Relationship among the capabilities of domain level j and i, Operating System

Q. In a ring-protection system the level 0 has the greatest access to objects and level n (greater than zero) has fewer access rights. The access rights of a program at a particular level in the ring structure are considered as a set of capabilities. What is the relationship among the capabilities of a domain at level j and a domain at level i to an object (for j > i)?

Answer: Dj is a subset of Di .

Posted Date: 7/29/2013 2:23:30 AM | Location : United States







Related Discussions:- Relationship among the capabilities of domain level j and i, Assignment Help, Ask Question on Relationship among the capabilities of domain level j and i, Get Answer, Expert's Help, Relationship among the capabilities of domain level j and i Discussions

Write discussion on Relationship among the capabilities of domain level j and i
Your posts are moderated
Related Questions
Invalid page fault :If a page fault happens for a reference to an address that's not part of the virtual address space, so that there could not be a page in memory corresponding

Fault tolerance : Machine failures, Communication faults, storage device crashes, and decays of storage media must be tolerated by the system to some extent. A fault tolerant sy

What is the main advantage of the layered approach to system design? As in all cases of modular design, designing an operating system in a modular way has several benefits. Th

Q. Explain some of the ways an application can use memory via the Win32 API. Answer: (1) Virtual memory offers several functions that allow an application to reserve and rele

Regard as a computer system that runs 5000 jobs per month with no deadlock-prevention or deadlock-avoidance scheme. Deadlocks take place about twice per month and the operator must

The primary financial objective of corporation is usually taken to be the maximization of shareholder wealth. Discuss:- i. Ways in which the shareholder of a company can encour

A practical task specified in the Study Guide, Computer architecture, was to record your computer's specifications. Submit the data you recorded, which will contain the following d

Q. Show that a few schedules are possible under the two-phase locking protocol however not possible under the timestamp protocol and vice versa. Answer: A schedule that is auth

What is single and multithreading and thread pool?

Write a short note about the different STATES of a process. As a process implement it changes state. The state of a process is described in part by the current activity of that