1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kirza4 [7]
3 years ago
15

In a ring-based system, procedure p is executing and needs to invoke procedure q. Procedure q's access bracket is (5,6,9). In wh

ich ring(s) must p execute for the following to happen?
Computers and Technology
2 answers:
Marat540 [252]3 years ago
6 0

Complete Question:

Consider Multics procedures p and q. Procedure p is executing and needs to invoke procedure q. Procedure q's access bracket is (5, 6) and its call bracket is (6, 9). Assume that q's access control list gives p full (read, write, append, and execute) rights to q. In which ring(s) must p execute for the following to happen?

A) p can invoke q, but a ring-crossing fault occurs.

B) p can invoke q provided that a valid gate is used as an entry point.

C) p cannot invoke q.

D) p can invoke q without any ring-crossing fault occurring, but not necessarily through a valid gate

Answer:

If we suppose the access bracket as (a, b) and call bracket as (b, c), for q we have (a, b) = (5, 6) and (b, c) = (6, 9). Let the ring be denoted by r.

A) p can invoke q, but a ring-crossing fault occurs.

p must execute in rings where r < a., in r < 5, p must execute.

B) p can invoke q provided that a valid gate is used as an entry point.

p must execute in the rings between 6 and 9. r must be between a and b.

C) p cannot invoke q.

When r > c, then p cannot invoke q. That means, for this condition to happen p must execute in rings > 9

D) p can invoke q without any ring-crossing fault occurring, but not necessarily through a valid gate

When r is between a and b then the condition can be satisfied. That means p must execute in rings between 5 and 6.

Explanation:

Crank3 years ago
4 0

Answer:

A.Rings 0 through 4

B. Rings 7 through 9

C.Ring number greater than 9

D.Riing 5 or 6

Explanation

(a)p can invoke q, but a ring-crossing fault occurs. R< a1 for access permitted but ring crossing fault occurs. Therefore, go through - rings 0 through 4.

(b)p can invoke q provided a valid gate is used as an entry point.

A2 < r <= a3 for access allowed if make through a valid gate. Therefore, go through - rings 7 through 9.

(c)p cannot invoke q.

a3 < r for all access denied. Hence, proceed through - ring with number greater than 9.

(d)p can invoke q without any ring-crossing fault occurring, but not through a valid gate.proceed through – ring 5 or 6.

You might be interested in
Please help me what is an example of a growing trend on social media
Marizza181 [45]

Answer:

B

Explanation:

8 0
3 years ago
A. which chip is thought to be the first microprocessor? how many transistors roughly did it use?
vaieri [72.5K]
A micro processor is an integrated circuit that have all the functions of a central processing unit of a computer.
The chip which is thought to be the first microprocessor is INTEL 4004. It was manufactured by Intel in 1971. Intel 4004 has 2,300 transistors. 
4 0
4 years ago
A Windows user has been successfully saving documents to the file server all morning. However, the latest attempt resulted in th
Elena L [17]

Answer:

The most likely reason for this error is that the share is currently not available either on just the user’s computer or server-wide. The next step would be to check for the scope of the problem.

5 0
3 years ago
William would like to sort a list of items after the data is already entered.
Reptile [31]
It is number I think
4 0
3 years ago
Read 2 more answers
What is the missing line of code? &gt;&gt;&gt;from math th import &gt;&gt;&gt; Point = [1,5) &gt;&gt;&gt; bPoint [4.9]​
Ulleksa [173]

Answer:

I believe import math.

Do let me know if its correct.

3 0
2 years ago
Other questions:
  • ______ are segments of computer code that attach to existing computer programs and perform malicious acts. select one:
    7·1 answer
  • Gary says, "Ports are where data enter a network before reaching a gateway. The data travel via transmission media." Explain why
    12·2 answers
  • In a virtual memory system, each process must have its own page table.(True or False?)
    13·1 answer
  • Why do we allow electronic instruments to warm-up before use?
    11·1 answer
  • Which is a requirement for searching for a template
    14·1 answer
  • What is processing requirement in computer?
    11·1 answer
  • In this program we are going to practice using the Math class by computing some important values on the unit circle. Using the a
    5·1 answer
  • What is the output of the code?
    15·1 answer
  • Complex scientific research is usually done using?
    5·1 answer
  • at the command prompt, type ls -l myscript and press enter. what permissions does the myscript file have? next, type bash myscri
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!