Note :- Don't Copy Answers Blindly.
NPTEL Edge Computing Week 2 Assignment Solution
Which of the following best explains why sensitive instructions executing in user mode break full virtualization in early ISAs?
- A) They reduce CPU scheduling efficiency
- B) They bypass hypervisor resource accounting
- C) They modify privileged processor state without trapping
- D) They consume excessive memory
Which virtualization characteristic enables live migration of VMs across data centers?
- A) Managed execution
- B) Aggregation
- C) Isolation
- D) Emulation
In hardware-assisted virtualization, the additional privilege level (Ring -1) is primarily used to:
- A) Execute guest applications
- B) Handle system calls directly
- C) Run the hypervisor securely
- D) Replace binary translation
Para-virtualization differs from full virtualization mainly because:
- A) It provides stronger isolation
- B) It does not use a hypervisor
- C) Guest OS must be modified
- D) It requires hardware VT extensions
Which security ring typically hosts user applications in x86 architecture?
- A) Ring 0
- B) Ring 1
- C) Ring 2
- D) Ring 3
Which hypervisor type runs directly on hardware and replaces the host OS?
- A) Hosted hypervisor
- B) Type-2 hypervisor
- C) Type-1 hypervisor
- D) Container runtime
Which statement about OS-level virtualization is TRUE?
- A) Each instance runs its own kernel
- B) No hypervisor is required
- C) It emulates hardware instructions
- D) It requires VT-x support
Which virtualization level enables write-once-run-anywhere portability?
- A) Hardware-level
- B) OS-level
- C) Programming language-level
- D) Application-level
An application compiled for a different CPU architecture must run on a host system without recompilation. Which technique is required?
- A) Emulation
- B) OS-level virtualization
- C) Full virtualization
- D) Containerization
Why are containers considered more lightweight than VMs?
- A) They do not require storage
- B) They share the host OS kernel
- C) They eliminate process isolation
- D) They disable system calls

Post a Comment