is considered to be a short-term memory.

There are two (2) main types of random access memory (RAM) and these are;

1. Static Random Access Memory (SRAM).

2. Dynamic Random Access Memory (DRAM).

Given a physical host machine that has four quad-core central processing units (CPUs), 16GB of random access memory (RAM), 1TB of hard drive space, and two 1Gbps network interface cards (NICs). Therefore, if we need to create four Windows 2008 servers, the first bottleneck we should upgrade is the random access memory (RAM) because it is typically the working memory that would be used by the server to store data, so they can be accessed easily and rapidly by the central processing unit (CPU).

Hence, the random access memory (RAM) may be increased from 16GB to 64GB or more depending on the client's requirements.


Related Questions

Oozie is still using a parameter called _______ to identify the YARN arguments as they are yet to create a new parameter for YARN itself.

Answers

Answer:

Job Tracker

Explanation:

Given that JobTracker is a term in computer engineering that describe the main or primary point whereby users can maintain and start submitting and tracking MR jobs in a network environment.

Hence, it can be concluded that Oozie is still using a parameter called JOB TRACKER to identify the YARN arguments as they are yet to create a new parameter for YARN itself.

Oozie is still using a parameter called Job Tracker

The following information should be considered:

JobTracker is a term in computer engineering that reoresent the main or primary point in which users can maintain,  start submitting, and tracking MR jobs in a network environment.It identified the YARN arguments for developing the new parameter.

Learn more: brainly.com/question/17429689

If you are having trouble playing back a presentation smoothly, what should you try?

Answers

Click the File tab. Click Options, click Advanced in the left pane of the PowerPoint Options dialog box, and then under Display, ensure the Disable hardware graphics acceleration check box is not selected.

If a user has trouble playing back a presentation smoothly, the options are;

1. Copy the presentation to your internal hard drive.

2. Clear the Disable hardware graphics acceleration option.

3. Lastly, select the Show without animation option.

Microsoft PowerPoint is an application that can be used for presentations in offices, schools and other meetings. The issue of playback could occur when we want to replay a presentation but encounter difficulties along the way. To resolve the problem, each of the three steps above can be followed.

The particular presentation with the issue should be copied to the internal hard drive. Remove the option: Disable hardware graphics acceleration. Finally, select the option to play the presentation without animation.

Conclusively, the three listed options above, should be followed to resolve the problem of playing back a presentation smoothly.

Learn more about Microsoft PowerPoint presentations here:

https://brainly.com/question/24079115

The purpose of __________________ is to isolate the behavior of a given component of software. It is an excellent tool for software validation testing.a. white box testingb. special box testingc. class box testingd. black-box testing

Answers

Answer:

d.) black-box testing

Explanation:

Software testing can be regarded as procedures/process engage in the verification of a system, it helps in detection of failure in the software, then after knowing the defect , then it can be corrected. Black Box Testing can be regarded as a type of software testing method whereby internal structure as well as design of the item under test is not known by one testing it. In this testing internal structure of code/ program is unknown when testing the software, it is very useful in checking functionality of a particular application. Some of the black box testing techniques commonly used are; Equivalence Partitioning, Cause effect graphing as well as Boundary value analysis. It should be noted that the purpose of black-box testing is to isolate the behavior of a given component of software.

having a bad day? enjoy this front view of phinias (can't spell his name)​

Answers

Answer:

ouch what happened to him

congrats you ruined my childhood

(thanks for the free points!!)

Design templates can be applied to presentations when _____.

they are opened
a new slide is added
all the slides are created
all of the above
none of the above

IT IS NOT WHEN A NEW S IS ADDED

Answers

Answer:

all of the above

Explanation:

The answer to this is all of the above. In the Microsoft Powerpoint software, you are able to add a design template as soon as you first open the software and begin creating your presentation. Aside from this, you can also add the design template you want to use when a new slide is added or all the slides have already been created. This is done by clicking on the Design tab in the top ribbon and choosing the desired template. From this tab, you are also able to select specific slides to which you want the design to be applied to.

