1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
polet [3.4K]
3 years ago
14

How does virtualization factor into a layered vs. non-layered design discussion?

Computers and Technology
2 answers:
GarryVolchara [31]3 years ago
7 0

Answer:

The two designs differ in the operating systems

Explanation:

The layered and non-layered designs have intricate differences between them.

  • In the layered design, the virtualization is the main factor that controls the kernel level virtualization in the system. In addition, the operating system hosts is mainly run on a special type of altered kernel that basically contains the operating system for controlling and managing the virtual memory.
  • However, in the non-layered design, the system virtualization is the architecture design of the Linux system and the UNIX operating system. In addition, the core of the operating system is the kernel that handles all the interactions between the operating software and the hardware.
Kamila [148]3 years ago
3 0

Answer:

In the layered design, the virtualization is the main factor that control the kernel level visualization in the system. The operating system host is mainly run on the special type of altered kernel that basically contain the operating system for controlling and managing the virtual memory (VM).  

In the non layered design, the system virtualization is the architecture design of the Linux and UNIX based operating system. The core of the operating system is the kernel that handle all the interaction between the operation system and the hardware.  

You might be interested in
private members of a class are accessible only from _____________ of the same class or from their friends
maxonik [38]

Answer: Within other member

Explanation:

 The private data member is also known as private function in the computer programming language. The private keyword is basically used to specify the access level and also provide the variable and the methods control to the programmers in the class.

In the class, the variables and the method are directly access by the other methods with the same class but not directly access by the derived class. Therefore, the private members of the class are easily access from the other member of the similar class and also from friends.    

8 0
3 years ago
Which arcade game, released in 1972, is considered to be the first to be commercially successful?.
nikitadnepr [17]

Answer:

Pong

Explanation:

Pong

4 0
2 years ago
I want to sign up for brainly but it won't let me. It keeps saying "we can complete your registration at this time".
vekshin1
Try reinstalling the app or check if your wifi connection is good, if everything’s good but the app still doesn’t work then just use the website
5 0
3 years ago
Why are high-quality transformers wound with large diameter wire?
lesya692 [45]
So that they can lower the I2R losses
8 0
3 years ago
Write a program that computes the monthly net pay of the employee for a steel factory. The input for this program is the hourly
Mars2501 [29]

Answer:

#include<stdio.h>

int main()

{

float rate_of_pay,regular_hours,overtime_hours,grosspay,netpay,tax;

printf("Enter the Hourly rate of pay : ");

scanf("%f",&rate_of_pay);

printf("Enter the number of Regular hours : ");

scanf("%f",&regular_hours);

printf("Enter the number of Overtime hours : ");

scanf("%f",&overtime_hours);

grosspay=(regular_hours*rate_of_pay)+(1.5*overtime_hours*rate_of_pay);

netpay=grosspay-(grosspay*0.2);

printf("Employee's Gross pay = %f\n",grosspay);

printf("Tax = %f\n",0.2*grosspay);

printf("Employee's Net pay = %f\n",netpay);

return 0;

}

Note: The variables are declared as float, to support partial hours like 0.5,6.5 etc.

Explanation:

6 0
3 years ago
Other questions:
  • Consider the following recursive method, which is intended to return a String with any consecutive duplicate characters removed.
    11·1 answer
  • Which of the following is not a typical step in the ethical hacking process? A. Planning B. Discovery C. Attack D. Recovery
    5·1 answer
  • If you want to import text into a DTP application that was first created in a word processing program, what must you do?
    9·2 answers
  • When you use the fill handle to copy a formula to adjacent cells, this creates what kind of cell reference?
    5·1 answer
  • The cold war actually helped in the development of the internet true or false
    8·1 answer
  • The most widely used presentation software program is Microsoft PowerPoint. You can produce a professional and memorable present
    8·1 answer
  • A file named numbers.txt contains an unknown number of lines, each consisting of a single positive integer. Write some code that
    6·1 answer
  • List the five parts of a system.describe them.
    13·1 answer
  • Whats wrong with my code for .addEventListener
    11·1 answer
  • O Why was the Internet originally constructed? Oto enable researchers to communicate
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!