1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
polet [3.4K]
3 years ago
14

How does virtualization factor into a layered vs. non-layered design discussion?

Computers and Technology
2 answers:
GarryVolchara [31]3 years ago
7 0

Answer:

The two designs differ in the operating systems

Explanation:

The layered and non-layered designs have intricate differences between them.

  • In the layered design, the virtualization is the main factor that controls the kernel level virtualization in the system. In addition, the operating system hosts is mainly run on a special type of altered kernel that basically contains the operating system for controlling and managing the virtual memory.
  • However, in the non-layered design, the system virtualization is the architecture design of the Linux system and the UNIX operating system. In addition, the core of the operating system is the kernel that handles all the interactions between the operating software and the hardware.
Kamila [148]3 years ago
3 0

Answer:

In the layered design, the virtualization is the main factor that control the kernel level visualization in the system. The operating system host is mainly run on the special type of altered kernel that basically contain the operating system for controlling and managing the virtual memory (VM).  

In the non layered design, the system virtualization is the architecture design of the Linux and UNIX based operating system. The core of the operating system is the kernel that handle all the interaction between the operation system and the hardware.  

You might be interested in
Which type of software is the most similar to database software?\
kykrilka [37]
The answer is graphics
5 0
3 years ago
Which type of information should never be given out on social media?
zhenek [66]

Answer:

Sites like Face.book are full of valuable data for people who use social engineering to steal your identity on social media. You should therefore avoid sharing information that's used to verify your identity,

Explanation:

7 0
2 years ago
Read 2 more answers
Aapke question about computer keyboard​
Lapatulllka [165]

Explanation:

A computer keyboard is an input device that allows a person to enter letters, numbers, and other symbols (these are called characters in a keyboard) into a computer. It is one of the most used input devices for computers. Using a keyboard to enter lots of data is called typing

8 0
2 years ago
Websites can have good content for a particular set of search phrases, yet rank poorly. Issues that may cause this to occur incl
raketka [301]

Answer:

B. deep organizational structure

Explanation:

A website with a deep organizational structure is a positive attribute that improves site performance.

5 0
3 years ago
In python 3.17 LAB: Convert to dollars
krok68 [10]

To convert the inputs to dollars and cents, we make use of a combination of multiplication and addition.

The program written in Python where comments are used to explain each line is as follows:

<em />

<em>#This gets input for the number of quarters</em>

quarters = int(input("Quarters: "))

<em>#This gets input for the number of dimes</em>

dimes = int(input("Dimes: "))

<em>#This gets input for the number of nickels</em>

nickels= int(input("Nickels: "))

<em>#This gets input for the number of pennies</em>

pennies= int(input("Pennies: "))

<em>#This converts the amount to dollars and cents</em>

dollars = quarters * 0.25 + dimes * 0.10 + nickels * 0.05 + pennies * 0.01

<em>#This prints the amount to 2 decimal places</em>

print("Amount ${:.2f}".format(dollars))

Read more about Python programs at:

brainly.com/question/22841107

7 0
2 years ago
Other questions:
  • A patent facilitates a government-approved technological monopoly by
    5·1 answer
  • Given that the array monthSales of integers has already been declared and that its elements contain sales data for the 12 months
    6·1 answer
  • What menu allows you to look up a command and learn how to use it?
    14·1 answer
  • Why is it important to develop a research plan?
    5·1 answer
  • Which of the following is the correct order of the SDLC?
    14·1 answer
  • 1. Consider a direct-mapped cache that can accommodate 8Mbytes from a main memory, that uses a 32-bit address and 32-byte blocks
    5·1 answer
  • Kai notices his laptop is running sluggishly, so he wants to check his system resources for any issues. Which utility can he use
    11·2 answers
  • Write a python program to change variable value of your previous result percentage to your current percentage of mid-term
    13·1 answer
  • If a password is entered wrongly three times the computer will
    15·1 answer
  • PlanthelogicforLungi’sapplicationusingpseudocode.Thelogicneedstosatisfythefollowingneeds:TheapplicationwillneedtoallowLungitoen
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!