Answer:

All of the above

Explanation:

EDG2021

Even with a quality burglary-resistant chest on the premises, special function locks may be appropriate because:________.
a. A dishonest worker might open the safe at night .b. A burglar may force a worker to open the safe during working hours.c. Without special locking devices, workers may be tempted to leave the safe unlocked for easy access during the day.d. All of the above

Answers

Answer:

d ) all of the above

Explanation:

is the correct answer

On BranchVPN2, create a network access policy named Sales as follows: Type of network access server: Remote Access Server. Conditions: Membership in the Sales user group. Result: Grant access if the condition is met, regardless of the setting in the Active Directory user account. Authentication: Smart card or other certificate. Disallow all other authentication methods.

Answers

Answer:

- On the server manager, click on the select tool and select the network policy server and the policy node.

- Create a new policy by right-clicking on the Network policies tab, give it a name and define the network access server, then click on next.

- Add group membership as a condition by clicking the add tab, select the group type and click add, then click on add group, give it a name and click on ok and next.

- select the access permission settings and click next

- configure the authentication settings to EAP and deselect other authentication modes and click next.

- select additional constraints, click next then click on finish

Explanation:

A VPN or virtual private network is a secure offline network used by large enterprises to communicate confidentially, information within the company. It is more appropriate to implement VPN between different branches. Members of the enterprise can safely log in and out of the network, and access company data and resources they need and have permission to access.

Which important aspect of the Roman Empire did the barbarians destroy?

Answers

Answer:

centers of learning

Explanation:

Under the leadership of Emperor Valens, Rome was already having financial hardships. This meant that it didn't have enough money left to repair its empire nor to strengthen it against invaders. Soon, the barbarians such as the Franks, Huns, Saxons, etc. started attacking Rome. They spent a lot of time destroying the outer regions of the empire because they were also at war with each other. They penetrated Rome and it soon fell. The barbarians didn't only destroy the cities but they also destroyed the "centers of learning." Roman people were known to value education. With the fall of the Roman Empire, so did education and sophisticated architectures follow.  

Answer:

i dont know but them barbs are crazy can't believe they were a thing back then

Explanation:

lol

The relational algebra expressions can be rearranged and achieve the same result but with a better processing time. A selection on an attribute can be moved from the outside of a query to a selection on just one of the relations being joined (if it isn't an attribute on both relations). Why would this be an improvement?
a. The selection on the joined results would cause a cartesian product operation
b. Moving the selection to the innermost relation keeps the depth of operations that have to be processed more shallow
c. This would reduce the number of tuples to involve in the join resulting in a more efficient query.
d. The outer selection would prevent the optimizer from picking the correct index

Answers

Answer:

c. This would reduce the number of tuples to involve in the join resulting in a more efficient query.

Explanation:

SQL or structured query language is a database querying language used to communicate or interact with databases. A database query could be as simple as returning all the columns from a database table to complex like joining several query results which in turn forms an algebra expression.

Every query statement or expression is executed with time, execution time needs to be minimized for efficiency, so, a well-arranged and reduced joining in the query improves the efficiency of the query.

Write a recursive method called, doMyMath, which takes as input any positive integer and calculates the factorial (use comments for necessary items).

Answers

Answer:

def doMyMath(n):  

    if n == 1:  

         return n  

    else:  

         return n*doMyMath(n-1)  

Explanation:

This line defines the function

def doMyMath(n):  

This line checks if n is 1. If yes, it returns n (1)

    if n == 1:  

         return n  

If otherwise, it calculates the fibonacci recursively

    else:  

         return n*doMyMath(n-1)  

To call the function from main, you can use:

print(doMyMath(5))

or

num = int(input("Number: "))   --- This gets the number from user

print("Result: ",doMyMath(num)) --- This calculates the factorial

This question is answered in Python

Generally speaking, digital marketing targets any digital device and uses it to advertise and sell a(n) _____.


religion

product or service

governmental policy

idea

Answers

Answer:

product or service

Explanation:

Digital marketing is a type of marketing that uses the internet and digital media for the promotional purposes. It is a new form of marketing where the products are not physically present. The products and services are digitally advertised and are used for the popularity and promotion. Internet and digital space are involved in the promotion. Social media, mobile applications and websites are used for the purpose.

