1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Amanda [17]
4 years ago
7

opearating system protection refers to a mechanism for controling access by programs, processes, or users to both system and use

r resources. briefly explain what must be done by the operating system protection mechanism in order to provide the required system protection
Computers and Technology
1 answer:
Alekssandra [29.7K]4 years ago
5 0

Answer:

The operating system must by the use of policies define access to and the use of all computer resources.

Policies are usually defined during the design of the system. These are usually default in settings. Others are defined and or modified during installation of the addon and or third-party software.

Computer Security Policies are used to exact the nature and use of an organisations computers systems. IT Policies are divided into 5 classes namely:

  1. General Policies
  2. Server Policies
  3. VPN Policies
  4. Back-Up Policies
  5. Firewall Access and Configuration Policies

Cheers!

You might be interested in
A Java programmer has developed a GUI with several different fields for inputting values and indicating choices via buttons, all
stiks02 [169]

Answer:

EventHandler

Explanation:

In order to do this the programmer needs to use the EventHandler class. This class allows the computer to listen for certain user actions such as pressing a button. Using this on a button would then allow the programmer to specify what they want to happen when the user clicks the button or performs a certain action. For example, in this scenario, the programmer would program an EventHandler so that when the button is clicked it saves the input to a variable and changes the input field to the next option.

3 0
3 years ago
Within the try clause of a try statement, you code a. all the statements of the program b. a block of statements that might caus
SVETLANKA909090 [29]

Answer:

B) A block of statement that might cause an exception.

Explanation:

Exception handling is a good programming technique that prevents our program from crashing when an exception occurs during execution. The try clause is used with a catch to handle any exception that might occur, so whenever a statement that might cause an exception is to be used, this should be contained in a try statement block of code.

5 0
3 years ago
Which is the most likely reason why scientists change a model?
frozen [14]

C.) New discoveries make the current model inaccurate. Since science is all about observation and experimentation, it is logical that whenever new findings are gathered, scientific models must be modified to adapt to the information. As new ideas and concepts are uncovered, models should be updated to make them correct.

5 0
3 years ago
Read 2 more answers
Create a class ProblemSolution with following characteristics Two private member variables name & designation of string type
Romashka-Z-Leto [24]

Answer:

Please see the attachment for the solution

Explanation:

Download txt
4 0
4 years ago
​Lisa mentions that a program is developed to interact with other programs, and she wants to begin by testing the programs indiv
Ronch [10]

QC TESTER(quality testing process) is the name of this process.

To name this process call QC TESTER

<u>Explanation:</u>

Any software development environment their will QC testing (quality testing process) where end user will do or simulate complete testing of software make the software bug free.

After QC tester confirm the program as bug free then only software implementation team ready for implementation process. QC tester is important role in software development environment to find a bug on function, data input entry and monitor result from software and inform to software team with list of bug results.

This process will take place to and from between QC tester and software developer team till software become bug free.  

6 0
3 years ago
Other questions:
  • It is better to know the main components of all computer programming languages
    9·1 answer
  • This information is generally included on a fax cover sheet.
    15·1 answer
  • 3. If the typical balance on Lucy's credit card is $750 and the interest rate (APR) on her credit card is 16%, how much in inter
    11·2 answers
  • In a car crash, wearing a seat belt __________________.
    5·2 answers
  • What is not true of credit scores?
    11·1 answer
  • An automated service that consolidates and distributes information from newsgroups, blogs, forums and news websites is called
    11·1 answer
  • Jane is creating a slide that will have a large heading and number of bullet points below it. What slide format should she use?
    12·1 answer
  • Using complete sentences post a detailed response to the following.
    13·1 answer
  • Henry is creating code In JavaScript to run calculations on extremely small numbers. How can he use MIN_VALUE as validation in t
    6·1 answer
  • Which of the following terms refers to the cells that contain values and labels to be graphed in the chart?.
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!