1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
polet [3.4K]
3 years ago
14

How does virtualization factor into a layered vs. non-layered design discussion?

Computers and Technology
2 answers:
GarryVolchara [31]3 years ago
7 0

Answer:

The two designs differ in the operating systems

Explanation:

The layered and non-layered designs have intricate differences between them.

  • In the layered design, the virtualization is the main factor that controls the kernel level virtualization in the system. In addition, the operating system hosts is mainly run on a special type of altered kernel that basically contains the operating system for controlling and managing the virtual memory.
  • However, in the non-layered design, the system virtualization is the architecture design of the Linux system and the UNIX operating system. In addition, the core of the operating system is the kernel that handles all the interactions between the operating software and the hardware.
Kamila [148]3 years ago
3 0

Answer:

In the layered design, the virtualization is the main factor that control the kernel level visualization in the system. The operating system host is mainly run on the special type of altered kernel that basically contain the operating system for controlling and managing the virtual memory (VM).  

In the non layered design, the system virtualization is the architecture design of the Linux and UNIX based operating system. The core of the operating system is the kernel that handle all the interaction between the operation system and the hardware.  

You might be interested in
Communication protocols, sets of rules agreed to by all parties, are designed in order to:
mote1985 [20]

Group of answer choices.

A. Ensure that cell phones and laptops cannot communicate.

B. Give each country its own internet language.

C. Ensure that new technologies and devices that haven't been invented yet can all use the same methods of communication.

D. Assure that computers and other devices don't pollute the environment.

Answer:

C. Ensure that new technologies and devices that haven't been invented yet can all use the same methods of communication.

Explanation:

OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;

1. Physical Layer

2. Data link Layer

3. Network Layer

4. Transport Layer

5. Session Layer

6. Presentation Layer

7. Application Layer

Each layer has its unique functionality which is responsible for the proper functioning of the communication services.

Additionally, a standard framework for the transmission of informations on the internet, it is known as the internet protocol suite or Transmission Control Protocol and Internet Protocol (TCP/IP) model. One of the very basic rule of the TCP/IP protocol for the transmission of information is that, informations are subdivided or broken down at the transport layer, into small chunks called packets rather than as a whole.

Hence, communication protocols, sets of rules agreed to by all parties, are designed in order to ensure that new technologies and devices that haven't been invented yet can all use the same methods of communication.

This ultimately implies, there exist standard frameworks and protocols that are designed and developed to serve pre-existing technologies and devices, as well as those that would be invented in the future.

For example, SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services on an internet-enabled device.

3 0
3 years ago
What is the highlighted portion of the screen called?
inna [77]

Answer:

/ˈerər/

Learn to pronounce

noun

a mistake.

"spelling errors"

Similar:

mistake

fallacy

misconception

delusion

inaccuracy

miscalculation

misreckoning

blunder

fault

flaw

oversight

misprint

literal

erratum

misinterpretation

misreading

slip-up

bloomer

boo-boo

6 0
4 years ago
How do you print a document?
Monica [59]
Control + P (push these buttons at the same time)

or right click and print.

if you are printing a webpage, the steps are the same.

if you are using Word, then you just need to find the File tab and print should be in the list.
3 0
3 years ago
Suppose that, even unrealistically, we are to search a list of 700 million items using Binary Search, Recursive (Algorithm 2.1).
damaskus [11]

Answer:

There is also an attachment below

Explanation:

Since we are talking about binary search, let's assume that the items are sorted according to some criteria.

Time complexity of binary search is O(logN) in worst case, best case and average case as well. That means it can search for an item in Log N time where N is size of the input. Here problem talks about the item not getting found. So, this is a worst case scenario. Even in this case, binary search runs in O(logN) time.

N = 700000000.

So, number of comparisions can be log(N) = 29.3 = 29.

So, in the worst case it does comparisions 29 times

7 0
3 years ago
Anti-malware software should be installed on computer systems to detect and prevent malware infections.
Evgen [1.6K]

Answer:

true

Explanation:

Malware is any software intentionally designed to cause damage to a computer, server, client, or computer network. A wide variety of types of malware exist, including computer viruses, worms, Trojan horses, ransomware, spyware, adware, rogue software, and scareware

Antimalware (anti-malware) is a type of software program designed to prevent, detect and remove malicious software (malware) on IT systems, as well as individual computing devices

6 0
3 years ago
Read 2 more answers
Other questions:
  • Angela's ready to get started with her first Smart Display campaign, but her account isn't yet eligible due to not having enough
    11·1 answer
  • Universal Container sales reps can modify fields on an opportunity until it is closed. Only the sales operations team can modify
    13·1 answer
  • 7.4.1C The global distribution of computing resources raises issues of equity, access, and power. Briefly describe one of these
    11·1 answer
  • How do you add a section break that would start the new section on the same page?
    12·2 answers
  • Run a Monte Carlo simulation on this vector representing the countries of the 8 runners in this race:
    7·1 answer
  • How could you represent the following binary color in hexadecimal? What is its numerical value? What color is it? How
    13·1 answer
  • After a business transaction has been analyzed, which of the following must occur for the analysis to have been done correctly?
    9·1 answer
  • If you are to enhance the ICT used by your teachers, how will ypu do it? Will you use the same ICT or will you modify how it was
    11·1 answer
  • Computers were originally developed to accomplish various tasks in relative isolation, very different from the collaboration and
    14·1 answer
  • You need to design an online login form in which users have to type their name and password to log into an application. The pass
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!