Answer:

A.) Product or service

Explanation:

Digital marketing is the practice of promoting products or services through digital channels, such as websites, search engines, social media, email, and mobile apps. The goal of digital marketing is to reach and engage with potential customers and ultimately to drive sales of a product or service. It can target any digital device that can access the internet, and it can use a variety of techniques such as search engine optimization, pay-per-click advertising, social media marketing, content marketing, and email marketing to achieve its objectives.

What input is needed for the defined output?

Answers

Answer:

The data that are needed to be included in the output is called as

Inputs are the signals or data received by the system and outputs are the signals or data sent from it. The term can also be used as part of an action; to "perform I/O" is to perform an input or output operation

What is meant by the term visual communication?

Answers

Answer:

eye contact

Explanation:

Suppose that a 2M x 16 main memory is built using 256kB x 8 RAM chips and memory is word addressable, how many RAM chips are necessary?

Answers

Answer:

16 RAM chips

Explanation:

To calculate the number of RAM chips needed, we divide the total size of the main memory by the size of each RAM chip. Hence:

Number of RAM chips required = Main memory size / size of one RAM

2M = 2²¹, 16 = 2⁴, 256K = 2¹⁸, 8 = 2³

Hence:

Number of RAM chips required = (2²¹ * 2⁴) / (2¹⁸ * 2³) = 2⁴ = 16

Therefore 16 RAM chips are necessary

how to create a structure using c# programming

Answers

Answer:

The answer to this question is given in the explanation section.

Explanation:

C# uses the struct keyword to declare structure.

The are used to store related data item.

For example the record of Student i-e his name, father name, address and class no can be declared using structure

using system

struct Student {

  public string name;

  public string father_name;

  public string address;

  public int class_no;

};

If you are a mathematics student and want to study the secret of writing cryptographic codes, algorithms, encryption and decryption techniques, then you are learning about cryptography.

If you are a cryptography student and want to write a PHD style paper on cryptography and cryptanalysis, then you are learning about cryptology.

If you work at the code breaking division at the National Security Agency (NSA), then you are part of which team?

A. Cryptosystems Team
B. Cryptanalysis Team
C. Cryptologist Team
D. Cracker Team​

Answers

Answer:

d

Explanation:

hi

You are part of a sales group that has been asked to give a presentation.
Before you begin, what should you and your group do?
O A. Figure out who is the best public speaker.
O B. Look into file-sharing options so that everyone can work on the
same file at the same time.
OC. Buy the best software on the market.
O D. Ask if you have to give a slide presentation.

Answers

The answer is the 2 one becuase I took the test

explain the principles of computer applications ​

Answers

Answer:

The nature of computers and code, what they can and cannot do.

How computer hardware works: chips, cpu, memory, disk.

Necessary jargon: bits, bytes, megabytes, gigabytes.

How software works: what is a program, what is "running"

How digital images work.

Computer code: loops and logic.

Big ideas: abstraction, logic, bugs.

In java
Write a program that draws out a path based on the user input. The starting coordinates for the path is the middle of the DrawingPanel. Ask the user to enter an x and a y coordinate for a DrawingPanel. Your program will draw a line from the last coordinates to the current coordinates the user enters. If the user enters an x value or y value out of bounds of the DrawingPanel, then end the program.

