Describe an example in which absolute denial of service to a user (that is, the user gets no response from the computer) is a serious problem to that user. Describe another example where 10 percent denial of service to a user (that is, the user’s computation progresses but at a rate 10 percent slower than normal) is a serious problem to that user. Could access by unauthorized people to a computing system result in a 10 percent denial of service to the legitimate users? How?
What will be an ideal response?
Absolute: Almost any required computing. Ten percent degradation: A real-?time application that requires almost all available computing power to respond within the required time.
You might also like to view...
___________ conversion is when an object is cast into another type.
a) unboxing b) converting c) wrapping d) boxing
Physical security includes not only securing the machines but also controlling access to buildings and responding to fires
Indicate whether the statement is true or false.
The purpose of a(n) ____ is to accept data as input and transform the data in some manner to produce a specific result as an output.
A. opcode B. procedure C. algorithm D. program
A disadvantage of distributed data processing is
A. the increased time between job request and job completion. B. the potential for hardware and software incompatibility among users. C. the disruption caused when the mainframe goes down. D. that users are not likely to be involved.