1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blagie [28]
3 years ago
12

Which piece of computer hardware was revised to run hypervisors natively?

Computers and Technology
2 answers:
lianna [129]3 years ago
8 0
I believe the answer may be S/360-40, (i actually used wiki cuz i was just a bit confused and it says here that the first hypervisors that provide full virtualization were the test tool SIMMON and the CP-40 system. It states that the CP-40 ran on a S/360-40, which was modified to support dynamic address translation.) 
Ne4ueva [31]3 years ago
4 0

The CPU is used as computer hardware to run hypervisors natively.

Further explanation:

The hypervisors are used in computer for virtualization of the system. The virtualization provides more flexibility, agility and flexibility to the organization.

There are mainly two types of hyper visors:

1.Native Hypervisors

2.Hosted Hypervisors

Native Hypervisors: These hypervisors directly run on the hardware.

Hosted Hypervisors: These hypervisors run on the top of the installed operating system.

All the virtual machines run on the hosted hypervisors that runs on the top of the installed operating system. So, it is incompetent with hosted architecture.

Therefore, hybrid hypervisors are used to remove the above problem. Hybrid hypervisors run directly on the hardware influence the features of an existing operating system running as a guest.

Hypervisors are used to hide the virtual machines from the hardware of the system. This will ensure the installation of virtual machine without any knowledge of the device drivers of the hardware. It is also not affected by other virtual machines.

Learn more:

1. How does coding work on computers?  brainly.com/question/2257971  

2. Prediction accuracy of a neural network depends on _______________ and ______________. brainly.com/question/10599832  

Answer details:

Grade: High School

Subject: Computer Science

Chapter: Computer basics

Keywords:

CPU, Hardware, Hypervisore, Native, Hosted, Virtual Machine, Virtualization, Device Drivers, OS ( Operating system)

You might be interested in
Add my sna-p dkarpik58?...
BARSIC [14]

<u><em>This is for answers not snap</em></u>

7 0
3 years ago
System software can be described as end-user software and is used to accomplish a variety of tasks.
irina [24]
Your answer is false :)

I hope this helps! :)
8 0
3 years ago
1.Discuss the differences and similarities between a peer-to peer network and a client server network.
irga5000 [103]

Answer:

dsdasd1.Discuss the differences and similarities between a peer-to peer network and a client server network.

1.Discuss the differences and similarities between a peer-to peer network and a client server network.

1.Discuss the differences and similarities between a peer-to peer network and a client server network.

1.Discuss the differences and similarities between a peer-to peer network and a client server network.

1.Discuss the differences and similarities between a peer-to peer network and a client server network.

1.Discuss the differences and similarities between a peer-to peer network and a client server network.

1.Discuss the differences and similarities between a peer-to peer network and a client server network.

Explanation:

jaiusfkybuetcrjnwxyefshrcxijkwuecvashcnzx

5 0
3 years ago
Scenario: 1. Victim opens the attacker's web site. 2. Attacker sets up a web site which contains interesting and attractive cont
Ann [662]

Answer :

These sort of attacks are known are Injected IFrame Attacks. The Injected IFrame Attacks are a common Cross Site Scripting or XCC attack that contains multiple or single iFrame tags implemented within a page which is not visible to user. User unintentionally enters his information which is posted to hacker’s server and information’s gets hacked.

5 0
3 years ago
Hey i need someone to talk to because of life it would be amazing if you can help me
Leya [2.2K]
Talk to you about... :)
3 0
3 years ago
Other questions:
  • When numbers are changed in cells that are involved in formula is the formulas are automatically
    14·1 answer
  • You use a ____ following the closing brace of an array initialization list.
    12·2 answers
  • Why are specification for food processing tool,equipmentand untensils necessary?​
    8·1 answer
  • i set up an account and paid the yearly fee, now it's asking me to join. i've tried to log in and brainly isn't accepting my ema
    8·1 answer
  • What are attribute grammars used for?
    8·1 answer
  • if a second system failure occurs while the first recovery is in progress, what needs tobe done after the system recovers for th
    11·1 answer
  • You are working with an online tech service to fix a problem with installation of a program on your machine. You grant them remo
    13·1 answer
  • Compared with other PC operating systems, the Linux-based operating systems:
    13·1 answer
  • 1. If an android phone is out of date or outdated and it requires an update. Explain the steps how I can update this phone.
    15·2 answers
  • What is ‘situational awareness” in game design?please answer in a full sentence!
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!