wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Virtual Machine

profile
Hir Sanghani
Jul 11, 2023
0 Likes
0 Discussions
24 Reads

Hir Sanghani - 53003220023

Assignment 2

VIRTUAL MACHINE

A Virtual Machine (VM) is a compute resource that uses software instead of a physical computer to run programs and deploy apps. One or more virtual “guest” machines run on a physical “host” machine.  Each virtual machine runs its own operating system and functions separately from the other VMs, even when they are all running on the same host. This means that, for example, a virtual MacOS virtual machine can run on a physical PC.   

Virtual machines (VMs) allow a business to run an operating system that behaves like a completely separate computer in an app window on a desktop. VMs may be deployed to accommodate different levels of processing power needs, to run software that requires a different operating system, or to test applications in a safe, sandboxed environment.

Virtual machines have historically been used for server virtualization which enables IT teams to consolidate their computing resources and improve efficiency. Additionally, virtual machines can perform specific tasks considered too risky to carry out in a host environment, such as accessing virus-infected data or testing operating systems. Since the virtual machine is separated from the rest of the system, the software inside the virtual machine cannot tamper with the host computer.  

The virtual machine runs as a process in an application window, similar to any other application, on the operating system of the physical machine. Key files that make up a virtual machine include a log file, NVRAM setting file, virtual disk file and configuration file. 

Users can choose from two different types of virtual machines—process VMs and system VMs:  

A process virtual machine allows a single process to run as an application on a host machine, providing a platform-independent programming environment by masking the information of the underlying hardware or operating system. An example of a process VM is the Java Virtual Machine, which enables any operating system to run Java applications as if they were native to that system.   

A system virtual machine is fully virtualized to substitute for a physical machine. A system platform supports the sharing of a host computer’s physical resources between multiple virtual machines, each running its own copy of the operating system. This virtualization process relies on a hypervisor, which can run on bare hardware, such as VMware ESXI, or on top of an operating system. 


Comments ()


Sign in

Read Next

OPERATING SYSTEM OBJECTIVES AND FAULT TOLERENCE.

Blog banner

Uniprocessor Scheduling

Blog banner

Buffers in Operating Systems

Blog banner

How I use google in my daily life

Blog banner

A-B-C of Networking: Part-3 (Topology [Bus & Star])

Blog banner

APACHE KAFKA

Blog banner

Importance of Morning Routines for Students During the Festive Season

Blog banner

Why Should You Schedule Tweets on Twitter?

Blog banner

MySQL

Blog banner

IT RISK

Blog banner

Dangers of Using Public WiFis

Blog banner

World’s rarest passport owned by 500 people.

Blog banner

MODERN OPERATING SYSTEM

Blog banner

Explain website hacking issues

Blog banner

Real-Time Operating Systems (RTOS) Deep Explanation

Blog banner

PERSONAL STORIES

Blog banner

About myself

Blog banner

Hey Aryan here

Blog banner

security controls

Blog banner

Deadlock and Starvation

Blog banner

Emailing the merger document

Blog banner

What is Virtual Memory

Blog banner

Virtual Machine

Blog banner

PODIO

Blog banner

GIS

Blog banner

Be you

Blog banner

Why is it hard to design an Operating Systems ?

Blog banner

TRAIN TRAVELING

Blog banner

A Short History of GIS

Blog banner

Direct Memory Access

Blog banner

CYBERBULLYING: Negative comments!

Blog banner

Virtual Memory

Blog banner

OS DESIGN CONSIDERATIONS FOR MULTIPROCESSOR

Blog banner

Lifestyle of a photographer

Blog banner

The khan mehtab transforming the modular switches company

Blog banner

Direct Memory Access

Blog banner

What is Spyware? and examples of them.

Blog banner

Article on Zoho Corporation

Blog banner

OLA

Blog banner

Importance of self defence for girls

Blog banner

Number Guessing game --lisp

Blog banner

Caching windows

Blog banner