CPSC DevOps S24 Virtualization

1234567891011121314151617181920212223242526272829303132333435363738
Across
  1. 4. An _____ developer uses a simulator
  2. 5. A ____ ____ is capable of virtualizing all hardware resources, processors, memory, storage, and peripherals
  3. 8. Recursive virtualization is possible on a VMM without ______ dependencies
  4. 11. Reproduction of the function or action of a different computer, software system, etc., and replicates the original guest instruction set
  5. 12. A workaround for non-virtualizable machines where the guest o.s. is modified (e.g., IBM VM)
  6. 16. When we split what is running on one server into multiple servers, typically multiple VMs on a VMM
  7. 17. A statistically dominant fraction of machine instructions may be executed without VMM intervention
  8. 18. Move away from dealing directly with VMs into ________
  9. 19. Migration can be used for a _____
  10. 21. A ____ OS is what the VMM runs in
  11. 22. ______ instructions are those that trap in user mode, and only run in system mode
  12. 25. Virtualization is the _________ of system administration
  13. 27. In this job, often uses all three: Consolidation, Isolation, and Migration
  14. 28. A good example of a simulator is a ____ simulator
  15. 29. A Virtual Machine _______ provides virtual machine abstraction
  16. 30. VMWare ESX runs bare-metal and has its own _____
  17. 32. A workaround for non-virtualizable machines where critical instructions are removed and replaced with a trap to VMM
  18. 33. A VMM property where the VMM is in full control of virtualized resources is ____ ____
  19. 34. Another name for a VMM
  20. 36. Except for response time, the behavior of an emulator is ____
  21. 37. ____ virtualization is when a VMM can run on a copy of itself
  22. 38. Non-privileged instructions must be executed ______
Down
  1. 1. The speed of an emulator is ____
  2. 2. It is important to know what tools a virtualization platform provides for ______ VMs
  3. 3. Consolidation is often used for ______ software support
  4. 6. When a VM moves from one VMM to another
  5. 7. Isolation is often used for activity ______
  6. 9. All control-sensitive instructions always _____ and pass control to the VMM
  7. 10. Thereom states that we can construct a VMM if the set of ____-_____ instructions are a subset of the privileged instructions
  8. 13. When separate servers running on separate machines move to one VMM
  9. 14. Hiding the physical characteristics of computer resources from the applications is _____ _____
  10. 15. Virtualization is not a ___ idea
  11. 20. A ____ OS is what the VMM supports
  12. 23. The speed of a simulator is ____
  13. 24. Models the original guest instruction set, a realistic imitation
  14. 26. An _____ developer uses an emulator
  15. 28. Simulate enough hardware so that an unmodified guest operating system can run is ___ virtualization
  16. 31. Isolation is a common for ______ Partitioning
  17. 32. One of the authors of the paper Formal Requirements for Virtualizable Third Generation Architectures
  18. 35. A VMM property where the program running under a VMM should exhibit a behavior identical to that of running on the equivalent machine