Sharing and protection are conflicting goals.Give three significant examples of sharing supported by operating systems. For each, explain what protection mechanisms are necessary to control the sharing.
What will be an ideal response?
Examples of sharing supported by operating systems are sharing virtual memory
regions, sharing processor time between processes and sharing files between users. Virtual
memory regions can be shared by multiple processes; operating systems provide protection
via page and segment table entries, and processors enforce memory protection by checking
these entries against memory references.A system’s processor is multiplexed among the system’s
processes; to prevent a process from monopolizing a processor, operating systems set
timer interrupts. File systems enable multiple users to share data stored in files; operating systems
provide access control lists (or similar access control mechanisms) and encryption to
prevent unauthorized users from accessing file data.
You might also like to view...
When calling a method and passing an array variable as an argument, the variable contains a ____________ to the array.
a. variable b. value c. reference d. parameter
The ability to send and receive transmissions at the same time on an Ethernet cable is referred to by what term?
A. simplex mode B. half duplex C. auto transmit D. full duplex
Filling formats across ________ should be used when the user does not want to overwrite content on the target worksheet
Fill in the blank(s) with correct word
You can use the ____ command to delete an entire table and its data.
A. ROLLBACK B. DELETE TABLE C. DROP TABLE D. DELETE