1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Amanda [17]
3 years ago
7

opearating system protection refers to a mechanism for controling access by programs, processes, or users to both system and use

r resources. briefly explain what must be done by the operating system protection mechanism in order to provide the required system protection
Computers and Technology
1 answer:
Alekssandra [29.7K]3 years ago
5 0

Answer:

The operating system must by the use of policies define access to and the use of all computer resources.

Policies are usually defined during the design of the system. These are usually default in settings. Others are defined and or modified during installation of the addon and or third-party software.

Computer Security Policies are used to exact the nature and use of an organisations computers systems. IT Policies are divided into 5 classes namely:

  1. General Policies
  2. Server Policies
  3. VPN Policies
  4. Back-Up Policies
  5. Firewall Access and Configuration Policies

Cheers!

You might be interested in
A technician is troubleshooting a small network with cable Internet service in which a user is receiving a message in her web br
expeople1 [14]

Answer:

Option E is correct.

Explanation:

A professional is fixing a cable internet access network by which a person in their internet browser receives a text saying that a link could not be reached. It would be known that each and every server along the network is having the individual problem across whole websites when interviewing a person.

So, connect the system to the wired connection directly, & try to access the internet for troubleshooting the following issue.

6 0
3 years ago
Microsoft word 365 allows cells to be split into how many columns
Bogdan [553]

Answer:

Microsoft word 365 allows two columns

8 0
3 years ago
Read 2 more answers
The scope of a variable declared within a for() loop is:
Leni [432]

Answer:

a

Explanation:

The variable declared in the for is accessible only within the for loop  and it goes out of scope once the loop get end

eg : for(int i=1;i<=10,i++) // variable i is declared

{

// variable i is visible only in this block,

}

//After this the variable i goes out of scope

5 0
3 years ago
Why were early computers so much bigger than the ones we use now?
prisoha [69]

Answer:

They used bulky vacuum tubes.

Explanation:

I took the test

7 0
2 years ago
In two to three sentences, describe how the first Mac OS was different from the operating systems used by most early PCs.
Paha777 [63]

Answer:

DOS: Disk Operating System. DOS was the computer operating system used in the early days of computing and was extended to PC-DOS by Bill Gates when Microsoft was asked by IBM to develop an operating system for the IBM personal computers.

Microsoft Windows. Microsoft Windows is likely the most well-known and common computer operating system in the world today.

8 0
2 years ago
Other questions:
  • •What are some conflicts between humans and machines that have arisen in the past?
    14·1 answer
  • Explain how inflation flattens the universe
    6·2 answers
  • In a system using the fixed partitions memory allocation scheme, given the following situation (and using a decimal form): After
    9·1 answer
  • All systems have ___________.
    9·2 answers
  • Websites can have good content for a particular set of search phrases, yet rank poorly. Issues that may cause this to occur incl
    9·1 answer
  • Which statement best describes antivirus software?
    13·1 answer
  • Before you can use a navigation control, you must _____. A. configure the web.config B. configure the global.asax C. configure t
    5·2 answers
  • Please help!!!
    9·2 answers
  • HELP!!!
    15·2 answers
  • A ……………………………is used to verify the identity of a website and is issued to the owner of the website by an independent and recogni
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!