Kernel mode and user mode function, Operating System

Q. How does the distinction among kernel mode and user mode function as a rudimentary form of protection (security) system?

Answer: The distinction among kernel mode and user mode provides a rudimentary form of protection in the following manner. Certain instructions could be executed merely when the CPU is in kernel mode. Likewise hardware devices could be accessed only when the program is executing in kernel mode. Control over when disrupt could be enabled or disabled is also possible only when the CPU is in kernel mode. Therefore the CPU has very limited capability when executing in user mode thereby enforcing protection of critical resources.

Posted Date: 7/27/2013 2:06:18 AM | Location : United States







Related Discussions:- Kernel mode and user mode function, Assignment Help, Ask Question on Kernel mode and user mode function, Get Answer, Expert's Help, Kernel mode and user mode function Discussions

Write discussion on Kernel mode and user mode function
Your posts are moderated
Related Questions
In which page replacement policy Balady’s anomaly occurs? FIFO (First in First Out)

Entry-sequenced file organization The records in an entry-sequenced file are store up in the order they are written into the file. New records are for all time appended to

How is process management done in multiprocessing systems ? There are two accost for the process management in multiprocessor systems. Master-slave configuration Sy


Acyclic Graph Directories In this kind of directory structure the shared directories or files can exist in the file system in two or more places at once. A tree structure excl


How can a user program disturb the normal operation of the system? a) Issuing illegal I/O operation. b) By accessing memory locations within the OS itself. c) Refusing to

Explain the Advantage of Assembly Language The advantages of assembly language program is: a)    Reduced errors  b)    Faster translation times  c)    Changes could be ma

protection in operating system

Explain Rehashing to Handle Collision Rehashing:  Re-hashing schemes make use of a second hashing operation while there is a collision. If there is an additional collision, we