Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Differentiate between Protection and Security
Operating system contains a collection of objects, hardware or software. Every object has a unique name and can be accessed via a well-defined set of operations. Protection problem - make sure that each object is accessed correctly and just only by those processes that are permitted to do so.
Security must refer external environment of the system, and protect it from:
a) Unauthorized access.
b) Malicious modification or destruction
c) Accidental introduction of inconsistency.
It is very easy to protect against accidental as compared to the malicious misuse.
The meaning of Protection of user files is that file owner or creator should be capable to control:
What can be done and by whom. Several categories of access to files are:
a) Read
b) Write
c) Execute
d) Append
e)Delete
f) List
Does it makes sense for two domain servers to contain exactly the same set of names? Why or why not? Yes. This is very advantageous for 2-domain servers having same set of name
Syntax and Semanticsx and Semantics for First-order logic - artificial intelligence: Propositional logic is limited in its expressiveness: it may just represent true and false
Why Gateways are used during mail transfer? Email using SMTP effort best while both the sender and the receiver are on the internet and can hold TCP connections in between send
Differentiate between EPROM and EEPROM. EPROM: The meaning of this term is Erasable PROM. This can be reprogrammed through first erasing the existing program. EPROM uses N-MO
Q. Determine the use of LOOP instruction? Program: This program prints the alphabets (A-Z) ; Register used: AX, CX, DX CODE SEGMENT ASSUME: CS: CODE. MAINP:
Explain the differences between Internal and external fragmentation. Internal and external fragmentation (1) While memory allocated to a process is a little larger than th
The EFI community has formed an open source shell environment. Rather than booting directly into a full OS, on some executions, the user can boot to the EFI shell. The shell is an
Explain about the Flash memories These are re-writable non-volatile memories evolved from EEPROM; they are generally connected to the USB port on the computer enabling a user t
Q. Basic Tradeoff of concerns for instruction set design? Basic Tradeoff: Smaller instruction (less space) vs. desire for more powerful instruction repertoire. Generally p
What is normal form? A normal form is a guideline for relational database tables that enhances data consistency. As tables satisfy higher levels of normal forms, they are less
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd