With this approach only a small piece of the application is installed on the end user device. Just enough for the end user device to be recognized as an authorized user. This only requires just a small portion of the application to be downloaded.
A. Virtual NIC
B. virtual application streaming
C. container virtualization
D. virtual desktops
Answer: B. virtual application streaming
Computer Science & Information Technology
You might also like to view...
_________ is the security-based Group Policy settings that apply to a local computer and its local users
Fill in the blank(s) with correct word
Computer Science & Information Technology
According to the creators of C#, an infrequent event in code is one that happens in less than what percent of all program executions?
A. 10% B. 25% C. 30% D. 35%
Computer Science & Information Technology