1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ikadub [295]
3 years ago
10

Briefly define "address space" and discuss its major tradeoffs (advantages/costs). What problem is it addressing?

Computers and Technology
1 answer:
vladimir1956 [14]3 years ago
6 0

Answer:

The address space basically define the memory allocation for all the computational entity. It is basically define in the specific range in the memory which is available in the program.

The memory can be allocated in the resources like file, devices and server. In the address space the memory can be used either virtually or physically for executing the given instruction and storing the data in the system.

The main advantages and costs of the address space are that:

  • The simplifies the data migration and also the process migration the system.
  • It is easy to implement the zero cop.
  • It basically eliminate the copying of the data from the memory.  
  • The cost increase as the traditional operation system used a individual address space in the each processing.  

The small organization majorly face the problem of addressing and it also reduce the stability of the company and organization.

You might be interested in
Explain why blocking ping (ICMP echo request) packets at an organization's edge router is not an effective defense against ping
tresset_1 [31]

Answer:

The blocking ping is not effective in an organization because it may required ping echo message from some trusted system. the best method will be to do the filtering of incoming echo ICMP messages.

In systems we have ping utility, that is based on ICMP protocol. Its function is  to check the end to end connectivity of the system.

In this case a  fist all an echo ICMP message is send to the host then host reply with ICMP message. to defend yourself from this flood attack, we need to filter the incoming echo ICMP packet messages. a net filter can be used to achieve it.

The best method be to applied is the firewall having a net filter with limit setting or any intrusion system. In market we have various firewall and intrusion system available to do so.

Explanation:

Solution

Ping Flood Atack:

In this attack the main of the attacker is to saturate the system with ICMP for example (internet control message protocol) traffic. as you have saturated the system, it will have less CPU time to serve others.

Defence against this attack:

In our systems we have ping utility, that is based on ICMP protocol. Its used to check the end to end connectivity of the system. here fist all an echo ICMP message is send to the host then host reply with ICMP message. to defend yourself from this flood attack , we need to filter the incoming echo ICMP packet messages. a Net filter can be used to achieve this.

The best way will be to used the firewall having net filter with limit setting or any intrusion system. In market we have various firewall and intrusion system available to do so.

Blocking ping packets to avoid ping flood attack:

Its not a good approach to block ping packets. because you may required ping echo message from some trusted system. The best option will be to do the filtering of incoming echo ICMP message.

6 0
4 years ago
A computer science student often uses public forum sites like CodeGuru, DreamInCode and StackOverflow in order to help with lear
il63 [147K]

Answer:

C

Explanation:

You can automatically cross out A, as they do not hinder communication. B can be crossed out as well, since kids should use these websites for help. Using the websites can be beneficial and give a learning edge. D is kind of correct, but isn't the best answer.

C is the answer because the websites are public data. People get on the website for help with certain concepts, and helps identify problems to their solution. <em>(Public data found on these forums provides widespread access to identified problems and their solutions. )</em>

4 0
3 years ago
Refer to the exhibit. What will the router do with a packet that has a destination IP address of 192.168.12.227? Send the packet
AnnyKZ [126]

Answer:

B. Send the packet out the Serial0/0/0 interface.

Explanation:

In order for packets to be sent to a remote destination, these three parameters must be configured on a host.

- Default gateway

- IP address

- Subnet mask

After a router successfully determines the destination network, the router checks the routing table for the resulting destination network number. If a match is found, the interface associated with the network number receives the packets. Else, the default gateway configured is used.

Also, If there is no default gateway, the packet is dropped.

Since the 192.168.12.227 network is not found in the routing table and the router uses the default gateway. The router then send the packet out the Serial0/0/0 interface which is the interface associated with the address 209.165.200.224/30.

4 0
3 years ago
You want to ensure that users are granted only the permissions needed to access data required to perform their jobs. What should
HACTEHA [7]

Answer:

The answer to this question is "Principle of need to know".

Explanation:

In the given statement some information is missing that is the option of the question that can be described as follows:

A. Principle of least privilege

B. Principle of need to know

C. Principle of limited rights

D. Principle of permissions

The need to know principle refers to seeks to prevent "browsing" sensitive data by restricting access to as few people as possible. It is also known as a process, in which the user can set the restriction to access data to other users, and other choices are not correct that can be described as follows:

  • In option A, It is used to access a critical system.
  • In option B, It is used to provides rights to access data.
  • In option D, It is also known as an administrator, that allows users to access data.
7 0
4 years ago
How to cite a reference that has multiple authors mla?
Tanya [424]
Example: 
                          Why The Zoo Needs More Exotic Animals


Income increase from a larger tourist attraction is just one reason why I think our zoo should have more exotic animals. ..........................................................................................................................................................................................................................................................................."Tourists love animals. Tourists love animals they've never seen before.(J.Walker, Bob Smith, Ed Courtney Pg.57)"
8 0
3 years ago
Other questions:
  • A Uniform Resource Locator (URL) consists of three separate parts: network protocol, host, and web browser.
    11·2 answers
  • Use the Crop tool on an image to
    6·2 answers
  • Which type of account typically has very high liquidity, low or no interest, and low minimum balance?
    5·2 answers
  • If you need to write a function that will compute the cost of some candy, where each piece costs 25 cents, which would be an app
    5·1 answer
  • A firm has a huge amount of individual customer data saved in different databases. Which of the following can be used to integra
    11·1 answer
  • What is a command-line interactive scripting environment that provides the commands for almost any management task in a Windows
    9·1 answer
  • During which part of an examination are various body parts and organs touched and felt?
    15·1 answer
  • WHO WANTS TO PLAY AMONG US
    15·2 answers
  • Which type of application architecture has a logic tier
    15·2 answers
  • What is the benifet of the manager feature
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!