Answers

Answer:

import javax.swing.JPanel;

import javax.swing.JOptionPane;

import javax.swing.JFrame;

import javax.swing.JLabel;  

import javax.swing.JTextField;

import javax.swing.border.Border;

import java.awt.event.ActionEvent;

import java.awt.event.ActionListener;

import javax.swing.BorderFactory;

import javax.swing.JButton;

import java.awt.BorderLayout;

import java.awt.Color;

import java.awt.FlowLayout;

import java.awt.Graphics;

import java.awt.Rectangle;

public class DrawingPanel{

 

private static final int width = 800;

private static final int heigth = 500;

private static JFrame mainFrame;

private static JPanel mainPanel, inputPanel, drawPanel;

private static JLabel xLabel, yLabel;

private static JTextField xField, yField;

private static JButton drawButton;

 

public static void main(String[] args)

{

mainFrame = new JFrame("Draw Path");

mainPanel = new JPanel(new BorderLayout());

 

inputPanel = new JPanel(new FlowLayout(FlowLayout.CENTER));

xLabel = new JLabel("X Coordinate: ");

xField = new JTextField(5);

yLabel = new JLabel("Y Coordinate: ");

yField = new JTextField(5);

drawButton = new JButton("Draw");

inputPanel.add(xLabel);

inputPanel.add(xField);

inputPanel.add(yLabel);

inputPanel.add(yField);

inputPanel.add(drawButton);

 

Border border = BorderFactory.createLineBorder(Color.black);

drawPanel = new JPanel(new FlowLayout(FlowLayout.CENTER));

drawPanel.setBorder(border);

 

mainPanel.add(inputPanel, BorderLayout.NORTH);

mainPanel.add(drawPanel, BorderLayout.CENTER);

 

mainFrame.add(mainPanel);

mainFrame.setSize(PANEL_WIDTH, PANEL_HEIGHT);

mainFrame.setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE);

mainFrame.setLocationRelativeTo(null);

mainFrame.setResizable(false);

mainFrame.setVisible(true);

 

// action listener for draw button

drawButton.addActionListener(new ActionListener() {

(use the at sign here)Override

public void actionPerformed(ActionEvent e) {

if(xField.getText().equals("") || yField.getText().equals(""))

JOptionPane.showMessageDialog(null, "Please enter the x and y coordinates!");

else

{

int x2 = Integer.parseInt(xField.getText().trim());

int y2 = Integer.parseInt(yField.getText().trim());

if(x2 > WIDTH || y2 > HEIGHT)

JOptionPane.showMessageDialog(null, "x and y coordinates should be less than "

+ width + " and " + height + " respectively!");

else

drawPath(x2, y2);

}

}

});

}

 

public static void drawPath(int x2, int y2)

{

int x1 = (int)drawPanel.getBounds().getCenterX();

int y1 = (int)drawPanel.getBounds().getCenterY();

 

Graphics g = drawPanel.getGraphics();

Rectangle r = drawPanel.getBounds();

g.setColor(drawPanel.getBackground());

g.fillRect(r.x, r.y, r.width, r.height);

 

g.setColor(Color. blue);

g.drawLine(x1, y1, x2, y2);

}

}

Explanation:

The class DrawingPanel is a Java class that gets the user input for the coordinate of a path with predetermined heigth and width (defined in the class). The methods of the class are; getGraphics(), getBounds(), getBackground(), setColor() and fillRect(). The result is a rectangular path GUI on the screen.

A strictly dominates choice B in a multi-attribute utility. It is in your best interest to choose A no matter which attribute youare optimizing.

a. True
b. False

Answers

Answer:

A strictly dominates choice B in a multi-attribute utility. It is in your best interest to choose A no matter which attribute youare optimizing.

a. True

Explanation:

Yes.  It is in the best interest to choose option A which dominates choice B.  A Multiple Attribute Utility involves evaluating the values of alternatives in order to make preference decisions over the available alternatives.  Multiple Attribute Utility decisions are basically characterized by multiple and conflicting attributes.  To solve the decision problem, weights are assigned to each attribute.  These weights are then used to determine the option that should be prioritized.

help please with the question in the photo

Answers

Answer:

A

Explanation:

A because, why would someone want to listen to your own interests?

Guys, please help me asap (Photo Attached) !!!!!!! HELP 25pts!!!!

