1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
polet [3.4K]
3 years ago
14

How does virtualization factor into a layered vs. non-layered design discussion?

Computers and Technology
2 answers:
GarryVolchara [31]3 years ago
7 0

Answer:

The two designs differ in the operating systems

Explanation:

The layered and non-layered designs have intricate differences between them.

  • In the layered design, the virtualization is the main factor that controls the kernel level virtualization in the system. In addition, the operating system hosts is mainly run on a special type of altered kernel that basically contains the operating system for controlling and managing the virtual memory.
  • However, in the non-layered design, the system virtualization is the architecture design of the Linux system and the UNIX operating system. In addition, the core of the operating system is the kernel that handles all the interactions between the operating software and the hardware.
Kamila [148]3 years ago
3 0

Answer:

In the layered design, the virtualization is the main factor that control the kernel level visualization in the system. The operating system host is mainly run on the special type of altered kernel that basically contain the operating system for controlling and managing the virtual memory (VM).  

In the non layered design, the system virtualization is the architecture design of the Linux and UNIX based operating system. The core of the operating system is the kernel that handle all the interaction between the operation system and the hardware.  

You might be interested in
Two types of business communications enhanced by desktop publishing are
Likurg_2 [28]
The correct option is D.
The two types of business communication that are enhanced by desktop publishing are internal and external communication. Internal communication refers to the information and ideas that are exchange within the organisation while external communication refers to information and ideas that are exchange between the organisation and the outside world.<span />
4 0
3 years ago
Read 2 more answers
You are working with a database table that contains data about music. The table includes columns for track_id, track_name (name
german

The statement that completes the query is: bytes / 1000 AS kilobytes

<h3>SQL (Structured Query Language)</h3>

This is the language that is used to retrieve, update, and store data in the database.

<h3>Columns</h3>

From the question, we have the following table columns

  • track_id
  • track_name (name of the music track)
  • composer
  • bytes (digital storage size of the music track

To retrieve data from the bytes column, we make use of:

SELECT bytes ......

From the question, we understand that this column should be divided by 1000, and the AS command should be used.

So, the query becomes

SELECT bytes / 1000 AS kilobytes .....

Hence, the statement that completes the query is: bytes / 1000 AS kilobytes

Read more about database at:

brainly.com/question/24223730

5 0
2 years ago
Your company wants to use an IoT device but wants to make sure it does not interfere with other RF devices that use the 2.4 GHz
jonny [76]

Answer:

C. Z-wave

Explanation:

The Z wave is a wireless communications protocol used primarily for automation. The Z- wave operates using a mesh network and then uses low energy radio waves to communicate from appliance to appliance.

The Z wave operates on a lower frequency than most other popular RF devices, thus making interference nonexistent.

The range of the Z-wave is 100m. Hence, it can give a perfect coverage from the base station to the company.

<em>Option A is wrong</em> . This is because the Zigbee is insecure and has a low coverage range (10m-20m). This means that there are possibilities of interference and also improper coverage beyond 50 m.

<em>Option B is wrong.</em> This is because Bluetooth devices are insecure, can loose connections under certain conditions. They have a range of 10m which is a lot lower than 50m benchmark.

<em>Option D is wrong</em>. NFC stands for Near Field Communication. This means its range is practically about 4cm and it cannot be used for long ranges as the company intends.

6 0
4 years ago
When a Select Case statement executes, the value of the test expression is compared with the values that follow each of the ____
goldenfox [79]

Answer:

Case

Explanation:

In Computer programming, a variable can be defined as a placeholder or container for holding a piece of information that can be modified or edited.

Basically, variable stores information which is passed from the location of the method call directly to the method that is called by the program.

For example, they can serve as a model for a function; when used as an input, such as for passing a value to a function and when used as an output, such as for retrieving a value from the same function. Therefore, when you create variables in a function, you can can set the values for their parameters.

A Select Case statement can be defined as a conditional statement that avails software developers or programmers the ability to test a variable by comparing it with a list of values.

In a Select Case statement, each variable is referred to as a Case.

Generally, when a Select Case statement executes, the value of the test expression is compared with the values that follow each of the Case keywords.

7 0
3 years ago
They are correct? thank you!
vredina [299]

Answer:

<em>Yes</em><em> </em><em>they</em><em> </em><em>are</em><em> </em><em>correct</em><em>.</em><em> </em><em>welcome</em><em>.</em><em>.</em><em>.</em><em>.</em>

8 0
3 years ago
Other questions:
  • What keyboard shortcut keys selects cell A1
    12·1 answer
  • In order to accomplish the same goal, a person can click and hold down the mouse button and drag to the right, or hold Shift and
    5·2 answers
  • A search engine company needs to do a significant amount of computation every time it recompiles its index. For this task, the c
    5·1 answer
  • Ella has finished drafting her presentation. What should she do next?
    6·2 answers
  • Which categories format cells
    14·2 answers
  • Is a router on the local network that is used to deliver packets to a remote network?
    15·1 answer
  • Drag the correct type of update to its definition.
    13·1 answer
  • CLI is not used friendly ​
    15·1 answer
  • Https://forms.gle/eP8F5eKC2AUaCsB67
    14·1 answer
  • Language is Python
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!