Is computers protect the operating system, Operating System

Q. Some untimely computers protected the operating system by placing it in a memory partition that couldn't be modified by either the user job or the operating system itself. Explain two difficulties that you think could arise with such a scheme.

Answer: The data necessary by the operating system (access controls, passwords, accounting information, and so on) would have to be stored in or passed through unprotected memory and thus be accessible to unauthorized users.

Posted Date: 7/27/2013 2:09:53 AM | Location : United States







Related Discussions:- Is computers protect the operating system, Assignment Help, Ask Question on Is computers protect the operating system, Get Answer, Expert's Help, Is computers protect the operating system Discussions

Write discussion on Is computers protect the operating system
Your posts are moderated
Related Questions
Q. Polling for an I/O completion is able to waste a large number of CPU cycles if the processor iterates a busy-waiting loop several times before the I/O completes. However if the

Semispace works by maintaining two disjoint areas from which memory can be allocated. These areas are called the from-space and the to-space. At ?rst, the algorithm allocates memor

Define what an assembler is An assembler is machine dependant.

Explain the Types of System Calls The major types of system calls are like this: a. Process Control: These types of system calls are employed to control the processes.

Advantages and disadvantages of time-sharing operating system

Consider a demand-paging system with the following time-measured utilizations: CPU utilization: 10%, Paging disk: 98%, Other I/O devices: 5%. What does this imply? How to improv

What are two differences among user-level threads and kernel-level threads? Under what circumstances is one type better than the other? (1) User-level threads are unknown by th

Conservative GC can be used for languages such as C and C++, which were not explicitly designed for garbage collection. This is a non-copying technique. A conservative garbage coll

Briefly discuss on real-time scheduling? It is divided into two types.  Hard real-time systems are needed to complete a critical task within a guaranteed amount of time. T

Question: a) Each process is represented in the operating system by a process control block (PCB). The PCB contains many pieces of information associated with a specific proce