Please provide response to the below post.
Topic #1) You are an administrator for the Contoso Corporation and you are responsible for multiple Hyper-V hosts. Often, the developers need to create virtual machines so that they can test their applications. Describe the steps you should take so that developers can create and manage their own machines yet not have direct access to the Hyper-V hosts. Topic #2) You are an administrator for the Contoso Corporation, which has approximately 400 servers running Windows Server 2012 R2, 50 servers running Windows Server 2012, and 200 servers running Windows Server 2008 R2. You also have several virtual machines running Windows 7 and Windows 8/8.1 and you have approximately 15 domain controllers. From time to time, you field requests in which you need to specify when a user has logged in and when a user has accessed confidential documents. Describe how to handle such requests.