Answers

The answer is the first number line.

30/150 = 1/5 = 20%

Answer:

20%

Convert fraction (ratio) 30 / 150 Answer: 20%

The first one.

Please I need one more braniest for 'expert' may I get it?

Explanation:

what is the operating system on an IBM computer?​

Answers

Answer:

OS/VS2 and MVS

Explanation:

IBM OS/2, is full International Business Machines Operating System/2, an operating system introduced in 1987 IBM and the Microsoft Corporation to operate the second-generation line of IBM personal computers, the PS/2 (Personal System/2.) hope this helps! Pleas mark me as brainliest! Thank you! :))

The letters G, H, T, Y, B, and N are what type of keys?

Home row keys
Lower row keys
Reach keys
Upper row keys

Answers

Answer: lower row keys

Explanation: I took the test

Should video gaming be considered a school sport?

Answers

Answer:

I believe it should be in higher grades such as high school or college so people don't abuse it like little kids might.

Answer:

No because the defininition of sports is an activity involving physical exertion and Video games don't involve physical extertion.

Is it important to use varied methods when creating digital media presentations? Why or why not?


Yes, because no one method is capable of adequately delivering the information.

No, because using more than one method is confusing to the audience.

No, because the different methods are incompatible with each other.

Yes, because it makes the presentation more interesting for the audience.

Answers

The answer is yes becuase no one method is capable one becuase I took the test on edge

:) :) :):):):)):):):)):)/):))::)):):):):):)):):)):):))/):):))

Answers

Answer:

:)))))))))))))))))))))))))))))))))))))))) thanks

The function's only behavior should be to return the sum of array userVals' elements. What common error does the function make?
Assume userVals always has exactly 10 elements.
int SumArray Elements(int uservals[]) {
for (i = 1; i <10; ++i) {
userVals[i] = userVals[i] + userVals[i - 1]; } return userVals[i]; }
A. Attempts to access an invalid element.
B. Omits the first element from the sum.
C. Modifies userVals' elements.
D. Omits the last element from the sum.

Answers

Answer:

A. Attempts to access an invalid element.

Explanation:

The C program above is supposed to loops 10 times to get the total of the userVal's element, but the loop is assigning the cumulative sum of the to each nth index of the userVal array. Although the cumulative total of the array is assigned to the last index, the return statement is attempting to return an invalid element (since i is local only to the for loop statement). The program should return the userVal[9] instead.

Net has a class that can generate parallel threads without the programmer needing to be overly burdened with thread maintenance. One method from this class that we examined in this course is:_________.
A. Thread.Invoke()
B. Cast.All
C. Parallel.For
D. Thread.Cast()
E. ThreadPool.Invoke()

Answers

Answer:

The correct answer is option C "Parallel.For"

Explanation:

Parallel.For for the most part work best on external loop as opposed to inward circles. This is on the grounds that with the previous, you're offering bigger lumps of work to parallelize, weakening the administration overhead. Parallelizing both inward and external loops is typically superfluous. In the accompanying model, we'd commonly need in excess of 100 cores to profit by the inward parallelization.

Designers use the Parallel class for a situation alluded to as information parallelism. This is where a similar activity is acted in equal on various things. The most widely recognized illustration of this is in an array which should be followed up on. Using the Parallel class, you can use this procedure/operation on any sort of iteration, in Parallel.

C++ please
Write a program that does the following.
Create a dynamic two dimensional squarearray of unsigned integers (array_one). Prompt the user to enter the number of rows and columns they want (maximum of 30) (rows and columns must be the same for a square array)
Pass the array to a function that will initialize the two dimensional array to random numbers between 0 and 4000 using the rand() library function. Here is the kicker: The array cannot have any repeated values!
Create another dynamic two dimensional array of the same size (array_transpose)
Pass both arrays to a function that will generate the transpose of array_one returning the values in array_transpose. (If you don’t already know the transpose swaps the rows and columns of an array.) Example: Suppose you have a 4 x 4 array of numbers (array_one). The transpose is shown below (array_transpose)
Array One Array Transpose
1 2 3 4 1 5 9 13
5 6 7 8 2 6 10 14
9 10 11 12 3 7 11 15
13 14 15 16 4 8 12 16
Pass each array to a print_array function that will print (to the screen or a file) the results of a test case with a 20 by 20 array.

