Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Differentiate between Protection and Security
Operating system contains a collection of objects, hardware or software. Every object has a unique name and can be accessed via a well-defined set of operations. Protection problem - make sure that each object is accessed correctly and just only by those processes that are permitted to do so.
Security must refer external environment of the system, and protect it from:
a) Unauthorized access.
b) Malicious modification or destruction
c) Accidental introduction of inconsistency.
It is very easy to protect against accidental as compared to the malicious misuse.
The meaning of Protection of user files is that file owner or creator should be capable to control:
What can be done and by whom. Several categories of access to files are:
a) Read
b) Write
c) Execute
d) Append
e)Delete
f) List
What is IPC? What are the various schemes available? The term IPC (Inter-Process Communication) explains various ways by which different process running on some operating syste
Distinguish between ROM, PROM, EPROM, EEPROM. Ans: ROM: It also called Read Only Memory is a Permanent Memory. The data is permanently stored and cannot be changed in Perm
Eliminating data hazards: Forwarding NOTE: In the following instance, computed values are in bold, whereas Register numbers are not. Forwarding involves adding output
What is meant by scan code? When a key is pressed on the keyboard, the keyboard controller places a code take to the key pressed into a part of the memory known as the keyboar
a. Activity diagram: Activity diagram is used for functional modelling. Captures the process flow. b. Sequence diagram : Sequence diagram is used for dynamic modeling.
Q. Explain about Quarter Inch Cartridge Tapes? Quarter Inch Cartridge Tapes (QIC Standard): These tape cartridges record information sequentially in a track with one head. Wh
Illustrate the term Extranet? Extranet: Extranet is Extension of an Intranet that makes thelatter accessible to outside companies or individuals with or without an intran
Sixth Generation (1990 - ) This generation begun with many gains in parallel computing, both in hardware area and in improved understanding of how to build up algori
Q. How can this arithmetic processor be associated to the CPU? Two mechanisms are used for connecting arithmetic processor to CPU. If an arithmetic processor is treated a
Set up a standard population model structure. The population will begin with 24 people. We do not have actual data to support a birth rate, but we could calculate a reasona
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd