1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
polet [3.4K]
3 years ago
14

How does virtualization factor into a layered vs. non-layered design discussion?

Computers and Technology
2 answers:
GarryVolchara [31]3 years ago
7 0

Answer:

The two designs differ in the operating systems

Explanation:

The layered and non-layered designs have intricate differences between them.

  • In the layered design, the virtualization is the main factor that controls the kernel level virtualization in the system. In addition, the operating system hosts is mainly run on a special type of altered kernel that basically contains the operating system for controlling and managing the virtual memory.
  • However, in the non-layered design, the system virtualization is the architecture design of the Linux system and the UNIX operating system. In addition, the core of the operating system is the kernel that handles all the interactions between the operating software and the hardware.
Kamila [148]3 years ago
3 0

Answer:

In the layered design, the virtualization is the main factor that control the kernel level visualization in the system. The operating system host is mainly run on the special type of altered kernel that basically contain the operating system for controlling and managing the virtual memory (VM).  

In the non layered design, the system virtualization is the architecture design of the Linux and UNIX based operating system. The core of the operating system is the kernel that handle all the interaction between the operation system and the hardware.  

You might be interested in
Dash transfers several bits of data together at one time<br>​
Andreas93 [3]

Answer:

Synchronous data transmission is a data transfer method in which a continuous stream of data signals is accompanied by timing signals (generated by an electronic clock) to ensure that the transmitter and the receiver are in step (synchronized) with one another. The data is sent in blocks (called frames or packets) spaced by fixed time intervals.

6 0
3 years ago
What is the range of the well-known ports used by tcp and udp?
melamori03 [73]
/etc/services on my CentOS machine goes up to 49000. Reserved ports are less than 1024.

Well known and reserved ports are two different things. Well known ports only need a registration with IANA. Reserved ports, on *nixes, requires root for a deamon to bind to the port.
8 0
3 years ago
​What file system below does not support encryption, file based compression, and disk quotas, but does support extremely large v
Elena L [17]

Answer:

D.  ReFS

Explanation:

File system is simply a management system for files that controls how and where data are stored, where they can be located and how data can be accessed. It deals with data storage and retrieval.

Examples of file system are NTFS, FAT(e.g FAT 16 and FAT 32), ReFS.

ReFS, which stands for Resilient File System, is designed primarily to enhance scalability by allowing for the storage of extremely large amounts of data and efficiently manage the availability of the data. It is called "resilient" because it ensures the integrity of data by offering resilience to data corruption. It does not support transaction, encryption, file based compression, page file and disk quotas, to mention a few.

6 0
3 years ago
What is a URN (include example)
BARSIC [14]

Answer: URN(Uniform Resource Name) is the basically a subset of the Uniform Resource identifier(URL). It uses "urn"scheme for the working an implementation. Uniform resource name functions by identifying components uniquely through their name.

The most common example of URN is ISBN (International Standard Book Number)number which helps in the unique searching and identification of book.

7 0
4 years ago
Often, the symptoms of withdrawal are __________.
guapka [62]
I would say none of the above as A, B, and C do not seem like sensible answers.
3 0
3 years ago
Other questions:
  • Some cars are 100 percent efficient at converting energy from gasoline to energy of motion.
    11·2 answers
  • What is Napoleon's friend's full name? From the Napoleon Dynamite movie.
    9·2 answers
  • You can change the transparency of a picture used as a slide’s background with the ____.
    10·1 answer
  • Which federal agency enforces safety and health legislation and requires employers to be sure that adequate first-aid supplies a
    5·1 answer
  • A circuit breaker will do which of the following
    12·1 answer
  • What is the code for forgot password on messenger​
    9·1 answer
  • Match each with the correct answer.
    7·1 answer
  • Match the TCP/IP Layer to a problem that can happen there.
    8·1 answer
  • Andy works for a TV broadcasting company. He needs to set up a network covering a small area on the work floor. However, he noti
    13·1 answer
  • A diagram of a ten-node network that uses ten routers
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!