1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Delvig [45]
3 years ago
7

. Virtualization simplifies the use of resources, isolates users from one another, supports replication and mobility, but exacts

a price in terms of performance and cost. Analyze each one of these aspects for: (i) memory virtualization, (ii) processor virtualization, and (iii) virtualization of a communication channel.
Computers and Technology
1 answer:
Salsk061 [2.6K]3 years ago
3 0

Answer:

In computing, virtualisation is defined as the processing of creating an intangible but electronic and functional version of a device or resource, such as a server, storage device, network or even an operating system where the framework divides the resource into one or more execution environments

(i) Memory Virtualisation

Memory virtualisation is seen as virtual memory, or swap, on servers and workstations.

It enhances performance by providing greater memory capacity, without the expense of adding main memory. Instead, a portion of a disk drive becomes an extension of main memory.

Importance of Virtual Memory

  • When the computer runs out of Random Access Memory, it writes what it needs to remember to the hard disk in a swap file as virtual memory.
  • In windows environment, if the computer requires more memory or RAM, then it is installed in the system to run a program , it uses a small section of hard drive for this purpose. A 16 MB program can run in 4 MB space by carefully choosing which 4 MB to keep in memory at each instance, with pieces of the program being swapped between disk and memory as needed.    

(II) Processor Virtualisation

CPU virtualisation involves a single CPU acting as if it were multiple separate CPUs on the same logic board within the same operating system/computer.

Usually this is done to enable the user to run multiple different operating systems on one machine at the same time. CPU virtualisation emphasises performance and runs directly on the available CPUs whenever possible. The underlying physical resources are used whenever possible and the virtualisation layer runs instructions only as needed to make virtual machines operate as if they were running directly on a physical machine.

When CPU contention occurs, the operating systems host time-slices the physical processors across all virtual machines so each virtual machine runs as if it has its specified number of virtual processors.

There is usually a performance price to pay when running a virtual processor even on an Enterprise Server environment.

(III) Virtualisation of Communication Channel

Virtual communication is defined as a mode of communication that includes the use of technology - audio and video to communicate with people who are not physically present in front of us. People can be in the next room, other floor, in neighbourhood or even miles away.

Implication of Virtualised Communication Channel

Fast: Instant messaging applications have enabled us communicate in real time as well as exchange valuable information. With Instant messaging applications or web conferencing tool, we can share news or information across the globe in seconds. This is highly valuable in times of of a disaster or collection of real time data.

Cost effective: Apart from been quickly, virtual communication also saves a lot money. Rather travelling miles, we can talk by initiating a video call. In a professional environment, it saves a lot of time and money.

Secure: Most of the texts we message via instant messaging application or web conferencing tool are encrypted, therefore no fear of our messages being misused.

Cheers!

 

You might be interested in
write a function that given an integer n returns the smallest integer greater than n the sume of whose digits is twice as big th
USPshnik [31]

The code below is written in javascript which gives us the integer,

<h3>The function code is</h3>

function solution (num){


//Javascript function


var x=0,sum=0,a,b;


var d=""; //variable declaration


var digits = num.toString().split('');


var Individual = digits.map(Number);


//console.log(Individual);


for (var i=0;i<Individual.length;i++)


{//For loop


x=x+Individual[i];


}


var y=x*2;


for(var i=0;i<Individual.length;i++)


{


sum=sum+Individual[i];


d=""+d+Individual[i];


if(sum==y)


break;


if(i==Individual.length-1)


{


i=-1;


continue;


}


}


console.log("the value is "+d);


}


var number = prompt("enter the number");


//Asking user for value...


console.log("the number is");


console.log(number);


solution(num

For more information on javascript, visit

brainly.com/question/16698901?referrer=searchResults

3 0
2 years ago
each term to the appropriate definition. DBMS data mining hash file index key field locking protocol relation roll back schema S
ikadub [295]

Answer:

1. DBMS

C. <em>A storage system that provides efficient access to randomly chosen items</em>

G. <em>Performs database operations requested by application software</em>

2. data mining

B. <em>The process of extracting hidden information</em>

3. hash file

A. <em>A. means of locating a particular record within a file</em>

4. index key field

F. <em>An item used to identify records uniquely</em>

5. locking protocol

E. <em>A system to guard against database errors due to performing transactions concurrently</em>

6. relation

D. <em>A structural unit (with rows and columns) in a popular database model</em>

7. roll back schema

I. <em>A "road map" of a particular database's design</em>

J. <em>To "unwind" a transaction</em>

8. SQL

H. <em>A popular language that implements relational database operations.</em>

5 0
3 years ago
Which of the following functions of Information Security Management seeks to dictate certain behavior within the organization th
Dmitriy789 [7]

Answer:

The correct answer to the following question will be Option B (Policy).

Explanation:

  • The Policy is a systematic set of rules for driving policies and obtaining rational results. It is a declaration of intent and is applied as a process or protocol.
  • Policies are usually implemented by the governing body throughout the corporation.
  • It was the feature of Information assurance management, which sought to dictate those activities throughout the organization via a collection of institutional requirements.

Therefore, Option B is the right answer.

7 0
3 years ago
Why would you convert your birth year to binary numbers?
I am Lyosha [343]

Answer:

Write out your birthday in the following format: M/DD/YY. For example, if your birthday is on June 11, 2013, it would be written as 6/11/13.

2. Convert the birthday date to binary format. Using our same example from above, 6/11/13 translated into binary code would be: 110/1011/1101.

3. Select one color of bead to represent “0”, a second color to represent “1” and then the third color to represent a space (/) between the numbers.

4. Layout the beads to represent your birthdate in binary code. Don’t forget the third color for the spaces in between the numbers!

5. Once laid out, string all the beads on to the string or pipe cleaner.

6. Tie a knot around the ends and enjoy your one-of-a kind masterpiece as a piece of jewelry or a bag tag….the options are endless!

6 0
3 years ago
What is the Moore's law
Nadya [2.5K]

Answer:

Hi, in the law of Moore we can express aproxitmaly for each <em>two years</em> is duplicated the number of transitors in a microprocessor.

Explanation:

In around 26 years the number of transitors has increased about 3200 times, a transitor is a way to regulate the current voltage flow and can be act like a <em>switch</em> for an electronic signal.

I hope it's help you.

4 0
3 years ago
Other questions:
  • Which presentation software element can you use to create a model diagram with two concentric circles inside a triangle?
    10·2 answers
  • IBF Consultants, LLC provides consulting services in privacy and theft deterrence solutions. Another client has very sensitive d
    7·1 answer
  • What are some of the issues that organizations need to be aware of when designing and managing data?
    8·1 answer
  • Write the definition of a function that takes as input the three numbers. The function returns true if the first number to the p
    12·1 answer
  • Implement the RC4 stream cipher in C++. User should be able to enter any key that is 5 bytes to 32 bytes long. Be sure to discar
    7·1 answer
  • True or false.local and cloud backup differs in where the backup is saved
    15·2 answers
  • A group of developers for a startup company store their source code and binary files on a shared open-source repository platform
    14·1 answer
  • Which picture should i put as my profile picture.
    15·2 answers
  • The term structure, as it relates to programming, refers to the decisions you make to design your program to best meet its objec
    11·1 answer
  • Delete temp or %temp% files in Windows 10 is safe and, can it help boost up your PC fps?
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!