Some CPUs provide multiple modes of operation, how it is ben, Basic Computer Science

even though most systems only distinguish among user and kernel modes, some CPUs provide multiple modes. Multiple modes could be used to provide a finer-grained security strategy. For instance, rather than distinguishing between just client and kernel mode, you could make a distinction between different types of user mode. Possibly users belonging to the equal group could execute each other’s code. The machine would go into a specific mode when one of these users was running code. When the machine was in this mode, a member of the group could run code belonging to someone else in the group. Another option would be to provide different distinctions within kernel code. For instance, a specific mode could allow USB device drivers to run. This would mean that USB devices could be serviced without having to change to kernel mode, thereby basically allowing USB device drivers to run in a quasi-user/kernel mode.
Posted Date: 5/2/2012 3:14:43 AM | Location : United States







Related Discussions:- Some CPUs provide multiple modes of operation, how it is ben, Assignment Help, Ask Question on Some CPUs provide multiple modes of operation, how it is ben, Get Answer, Expert's Help, Some CPUs provide multiple modes of operation, how it is ben Discussions

Write discussion on Some CPUs provide multiple modes of operation, how it is ben
Your posts are moderated
Related Questions
what are slides how do you put slides on powerpoint

#questionConsider the one-time pad encryption scheme to encrypt a 1-bit message m, and assume m is chosen with uniform distribution from message space M={0,1}. Let E1 be the event

A Doctor Module Doctor has a list of the patients waiting for consultation. The doctor's module should include all the following details: Fields for common complaint

Sets of individual statements making up a single code block are known as suites in Python. Composite or complex statements for example if, def while and class are those which neces

what is the goals of enterprise collaboration system?

The architecture of the x86 processors forces with the use of memory segments to direct the information, the size of these segments is of 64kb. The cause of being of these segments

Microcontroller: A highly integrated microprocessor designed specifically for use in embedded systems. Microcontrollers typically includes an integrated CPU, memory (a small amount

The Widening Web The idea, the whole world is agog now had accidental origins. Here is how it all began. In early 1969, the U.S. Defence department financed a network fo

UNIX Shell and History feature. 1.Creating a child process. 2.Creating a history feature. Its exactly "programming project 1 - Unix Shell and History Feature (p.157-159)" in the Si

Perverse software: Perverse software is a program which causes hindrances in other programs execution in such a way resulting in modification or complete destruction of data w