Describe an example in which absolute denial of service to a user (that is, the user gets no response from the computer) is a serious problem to that user. Describe another example where 10 percent denial of service to a user (that is, the user’s computation progresses but at a rate 10 percent slower than normal) is a serious problem to that user. Could access by unauthorized people to a computing system result in a 10 percent denial of service to the legitimate users? How?

What will be an ideal response?


Absolute: Almost any required computing. Ten percent degradation: A real-­?time application that requires almost all available computing power to respond within the required time.

Computer Science & Information Technology

You might also like to view...

___________ conversion is when an object is cast into another type.

a) unboxing b) converting c) wrapping d) boxing

Computer Science & Information Technology

Physical security includes not only securing the machines but also controlling access to buildings and responding to fires

Indicate whether the statement is true or false.

Computer Science & Information Technology

The purpose of a(n) ____ is to accept data as input and transform the data in some manner to produce a specific result as an output.

A. opcode B. procedure C. algorithm D. program

Computer Science & Information Technology

A disadvantage of distributed data processing is

A. the increased time between job request and job completion. B. the potential for hardware and software incompatibility among users. C. the disruption caused when the mainframe goes down. D. that users are not likely to be involved.

Computer Science & Information Technology