Virtual Machines are used for many applications ranging from testing, research and security. Your task is...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Virtual Machines are used for many applications ranging from testing, research and security. Your task is to install a virtual machine on you local computer (laptop or desktop). You can install the operating system of your choice (Windows, Mac, Ubuntu, Kali Linux, etc) Please perform the following tasks: 1. Install the virtual machine using the software from the following list: Virtual Box, VMware, Parallels, etc. Pay attention of the MD5 and SHA1 hash values, include them in your essay. 2. Take a screen shot showing the opened virtual machine (desktop) with your name (login) 3. Answer the following questions in an essay format (minimum 3 paragraphs) a. What kind of hypervisor did you install on your computer to host the virtual machine? b. How are the resources allocated? (shared, dedicated, etc.) c. What is the difference between the host and the guest on your computer? d. Try giving the maximum amount of cpu cores to the virtual machine, how does this effect the performance for the host and the virtual machine? e. What impact does memory have on the host and the virtual machine. Increase the memory for the virtual machine to answer this question. f. What are some security measures you implemented with your virtual machine? g. List the advantages of using virtual machines as opposed to using physical machines. h. What was the purpose of checking the MD5 and SHA1 hashes? Virtual Machines are used for many applications ranging from testing, research and security. Your task is to install a virtual machine on you local computer (laptop or desktop). You can install the operating system of your choice (Windows, Mac, Ubuntu, Kali Linux, etc) Please perform the following tasks: 1. Install the virtual machine using the software from the following list: Virtual Box, VMware, Parallels, etc. Pay attention of the MD5 and SHA1 hash values, include them in your essay. 2. Take a screen shot showing the opened virtual machine (desktop) with your name (login) 3. Answer the following questions in an essay format (minimum 3 paragraphs) a. What kind of hypervisor did you install on your computer to host the virtual machine? b. How are the resources allocated? (shared, dedicated, etc.) c. What is the difference between the host and the guest on your computer? d. Try giving the maximum amount of cpu cores to the virtual machine, how does this effect the performance for the host and the virtual machine? e. What impact does memory have on the host and the virtual machine. Increase the memory for the virtual machine to answer this question. f. What are some security measures you implemented with your virtual machine? g. List the advantages of using virtual machines as opposed to using physical machines. h. What was the purpose of checking the MD5 and SHA1 hashes?
Expert Answer:
Answer rating: 100% (QA)
Step1 Virtual Machine Installation and Evaluation of Virtual Machine Explanation Software Used VirtualBox 6132 MD5 hash 4bc13c67356108f7e4279b7f008a383e SHA1 hash 077577843439629e43698d93a451915d1149f... View the full answer
Related Book For
Project Management The Managerial Process
ISBN: 9781260570434
8th Edition
Authors: Eric W Larson, Clifford F. Gray
Posted Date:
Students also viewed these operating system questions
-
A 6 kg medicine ball sits on the weight room floor at rest. How hard must someone kick the ball if the coefficient of static friction is 0.08?
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
Hyten Corporation On June 5, 1998, a meeting was held at Hyten Corporation, between Bill Knapp, Director of Marketing/Sales, and John Rich, director of engineering. The purpose of the meeting was to...
-
If the protein produced full length antibody, what would be the next step after centrifugation?
-
Which of the following statements is true if the NPV of a project is - $4,000 (negative $4,000) and the required rate of return is 5 percent? a. The project's IRR is less than 5 percent. b. The...
-
Journalize the following transactions that occurred in March 2018 for Double Company. Assume Double uses the periodic inventory system. No explanations are needed. Identify each accounts payable and...
-
Implement the set of relational tables shown in Table 4-15 in a relational DBMS package to which you have access. Write queries to answer the following questions. Note: For some of these questions...
-
The 2012 accounting records of Liz Ten Transport reveal these transactions and events. InstructionsPrepare the cash flows from operating activities section using the direct method. (Not all of the...
-
Incorrect Question 14 Consider the attached book-value balance sheet for Federico Inc. for 2022. 2022 Current Assets Capital Assets Total Assets 11,900,000 83,500,000 95,400,000 Current Liabilities...
-
List three main departures that the U.C.C. made from the common law of contracts. Also explain all of these.
-
Write a Java program that converts a decimal number to binary based 2. For instance, 45 in binary is 101101. The decimal number is an input from the user.
-
Think about the community where you live for a moment. Identify a quality-of-life problem in your community related to criminal behavior that may be a fitting target for a community prosecution...
-
Two point charges \(q_{1}=+\mathrm{Q}\) and \(q_{2}=-3 \mathrm{Q}\) are placed along the \(x\)-axis, \(10 \mathrm{~cm}\) apart \(\left(q_{1} ight.\) at the origin, \(q_{2}\) at \(x=+10...
-
Consider the information discussed in the box "Controversy: Is the Victim's Prior Sexual Conduct Relevant in a Rape Case? Do you believe that a victim's prior sexual conduct is relevant in a rape...
-
A conducting sphere with a diameter of \(8.00 \mathrm{~cm}\) carries a charge of \(3.5 \mathrm{nC}\) that is uniformly distributed. Calculate (a) the surface charge density of the sphere (b) the...
-
When locating an attorney in or outside your state, you can often do your searching online. Martindale-Hubbell has an online directory (http://www.martindale.com), as do most state bar associations....
-
2 students need to write a paper for a class that they're taking. The paper is either "good", in which case each student gets a payoff of 20, or "not good", where each student gets 0. Each student...
-
The packaging division of a company having considered several alternative package designs for the company's new product has finally brought down their choices to two designs of which only one has to...
-
What do you think would have happened if the work had been completed in Japan instead of Australia?
-
Calculate the direct cost of labor for a project team member using the following data: Hourly rate: $50/hr Hours needed: 120 Overhead rate: 40%
-
What are the eight elements of a typical scope statement?
-
Write down careful proofs of the following statements: (a) \(\sqrt{6}-\sqrt{2}>1\). (b) If \(n\) is an integer such that \(n^{2}\) is even, then \(n\) is even. (c) If \(n=m^{3}-m\) for some integer...
-
Prove by contradiction that a real number that is less than every positive real number cannot be positive.
-
Disprove the following statements: (a) If \(n\) and \(k\) are positive integers, then \(n^{k}-n\) is always divisible by \(k\). (b) Every positive integer is the sum of three squares (the squares...
Study smarter with the SolutionInn App