1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Delvig [45]
3 years ago
7

. Virtualization simplifies the use of resources, isolates users from one another, supports replication and mobility, but exacts

a price in terms of performance and cost. Analyze each one of these aspects for: (i) memory virtualization, (ii) processor virtualization, and (iii) virtualization of a communication channel.
Computers and Technology
1 answer:
Salsk061 [2.6K]3 years ago
3 0

Answer:

In computing, virtualisation is defined as the processing of creating an intangible but electronic and functional version of a device or resource, such as a server, storage device, network or even an operating system where the framework divides the resource into one or more execution environments

(i) Memory Virtualisation

Memory virtualisation is seen as virtual memory, or swap, on servers and workstations.

It enhances performance by providing greater memory capacity, without the expense of adding main memory. Instead, a portion of a disk drive becomes an extension of main memory.

Importance of Virtual Memory

  • When the computer runs out of Random Access Memory, it writes what it needs to remember to the hard disk in a swap file as virtual memory.
  • In windows environment, if the computer requires more memory or RAM, then it is installed in the system to run a program , it uses a small section of hard drive for this purpose. A 16 MB program can run in 4 MB space by carefully choosing which 4 MB to keep in memory at each instance, with pieces of the program being swapped between disk and memory as needed.    

(II) Processor Virtualisation

CPU virtualisation involves a single CPU acting as if it were multiple separate CPUs on the same logic board within the same operating system/computer.

Usually this is done to enable the user to run multiple different operating systems on one machine at the same time. CPU virtualisation emphasises performance and runs directly on the available CPUs whenever possible. The underlying physical resources are used whenever possible and the virtualisation layer runs instructions only as needed to make virtual machines operate as if they were running directly on a physical machine.

When CPU contention occurs, the operating systems host time-slices the physical processors across all virtual machines so each virtual machine runs as if it has its specified number of virtual processors.

There is usually a performance price to pay when running a virtual processor even on an Enterprise Server environment.

(III) Virtualisation of Communication Channel

Virtual communication is defined as a mode of communication that includes the use of technology - audio and video to communicate with people who are not physically present in front of us. People can be in the next room, other floor, in neighbourhood or even miles away.

Implication of Virtualised Communication Channel

Fast: Instant messaging applications have enabled us communicate in real time as well as exchange valuable information. With Instant messaging applications or web conferencing tool, we can share news or information across the globe in seconds. This is highly valuable in times of of a disaster or collection of real time data.

Cost effective: Apart from been quickly, virtual communication also saves a lot money. Rather travelling miles, we can talk by initiating a video call. In a professional environment, it saves a lot of time and money.

Secure: Most of the texts we message via instant messaging application or web conferencing tool are encrypted, therefore no fear of our messages being misused.

Cheers!

 

You might be interested in
Select the correct answer from each drop-down menu.
xenn [34]

Answer:

Siftable are small independent computer that are capable of BLANK (graphics audio video)

4 0
3 years ago
Class members are accessed via the ____(1)_____ operator in conjunction with the name of an object of the class, or via the ___(
Alborosie

Answer:

1.ClassName and . operator

2. ClassName and [] operator

Explanation:

There are two ways to get the members of a class first one is by using dot(.) operator.

Example : with assumption that person is a class object and age is the member in it we can use it as:

person.age

Second way is to use [] operator with member as a string in it which is used by the compiler as key to get its value.

Example : person["age"]

5 0
4 years ago
12. Because Java byte code is the same on all computers, compiled Java programs a. are nonexistent b. must be re-compiled for ea
GenaCL600 [577]

Answer:

C) Highly portable

Explanation:

This means they can run on any computer or platform that supports Java without the need for recompillation.

This idea is popularly called WORA that is Write Once Run Anywhere.

Software Applications written in Java are compiled to bytcode (.class) which are intended to run on the Java Virtual Machine (JVM) irrespective of the architecture of the computer or device.

5 0
3 years ago
What are the functions of an input device​
marshall27 [118]

Answer:

To feed the computer with data/instructions

6 0
3 years ago
Read 2 more answers
Name three situations when a copy constructor executes.
Vesna [10]

Answer:

1. When an object of the class is passed (to a function) by value as an argument.

2.  When an object is constructed based on another object of the same class.

3. When compiler generates a temporary object.

Explanation:

7 0
3 years ago
Other questions:
  • You are installing an updated driver for a hardware device on your system. A dialog box displays indicating that Microsoft has d
    15·1 answer
  • The __________ clash of clans and candy crush saga are video games that exploit the real world–digital world convergence by buil
    10·1 answer
  • The weakest hydrogen line stars are classified as:
    10·2 answers
  • To adjust the height of cells, position the pointer over one of the dividing lines between cells. When the pointer changes to th
    5·1 answer
  • A hotel salesperson enters sales in a text file. Each line contains the following, separated by semicolons: The name of the clie
    8·1 answer
  • How can you know if the information is based on scientifically collected data and if it's corroborated by other sources? Follow
    7·2 answers
  • Anybody know this question???
    6·1 answer
  • What type of Microsoft Server serves as an email server?
    7·2 answers
  • If a folder exists on an NTFS partition, which permission is needed by a user who needs to set security permissions on the folde
    11·1 answer
  • What should you consider when using a wireless keyboard with your home computer
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!