Match each item with a statement below.

A. A technique used by hypervisors to cause a guest VM to release infrequently used memory pages.
B. A networking mode that allows traffic from a virtual machine to pass through unchanged to the physical network as though it were directly attached.
C. A virtual disk file that allocates space on the hosting hardware only as it is required to satisfy the needs of the guest VM.
D. Used to create additional logical cores that can be used by the hypervisor to improve the performance of virtual machines.
E. A piece of software that enables the sharing of hardware resources between the hosting operating system and virtual environments.
F. A method of separately storing any changes to a parent VM made by a specific user such that it does not affect the parent VM.
G. A standard created by industry wide vendors in various areas of virtualization for the purpose of copying or moving virtual machines between different platforms.
H. An accumulation of specialized and departmental servers that increases costs of computer hardware and maintenance, as well as power consumption.
I. A personal computer that runs its own operating system and applications.
J. A software package that includes a virtual machine containing a preinstalled and configured application that's ready to use.


A. ballooning
B. bridged mode
C. dynamic virtual disk
D. hyperthreading
E. hypervisor
F. linked clones
G. Open Virtualization Format
H. server sprawl
I. thick client
J. virtual appliance

Computer Science & Information Technology

You might also like to view...

In the Group, Sort, and Total pane, when asking for "with A on top" results in a(n) ________ sort

Fill in the blank(s) with correct word

Computer Science & Information Technology

Formally, the process of designing an application is referred to as ____ modeling.

A. class B. system C. object D. program

Computer Science & Information Technology

A ____ is a marker placed in a program that pauses program execution when it is reached.

A. marker B. pointer C. link D. breakpoint

Computer Science & Information Technology

What lessons did Intel’s MMX and AMD’s 3DNow! extensions teach us about ISAs?

What will be an ideal response?

Computer Science & Information Technology