Answers

Answer:

#include <iostream>

#include <cstdlib>

#include <ctime>

using namespace std;

int main(){

   int n;

   cout<< "Enter the row and column length: ";

   cin>> n;

   int array_one[n][n];

   int array_transpose[n][n];

   for (int i = 0; i < n; i++){

      for (int j= 0; j < n; j++){

           srand((unsigned) time(0));

           array_one[i][j] = (rand() % 4000)

           array_transpose[j][i] = array_one[i][j];

       }

   }

}

Explanation:

The C source code has three variables, 'array_one', array_transpose' (both of which are square 2-dimensional arrays), and 'n' which is the row and column length.

The program loops n time for each nth number of the n size to assign value to the two-dimensional array_one. the assign values to the array_transpose, reverse the 'i' and 'j' values to the two for statements for array_one to 'j' and 'i'.

Other Questions
HELP! PLEASE!Which amendments cover more than one right? What is that right? The Food and Drug Administration (FDA), United States Department of Agriculture (USDA), and the Center for Disease Control (CDC) are part of which level of government? (ASL)The type of sign language used in America is different from the type of sign language used in Great Britain, even though both countries are English-speaking.A. TrueB. False !!!! HELP PLEASE !!!! WILL GIVE BRAINLIEST!!!!!!!!!Find the error and explain why it is wrong: (THE ERROR IS NOT EXTRANEOUS SOLUTIONS)Step ___ is incorrect because ____________. Instead, you should _____________________. I NEED HELP WITH HISTORY HOMEWORK PLS PLEASE HELP WORTH 14 points. 19and 20 Target Corporation reported the following information in a recent Form 10-K. Consolidated Statement of Operations ($ millions) FY 2016 Cost of sales $67,596 Consolidated Statement of Financial Position ($ millions) FY 2016 FY 2015 Inventory $10,321 $8,282 What is the (a) inventory turnover ratio, and (b) average days in inventory, for the fiscal year ended January 30, 2016? WILL GIVE BRAINLIST How did the natural resources of coastal American Indian tribes differ from those of other regions?Coastal tribes had more food to eat.Coastal tribes got food from the ocean.Coastal tribes had more animals to hunt.Coastal tribes hunted mainly in grasslands. Danielle baked macaroni for her children for which she used up th of a jug of milk. She also poured20.5 ounces of milk into a bowl of cornflakes. If 25.5 ounces of milk remain in the jug, how much milkdid the jug originally contain? pls help pls ASAPWILL MARK BRAINLIIEST List at least 3 places you can get a flu shot An oblique prism has a volume of 144 cubic units. The area of its base is 24 square units. If the vertex of a parabola is (- 3, 4) and the parabola has a stretch of 3find the next two points on the parabola right the vertex What is the correct answer? Please hurry Which graph below represents the linear inequality y 5/2x - 4?A.)B.)C.)D.) 10 2/7 to improper fraction Select the correct answer.In the late Middle Ages, people could use an overland route between the mouth of the Nile River on the Mediterranean coast and the Red Sea in Arabia. What was adisadvantage of that overland route as a trade route to the East?. The route crossed a hot, barren desert, which made traveling difficult.OB. Mongolian bandits robbed merchants who traveled the route., The Egyptians heavily taxed the route, making travel expensive.OD The discovery of the Cape of Good Hope made the route obsolete. PLEASE ANSWER ASAP FOR BRAINLEST!!!!!!!!!!!!!!!!1Write an expression that is equivalent to 3k - 18 18. Which region did not want slaves to count as people for population counts?" Help plz its algebra 1