1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
DochEvi [55]
4 years ago
11

"When an interrupt or a system call transfers control to the operating system, a kernel stack area separate from the stack of th

e interrupted process is generally used. Why?"
Computers and Technology
1 answer:
pochemuha4 years ago
3 0

Answer:

Explanation:

There are two reasons, first, the operating system could be blocked because a program with poorly written user program does not allow for enough stack space.

Second, the kernel can leave data in the user memory of a program, and this data can be used for another user to get another delicate information.

You might be interested in
What is blogging
tester [92]
Typically, blogging is online journaling. If you've seen Ask Me Why, she blogs throughout the whole movie and tells those who are watching her blog what is happening in her life. So, the answer is A.
5 0
3 years ago
Read 2 more answers
Some computer engineering students decided to revise the LC-3 for their senior project. In designing the LC-4, they decided to c
Bezzdna [24]

Some computer engineering students decided to revise the LC-3 for their senior project.  KBSR and the DSR into one status register: the IOSR (the input/output status register). IOSR[15] is the keyboard device Ready bit and IOSR[14] is the display device Ready bit can be done in LC-3.

LC-4 is a poor design.

Explanation:

LC-3, is a type of computer educational programming language, an assembly language, which is a type of low-level programming language.

It features a relatively simple instruction set, but can be used to write moderately complex assembly programs, and is a theoretically viable target for a C compiler. The language is less complex than x86 assembly but has many features similar to those in more complex languages. These features make it useful for beginning instruction, so it is most often used to teach fundamentals of programming and computer architecture to computer science and computer engineering students.

The LC-3 specifies a word size of 16 bits for its registers and uses a 16-bit addressable memory with a 216-location address space. The register file contains eight registers, referred to by number as R0 through R7. All of the registers are general-purpose in that they may be freely used by any of the instructions that can write to the register file, but in some contexts (such as translating from C code to LC-3 assembly) some of the registers are used for special purposes.

When a character is typed:

  • Its ASCII code is placed in bits [7:0] of KBDR  (bits [15:8] are always zero)
  • The “ready bit” (KBSR[15]) is set to one
  • Keyboard is disabled -- any typed characters will be ignored

When KBDR is read:

  • KBSR[15] is set to zero
  • Keyboard is enabled
  • Alternative implementation: buffering keyboard input
8 0
4 years ago
What is a zerø-day exploit? No go.ogle >:(
Igoryamba

Answer:A zero-day vulnerability is a vulnerability in a system or device that has been disclosed but is not yet patched. An exploit that attacks a zero-day vulnerability is called a zero-day exploit.

Explanation:

6 0
2 years ago
Recall the problem of finding the number of inversions. As in the text, we are given a sequence of n numbers a1, . . . , an, whi
Kay [80]

Answer:

The algorithm is very similar to the algorithm of counting inversions. The only change is that here we separate the counting of significant inversions from the merge-sort process.

Algorithm:

Let A = (a1, a2, . . . , an).

Function CountSigInv(A[1...n])

if n = 1 return 0; //base case

Let L := A[1...floor(n/2)]; // Get the first half of A

Let R := A[floor(n/2)+1...n]; // Get the second half of A

//Recurse on L. Return B, the sorted L,

//and x, the number of significant inversions in $L$

Let B, x := CountSigInv(L);

Let C, y := CountSigInv(R); //Do the counting of significant split inversions

Let i := 1;

Let j := 1;

Let z := 0;

// to count the number of significant split inversions while(i <= length(B) and j <= length(C)) if(B[i] > 2*C[j]) z += length(B)-i+1; j += 1; else i += 1;

//the normal merge-sort process i := 1; j := 1;

//the sorted A to be output Let D[1...n] be an array of length n, and every entry is initialized with 0; for k = 1 to n if B[i] < C[j] D[k] = B[i]; i += 1; else D[k] = C[j]; j += 1; return D, (x + y + z);

Runtime Analysis: At each level, both the counting of significant split inversions and the normal merge-sort process take O(n) time, because we take a linear scan in both cases. Also, at each level, we break the problem into two subproblems and the size of each subproblem is n/2. Hence, the recurrence relation is T(n) = 2T(n/2) + O(n). So in total, the time complexity is O(n log n).

Explanation:

5 0
3 years ago
How many times is the body of the loop executed?
Flura [38]

Answer:

The loop will run 5 times.

3 0
3 years ago
Other questions:
  • Explain how to use fortran programming in details
    14·1 answer
  • How do i start makeing a Character in the Unreal Game Engine
    14·2 answers
  • What are the 21St century competencies or skills required in the information society?<br>​
    15·1 answer
  • Which routine is configured to be called by another routine?
    10·1 answer
  • __________ is a protocol used by e-mail clients to download e-mails to your computer.
    14·1 answer
  • Which statement pertaining to system reliability is FALSE? Select one: A. Having the latest version of software products can mak
    15·1 answer
  • When installing EMT conduit that will be exposed to wet conditions, _______ fittings should be used.
    5·2 answers
  • Disadvantages of computer. ​
    9·1 answer
  • What is the volume of a rectangular prism with a length of 812 centimeters, width of 913 centimeters, and a height of 1225 centi
    12·1 answer
  • a user complains he cannot access a particular website, although he is able to access other websites. At which layer of the OSI
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!