With this approach only a small piece of the application is installed on the end user device. Just enough for the end user device to be recognized as an authorized user. This only requires just a small portion of the application to be downloaded.

A. Virtual NIC
B. virtual application streaming
C. container virtualization
D. virtual desktops

Answer: B. virtual application streaming

Computer Science & Information Technology

You might also like to view...

_________ is the security-based Group Policy settings that apply to a local computer and its local users

Fill in the blank(s) with correct word

Computer Science & Information Technology

According to the creators of C#, an infrequent event in code is one that happens in less than what percent of all program executions?

A. 10% B. 25% C. 30% D. 35%

Computer Science & Information Technology