1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kirza4 [7]
3 years ago
15

In a ring-based system, procedure p is executing and needs to invoke procedure q. Procedure q's access bracket is (5,6,9). In wh

ich ring(s) must p execute for the following to happen?
Computers and Technology
2 answers:
Marat540 [252]3 years ago
6 0

Complete Question:

Consider Multics procedures p and q. Procedure p is executing and needs to invoke procedure q. Procedure q's access bracket is (5, 6) and its call bracket is (6, 9). Assume that q's access control list gives p full (read, write, append, and execute) rights to q. In which ring(s) must p execute for the following to happen?

A) p can invoke q, but a ring-crossing fault occurs.

B) p can invoke q provided that a valid gate is used as an entry point.

C) p cannot invoke q.

D) p can invoke q without any ring-crossing fault occurring, but not necessarily through a valid gate

Answer:

If we suppose the access bracket as (a, b) and call bracket as (b, c), for q we have (a, b) = (5, 6) and (b, c) = (6, 9). Let the ring be denoted by r.

A) p can invoke q, but a ring-crossing fault occurs.

p must execute in rings where r < a., in r < 5, p must execute.

B) p can invoke q provided that a valid gate is used as an entry point.

p must execute in the rings between 6 and 9. r must be between a and b.

C) p cannot invoke q.

When r > c, then p cannot invoke q. That means, for this condition to happen p must execute in rings > 9

D) p can invoke q without any ring-crossing fault occurring, but not necessarily through a valid gate

When r is between a and b then the condition can be satisfied. That means p must execute in rings between 5 and 6.

Explanation:

Crank3 years ago
4 0

Answer:

A.Rings 0 through 4

B. Rings 7 through 9

C.Ring number greater than 9

D.Riing 5 or 6

Explanation

(a)p can invoke q, but a ring-crossing fault occurs. R< a1 for access permitted but ring crossing fault occurs. Therefore, go through - rings 0 through 4.

(b)p can invoke q provided a valid gate is used as an entry point.

A2 < r <= a3 for access allowed if make through a valid gate. Therefore, go through - rings 7 through 9.

(c)p cannot invoke q.

a3 < r for all access denied. Hence, proceed through - ring with number greater than 9.

(d)p can invoke q without any ring-crossing fault occurring, but not through a valid gate.proceed through – ring 5 or 6.

You might be interested in
What is one potential problem with the following loop? System.out.print("Enter integers. Enter -1 to exit."); System.out.println
iris [78.8K]

Answer:

The answer to this question can be given as  

The potential problem with the loop is it's counts when the user enters -1 from the keyboard, so the count will too many.

Explanation:

In the program there some line is missing. So the right program of the  question can be given as:  

import java.util.*;     //import package for take input from user.

public class Main     //define main class.

{

public static void main(String[] args)//define main function

{

Scanner scan=new Scanner(System.in);          //creating object.

//print values.

System.out.print("Enter integers. Enter -1 to exit.");

System.out.println(" Count of integers entered will be returned.");  

 int n=0,c=0;           //declaring integer variable.

  while (n != -1)             //loop

   {

       n = scan.nextInt();               //take input by user and hold on variable n.  

       c++;

   }

 System.out.println(c);               //print value.

}

}

output:

Enter integers. Enter -1 to exit. Count of integers entered will be returned.

-1

1  

7 0
4 years ago
De que material esta hecho la pantalla de la computadora​
monitta
Específicamente, una pantalla LCD está hecha de dos piezas de vidrio polarizado (también llamado sustrato) que contienen un material de cristal líquido entre ellas.
La tecnología de pantalla de cristal líquido funciona bloqueando la luz.
6 0
3 years ago
An email message containing a warning related to a non-existent computer security threat, asking a user to delete system files f
LenKa [72]

Answer: Virus Hoax

Explanation:

A computer virus hoax is a message that warns someone of a false virus threat. It is a a chain email that encourages who ever has received the message to pass it to other people as a form of warning.

5 0
3 years ago
Nadeen runs a website on vegan lifestyle. She wants to spread the word and make more people visit her site to read her recipes a
pashok25 [27]

What Nadeen needs to do to get people to engage with her web site is to regularly post new content and regularly respond to user comments and questions (options A and C).

<h3>What should Nadeen do to increase visits to her website?</h3>

Currently, social networks and pages have become tools to share information and create a community of people around a topic.

From this trend, many people have developed their own web pages to share their knowledge and experience with other people so that knowledge becomes public and help those who do not have as much knowledge.

However, for a page to have high interactions and visits from the public, the owner of the page must ensure that they comply with some recommendations that will increase the traffic of their page, such as:

  • Post frequently: This is because people are constantly looking for information and like to be up to date with the latest.
  • Respond to user comments and questions: This creates a link between the page owner and their visitors that makes them feel comfortable with this page. This also helps the owner create a community where everyone participates by contributing knowledge.

Note: This question is incomplete because the options are missing. Here are the options:

A. She must post new content on her website regularly.

B. She must increase the number of pay-per-click advertisements on her website.

C. She must regularly respond to user comments and questions.

D. She must use a secure payment gateway.

Learn more about vegan in: brainly.com/question/8708517

3 0
2 years ago
clinical outcomes and survival differences between primary, secondary and concomitants carcinoma in situ of urinary bladder trea
8_murik_8 [283]

The summary of the research - clinical outcomes and survival differences between primary, secondary and concomitants carcinoma in situ of urinary bladder treated with BCG Immunotherapy is given below.

<h3>What is the summary of the above research?</h3>

Urinary bladder carcinoma in situ (CIS) is a flat, high-grade, and aggressive form of urothelial cancer with a high likelihood of development to muscle-invasive illness and metastatic dissemination.

The study's goal was to compare the clinical histories and survival rates of primary, secondary, and concurrent CIS of the bladder.

Learn more about Immunotherapy at brainly.com/question/14493516

#SPJ1

6 0
1 year ago
Read 2 more answers
Other questions:
  • Software that interprets commands from the keyboard and mouse is also known as the A.hard drive.B.operating system.C.desktop or
    7·2 answers
  • Find functions f1 and f2 such that both f1 and f2 are O(g(n)), but f1(n) is not O(f2)
    6·1 answer
  • Where could an identity theft access your personal information
    9·2 answers
  • When you move or size a control in the Form Designer, Visual Studio automatically adjusts the ________________ that specify the
    9·1 answer
  • reading is important blank areas of life A in very few B in many C only in academic D only in career​
    10·1 answer
  • Which type of software coordinates the hardware and software of a computer to work efficiently and productively?
    5·2 answers
  • PLEASE HELP!!!
    11·2 answers
  • Raw materials have two basic types what are the 2?
    11·2 answers
  • When adding new hardware, such as a printer, to a computer you often have to add associated software that allows the printer to
    6·1 answer
  • Using an open connection to a small company's network, an attacker submitted arbitrary queries on port 389 to the domain control
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!