1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kirza4 [7]
2 years ago
15

In a ring-based system, procedure p is executing and needs to invoke procedure q. Procedure q's access bracket is (5,6,9). In wh

ich ring(s) must p execute for the following to happen?
Computers and Technology
2 answers:
Marat540 [252]2 years ago
6 0

Complete Question:

Consider Multics procedures p and q. Procedure p is executing and needs to invoke procedure q. Procedure q's access bracket is (5, 6) and its call bracket is (6, 9). Assume that q's access control list gives p full (read, write, append, and execute) rights to q. In which ring(s) must p execute for the following to happen?

A) p can invoke q, but a ring-crossing fault occurs.

B) p can invoke q provided that a valid gate is used as an entry point.

C) p cannot invoke q.

D) p can invoke q without any ring-crossing fault occurring, but not necessarily through a valid gate

Answer:

If we suppose the access bracket as (a, b) and call bracket as (b, c), for q we have (a, b) = (5, 6) and (b, c) = (6, 9). Let the ring be denoted by r.

A) p can invoke q, but a ring-crossing fault occurs.

p must execute in rings where r < a., in r < 5, p must execute.

B) p can invoke q provided that a valid gate is used as an entry point.

p must execute in the rings between 6 and 9. r must be between a and b.

C) p cannot invoke q.

When r > c, then p cannot invoke q. That means, for this condition to happen p must execute in rings > 9

D) p can invoke q without any ring-crossing fault occurring, but not necessarily through a valid gate

When r is between a and b then the condition can be satisfied. That means p must execute in rings between 5 and 6.

Explanation:

Crank2 years ago
4 0

Answer:

A.Rings 0 through 4

B. Rings 7 through 9

C.Ring number greater than 9

D.Riing 5 or 6

Explanation

(a)p can invoke q, but a ring-crossing fault occurs. R< a1 for access permitted but ring crossing fault occurs. Therefore, go through - rings 0 through 4.

(b)p can invoke q provided a valid gate is used as an entry point.

A2 < r <= a3 for access allowed if make through a valid gate. Therefore, go through - rings 7 through 9.

(c)p cannot invoke q.

a3 < r for all access denied. Hence, proceed through - ring with number greater than 9.

(d)p can invoke q without any ring-crossing fault occurring, but not through a valid gate.proceed through – ring 5 or 6.

You might be interested in
What is occurring when an attacker manipulates commonplace actions that are routinely performed in a business?
serg [7]

Answer:

Vulnerable business processes, also called business process compromise (BPC), occurs when an attacker manipulates commonplace actions that are routinely performed.

4 0
3 years ago
A security system uses sensors at every door and window which will set off an alarm if any one of them is opened. There is also
jeka57 [31]
Well think of it like this lets say this wasn't and security system and it was a video game console and remote.
 Now the console or keypad or the main components the power on or shut off the devices and the remote or sensors are the secondary parts but they are needed to help the console or keypad figure out what they are doing.
5 0
3 years ago
In your own words, what is pair-programming? What is the role of the driver? What is the role of the navigator? What are some be
KATRIN_1 [288]

<u>Paired programming:</u>

Paired programming is a new technique where one person gets one another to<em> write the code</em>. Here one will write the code and other will start verifying as the type.

So we might think it is waste to employ two person for same task but it is not so. There are many <em>benefits in incorporating this technique</em>. Let us see those benefits one by one.

  • <em>Inter-personal skill gets improved </em>
  • <em>Lower amount of coding mistake </em>
  • <em>Learn from each other </em>
  • <em>Peer review enhance collaboration </em>

Challenges expect to arise during pair-programming

  • Two heads are superior to one. On the off chance that the driver experiences a <em>hitch with the code</em>, there will be two of them who'll take care of the issue.  
  • Builds up your <em>staff's relational aptitudes</em>. Working together on a solitary venture encourages your group to welcome the estimation of <em>correspondence and collaboration.  </em>

Overcome Method

The most ideal approach to move <em>toward blending</em> is to accomplice two software engineers and have them share a PC. The pair ought to have the option to choose how to part the work, and it is prudent that they should <em>switch jobs frequently.</em>

7 0
3 years ago
The county clerk's office is writing a program to search their database for citizen records based on information about that citi
Alborosie

Answer:

The correct pseudocode to find the records of all citizens over the age of 50 is IF(age > 50).

OR EACH item IN citzlist

{

WHILE(not end of citzlist)

{

IF(age > 50)

{

DISPLAY(name)

}

}

}

If this is run, it will bring out all the names of the citizen who are over the age of 50 in the list.

Explanation:

6 0
2 years ago
Which feature of a website takes you to a different part of the website or a totally different website when you click on it?
lesantik [10]

A hyperlink is a feature that takes you to a different page when you click on it. That page could be part of the same website or a totally different website.

Let me know if you have any questions.

3 0
3 years ago
Read 2 more answers
Other questions:
  • In older systems, often the user interface mainly consisted of ____-control screens that allowed a user to send commands to the
    11·1 answer
  • How does a content management system differ from a basic wysiwyg web authoring tool??
    11·1 answer
  • Microsoft’s SharePoint server product dramatically altered the content and records management (RM) markets. Crocker (2015), edit
    6·1 answer
  • Linda is viewing the campaign report in her Google Ads account after successfully implementing conversion tracking tags for her
    7·1 answer
  • Which processor family is most likely found on recent gaming laptops (Gaming laptops require a lot of computational power)?
    11·1 answer
  • Kristi, an event planner, wants to store caterers’ names and contact information in an organized manner. Kristi will MOST LIKELY
    13·1 answer
  • In cryptocurrency, a block is only considered valid if it has a.
    10·1 answer
  • ________ has the ability to drag windows to the edges or corners of your screen and have them snap into place.
    12·1 answer
  • A block signature indicating that a text message was typed on a mobile device is an example of ____________.
    5·1 answer
  • 8) how many nanoseconds does it take for a computer to perform one calculation if it performs 6.7 x 107 calculations per second?
    6·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!