Describe several techniques for implementing memory protection.

What will be an ideal response?


Bounds registers may be used to specify a continuous range of addresses a program may access. Out-of-bounds references are not allowed. Virtual memory provides memory protection as well, because processes are unaware of the physical addresses to which the virtual addresses correspond. Therefore, a process may not access a physical address without the permission of the operating system.

Computer Science & Information Technology

You might also like to view...

Establishing and maintaining good ____________________ alignment represents good competitive advantage.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

To format the report title, begin the report title at about ____________________" and apply the ____________________ style.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

____________________ is the de facto standard for e-mail transmission.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following is a set of APIs for incorporating Google functionality into your apps?

a. Google Android Services b. Google App Services c. Google Play Services. d. None of the above.

Computer Science & Information Technology