Preview

Faith Integration

Satisfactory Essays
Open Document
Open Document
613 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Faith Integration
Homework I
1.6 How does the distinction between kernel mode and user mode function as a rudimentary form of protection (security) system?
It seems that any certain instruction(s) can be executed, only when the CPU is in kernel mode. At the same instance, the hardware devices could only be accessed, only when the program is executing in the kernel mode. There is a propensity that control over when interrupts could be enabled or disabled is also possible only when the CPU is in kernel mode. Therefore, the Computer Processing Unit (CPU) has very limited capability when executing in user mode. This in turn will enforce protection of critical resources.
1.8 Describe a mechanism for enforcing memory protection in order to prevent a program form modifying the memory associated with other programs?
The processor could keep track of what locations are associated with each process and limit access to locations that are outside of a program's extent. By using base and limits registers and by performing a check for every memory access, information regarding the extent of a program's memory could be maintained
1.9 What are the tradeoffs inherent in hand-held computer?
1. There will be limitation of size in memory; usually in megabytes as compared to gigabytes in computer systems. 2. The speed of the processor would be very much limited, due to lesser power ability. In fact, this suggests that the Operating System has to be designed for low power consumption. 3. Assuredly lack of physical space limits the input/output capability; input method are small screen based keyboard or hand-writing recognition while small display screen for output.
1.22 Describe the differences between symmetric and asymmetric multitude processing? Asymmetric multiprocessing - In asymmetric multiprocessing (ASMP), the operating system would typically sets aside at least one or several processors for its exclusive use, remainder of the processors would run user applications. As a result, the

You May Also Find These Documents Helpful

  • Good Essays

    Some OS routines directly support application programs as they run and thus must be resident. Other transient routines are stored on disk and read into memory only when needed. Fixed-length partitions can also be used to allocate the set amount of memory that a particular program needs to run. Under dynamic memory management, the transient area is treated as a pool of unstructured free space. When the system decides to load a particular program, a region of memory just sufficient to hold the program is allocated from the pool. Using segmentation, programs are divided into independently addressed segments and stored in noncontiguous memory. Paging breaks a program into fixed-length pages.…

    • 7085 Words
    • 29 Pages
    Good Essays
  • Satisfactory Essays

    SD1230 Lab 1

    • 239 Words
    • 2 Pages

    1. Why is virtual memory addresses used for applications? – So it can have its own address space on the memory.…

    • 239 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    When processes running in Kernel mode encounter a problem and Windows must stop the system.…

    • 850 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 3 Os

    • 1341 Words
    • 6 Pages

    +• Scheduling: Any processor may perform scheduling, which complicates the task of enforcing a scheduling policy and assuring that corruption of the scheduler data structures is avoided. If kernel-level multithreading is used, then the opportunity exists to schedule multiple threads from the same process simultaneously on multiple processors.…

    • 1341 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Unit 1&2 Discussion

    • 379 Words
    • 2 Pages

    Access control is typically achieved by reserving a collection of bits within the general “Flag Register” to indicate the current “access control level”. Certain instructions are restricted so that they are only legal if the “access control level” is at least some minimum value; otherwise the instruction generates an “illegal operation” interrupt.…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Using Global Variables

    • 252 Words
    • 2 Pages

    It makes a program hard to understand since it can be modified and have to be aware of all other parts of the program that access it…

    • 252 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Computer Memory Hacking

    • 820 Words
    • 2 Pages

    unauthorized access to the RAM (random access memory) of a computer system. There a couple…

    • 820 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Integration of Faith

    • 340 Words
    • 2 Pages

    Joseph, Master Project Manager: A view of Biblical History as it applies to Project Management.…

    • 340 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    IT 600 Module One Lecture

    • 1256 Words
    • 5 Pages

    that every process gets the memory it needs, and that no application can access memory in…

    • 1256 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Faith Integration

    • 952 Words
    • 4 Pages

    A main reason for the existence of the Christian college or university is to provide an educational environment that includes both academic subject matter and Christian knowledge. At Azusa Pacific University, the school emphasizes their motto “God First” in and out of the classroom. According to APU’s Mission Statement, APU is a “Christian community of disciples and scholars who seek to advance the work of God in the world through academic excellence in liberal arts and professional programs of higher education that encourage students to develop a Christian perspective of truth and life."…

    • 952 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Hardening servers, desktops, laptops and mobile devices through their configuration by turning off unused services. Constraining remote access and other convenience features; setting administrator and user identities; defining execution policy for required applications.…

    • 746 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Data Types

    • 951 Words
    • 4 Pages

    Two things generally a ect the advance of computer architectures: a better understanding of program execution, and new or better implementation technologies. It is therefore very important to understand the dynamics of program execution when considering the design of future-generation architectures. To date, most processors have either executed instructions sequentially, or have overlapped the execution of a few instructions from a sequential instruction stream (via pipelining). For such processors, the relevant…

    • 951 Words
    • 4 Pages
    Powerful Essays
  • Best Essays

    Operating System security

    • 3500 Words
    • 14 Pages

    Operating System Security Abstract Information systems are now becoming the social infrastructure so it is necessary to improve the security level because of privacy and data theft. One of the important issues which have to concern in the security of cyberspace is the security of operating system. This paper helps us to know about the security of most commercial Operating system like UNIX and Microsoft windows which are widely using in whole world.…

    • 3500 Words
    • 14 Pages
    Best Essays
  • Better Essays

    Risc Sisc

    • 1304 Words
    • 6 Pages

    microprocessor architecture that utilizes a small, highlyoptimized set of instructions, rather than a more specialized…

    • 1304 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Operating System

    • 638 Words
    • 3 Pages

    A multiprocessing operating system allows a program to run on more than one central processing unit (CPU) at a time. This can come in very handy in some work…

    • 638 Words
    • 3 Pages
    Satisfactory Essays