1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lianna [129]
2 years ago
14

FS and GS are two___________________ in protected mode.

Computers and Technology
1 answer:
masha68 [24]2 years ago
7 0

Answer:

Segment registers

Explanation:

The initial purpose behind the segment registers was to enable a program to access many distinct (big) memory sections designed to be autonomous and part of a constant virtual store.

They don't have a processor-defined objective, but instead Operating system runs them for purpose. The GS register is used in Windows 64-bit to point to constructions defined by the operating scheme.   Operating system kernels usually use FS and GS to access thread-specific memory. In windows, thread-specific memory is managed using the GS register. To access cpu-specific memory, the linux kernel utilizes GS.

You might be interested in
How can you add and remove categories from a previously created chart? A. Click the Format tab. B. Click the Chart Styles button
hoa [83]
<span>Click the Chart Filters button.</span>
7 0
3 years ago
Read 2 more answers
Which of the following best explains how the Internet is a fault-tolerant system?
IrinaK [193]

Answer:

A

Explanation:

The Internet is fault-tolerant because cybercriminals can conceal their actions, allowing them the ability to carry out faulty actions without leaving a trace.

This statement is actually the same question I had to answer when in my 2nd year 1st semester in itt.
<3 enjoy

8 0
2 years ago
Read 2 more answers
Hey, wanna pair our account on Brainly so we can share the perks? https://brainly.com/invite/8db681239ab5027e03b097bcded13755?ut
sashaice [31]

Answer:

Explanation:

NO Thx

8 0
3 years ago
Read 2 more answers
Most Muslims are Sunni Muslims; however, the Shiites are a forceful minority in some parts of the Middle East. The Sunni-Shiite
Sever21 [200]
<span>Dispute who should be the leader of the Muslims after the death of Mohammed.<span> </span></span>
3 0
3 years ago
The Earth's _______ is ductile overall, tending to flow very slowly and deform in a _______ manner.
kipiarov [429]

<span>The asthenosphere is a part of the upper mantle just below the </span>lithosphere<span> <span>that is involved in </span></span>plate tectonic movement<span> <span>and </span></span>isostatic<span> <span>adjustments. The lithosphere-asthenosphere boundary is conventionally taken at the 1300 °C </span></span>isotherm<span>, above which the mantle behaves in a rigid fashion and below which it behaves in a </span>ductile<span> fashion. a</span><span>nd </span>flows very slowly, in a manner<span> similar to the ice at a bottom of a glacier.</span>

5 0
3 years ago
Read 2 more answers
Other questions:
  • While a hard drive is running, even a slight bump against the computer may cause the
    9·2 answers
  • Your company is instituting a new security awareness program. You are responsible for educating end users on a variety of threat
    10·1 answer
  • Which of the following data recording procedures is best used for behaviors that have a clear ending and beginning, do not occur
    12·1 answer
  • Three of the most important jobs of security management are to ensure _____ are organized according to sensitivity, ensure that
    10·1 answer
  • For which type of long-distance call do you need to tell the operator the name of the person to whom you wish to speak?
    10·1 answer
  • Which of the following things could you do in order to tell if a pair of colors has strong contrast? A. Look at the colors on th
    12·1 answer
  • Operating systems provide a measure of security by allowing users to access to those resources they've been cleared to use as we
    8·1 answer
  • R6. Suppose N people want to communicate with each of N - 1 other peo- ple using symmetric key encryption. All communication bet
    13·1 answer
  • Which of the following examples can be solved with unsupervised learning?
    8·1 answer
  • If Laura wanted to solve a problem using recursion where the last statement executed is the call to the same method, what type o
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!