1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
blagie [28]
2 years ago
12

Which piece of computer hardware was revised to run hypervisors natively?

Computers and Technology
2 answers:
lianna [129]2 years ago
8 0
I believe the answer may be S/360-40, (i actually used wiki cuz i was just a bit confused and it says here that the first hypervisors that provide full virtualization were the test tool SIMMON and the CP-40 system. It states that the CP-40 ran on a S/360-40, which was modified to support dynamic address translation.) 
Ne4ueva [31]2 years ago
4 0

The CPU is used as computer hardware to run hypervisors natively.

Further explanation:

The hypervisors are used in computer for virtualization of the system. The virtualization provides more flexibility, agility and flexibility to the organization.

There are mainly two types of hyper visors:

1.Native Hypervisors

2.Hosted Hypervisors

Native Hypervisors: These hypervisors directly run on the hardware.

Hosted Hypervisors: These hypervisors run on the top of the installed operating system.

All the virtual machines run on the hosted hypervisors that runs on the top of the installed operating system. So, it is incompetent with hosted architecture.

Therefore, hybrid hypervisors are used to remove the above problem. Hybrid hypervisors run directly on the hardware influence the features of an existing operating system running as a guest.

Hypervisors are used to hide the virtual machines from the hardware of the system. This will ensure the installation of virtual machine without any knowledge of the device drivers of the hardware. It is also not affected by other virtual machines.

Learn more:

1. How does coding work on computers?  brainly.com/question/2257971  

2. Prediction accuracy of a neural network depends on _______________ and ______________. brainly.com/question/10599832  

Answer details:

Grade: High School

Subject: Computer Science

Chapter: Computer basics

Keywords:

CPU, Hardware, Hypervisore, Native, Hosted, Virtual Machine, Virtualization, Device Drivers, OS ( Operating system)

You might be interested in
If you sort a portion of an Excel sheet and you get an error message such as #DIV/0, what is a likely cause of the error message
yulyashka [42]
<span>If you sort a portion of an Excel sheet and you get an error message such as #DIV/0, the cause of the error message is (B) one or more cells containing absolute cell references. The possible reason of this error message includes: (1) e</span><span>ntering division formula that divided by zero (0), (2) and that is being used as a reference.</span>
7 0
3 years ago
Write the contributions of dr herman hollerith​
Ad libitum [116K]

He invented the tabulating machine. In 1890 U.S

5 0
3 years ago
What is the role of the ieee in computer networking and wireless communications?
steposvetlana [31]
<span>An organization that sets standards for computer networking and wireless communications.</span>
8 0
3 years ago
What is a logical reason why you should be able to delete your own posts on social media?
Furkat [3]

People live in the moment and post whatever they want and they just might regret it later on.

3 0
3 years ago
Read 2 more answers
What is a key consideration when evaluating platforms?
kotegsom [21]

Answer:

The continuous performance of reliability data integrity will lead to the benefit and profit of the platform's regular structure changes. Cleanliness in the platform whereas addresses the straightforward structure of task performance and adequate data integrity.

7 0
2 years ago
Other questions:
  • What are the three main purposes of an operating system? Explain how the old mainframe computers were different from the compute
    12·1 answer
  • There are two types of short-term memory: one type is involved in the input and storage of new information, the other type of sh
    9·1 answer
  • Select the correct answer.
    6·1 answer
  • If you need to define a connection request policy to apply to an 802.1x authenticating switch or a wireless access point, which
    12·1 answer
  • This is a legitimate question if you have a problem then just ignore it. What is the difference between CRVM and SAPX in a progr
    9·2 answers
  • How do you create a formula in excel​
    10·1 answer
  • with the advent of technology one can experience special features such as 3D theater experiences true or false
    8·1 answer
  • What product use programmable control?
    11·1 answer
  • If I want to make it look like slide number one is turning a page to slide number two, what
    11·1 answer
  • When methods have ____, other programs and methods may use the methods to get access to the private data.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!