Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Differentiate between Protection and Security
Operating system contains a collection of objects, hardware or software. Every object has a unique name and can be accessed via a well-defined set of operations. Protection problem - make sure that each object is accessed correctly and just only by those processes that are permitted to do so.
Security must refer external environment of the system, and protect it from:
a) Unauthorized access.
b) Malicious modification or destruction
c) Accidental introduction of inconsistency.
It is very easy to protect against accidental as compared to the malicious misuse.
The meaning of Protection of user files is that file owner or creator should be capable to control:
What can be done and by whom. Several categories of access to files are:
a) Read
b) Write
c) Execute
d) Append
e)Delete
f) List
What is cache memory? It is a small, fast memory that is inserted among large, slower main memory and the processor. It decreases the memory access time
Advantages of EDI 1. EDI replaces paper transactions with electronic transactions therefore it saves times and speeds up transactions. 2. It gives a legal record of busine
how to breadboARD THE 4 BIT COMPARATOR
What is an unsigned integer constant? An integer constant is the number in the range of - 32768 to + 32767; because an integer constant always gets two bytes in memory and in t
Q. Describe target processor arrangements? Having seen how to describe one or more target processor arrangements we need to initiate mechanisms for distributing data arrays ove
Make a page translation table the meets the requirements of the virtual memory system given below. Suppose page (and frame) sizes of 20 with pages 0 by 3 in logical memory and fra
Procedure The only difference between e-commerce and conventional commerce is that goods in e-commerce are purchased over the internet using a credit card. Also buying and sel
Q. Explain about Semiconductor Memories? Originally IC technology was used for constructing processor however soon it was realized that same technology can be used for construc
what is ment by avl tree n insertion n deletion ,2-3 tress insertion n deletion
Q. Displays a format of floating-point number? A floating binary number +1010.001 in a 16-bit register is able to be represented in normalised form (presuming 6 bits for expone
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +91-977-207-8620
Phone: +91-977-207-8620
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd