Explain how a fence register is used for relocation of a user’s program.

What will be an ideal response?


The address in the fence register is the starting address of the user space. Thus, the user program can be written relative to address 0. Adding the fence register’s contents will properly relocate the user’s address references.

Computer Science & Information Technology

You might also like to view...

Clicking this icon in the Design tab of the Ribbon will reveal the field details on the PivotTable:

A) Remove Field. B) Show Details. C) Field List. D) Drop Zones.

Computer Science & Information Technology

You have just installed two new Linux servers to handle a new application. You want to integrate user authentication between Linux and your existing Windows Server 2012 R2 domain controllers. What can you do?

A. Create a forest trust B. Create a transitive trust C. Create a realm trust D. Create an external trust

Computer Science & Information Technology

What does

A. less than B. greater than C. less than or equal to D. greater than or equal to

Computer Science & Information Technology

Describe the discretionary access control (DAC) model.

What will be an ideal response?

Computer Science & Information Technology