Explain time-sharing environment, Operating System

In a multiprogramming and time-sharing environment, several users share the system simultaneously.

This situation can result in various security problems.

a. What are two such problems?

b. Can we ensure the same degree of security in a time-shared machine as we have in a dedicated machine? Explain your answer.

 

a. Stealing or copying one's programs or data; using system resources (CPU, memory, disk space, peripherals) without proper accounting.

b. Probably not, since any protection scheme devised by humans can inevitably be broken by a human and the more difficult the scheme, the more difficult it is to feel confident of its correct execution.  

 

Posted Date: 6/6/2013 1:55:43 AM | Location : United States







Related Discussions:- Explain time-sharing environment, Assignment Help, Ask Question on Explain time-sharing environment, Get Answer, Expert's Help, Explain time-sharing environment Discussions

Write discussion on Explain time-sharing environment
Your posts are moderated
Related Questions
What is a general graph? A tree structure where links can go from one branch to a node earlier in the similar branch or other branch, allowing cycles.

what common event leads to the creation of a process?

Difference between cache and associate memory

Prepare Gantt Charts and Determine the Average Waiting Time 1. Classify the interaction among the processes on the basis if degree to which they are aware of each  other's exi

Question 1 Describe about the shells of Linux operating system Question 2 Describe briefly about GNOME desktop Question 3 Write note on the following- Encryp

What is the benefits OS co-operating process? Information sharing. Computation speeds up. Modularity. Convenience.

Q. What resources are utilized when a thread is created? How do they vary from those used when a process is created? Answer: For the reason that a thread is smaller than a pr

What is an effector process? The effector process is a method that verifies itself.The effector process exists in particular criteria.

UNIX Shell and History feature. 1.Creating a child process. 2.Creating a history feature. With the notes under code. Its exactly "programming project 1 - Unix Shell and History Fea

Define Overflow Chaining Another method will divide the pre-allocated table into two sections: the primary area to determine which keys are mapped and an area for collisions, g