1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
igor_vitrenko [27]
3 years ago
12

What system calls have to be executed by a command interpreter? Why is it usually separate from the kernel?

Computers and Technology
1 answer:
Licemer1 [7]3 years ago
6 0

Answer:

The exec command by interpreter to start new process

Explanation:

On Unix systems, a call to the fork system must be made followed by a call to the e x e c system to begin a new process. The fork call clones the process that is currently running, while the executive call overlays a new process based on a different executable over the calling process.

It is seperate from Kernal because

It Read user commands or a script and execute them, generally turning them into one or more system calls. Is usual It is not part of the kernel since the command interpreter is subject to change.

You might be interested in
What is a sending device? a device on which data, instructions, and information travel a device that accepts the transmission of
DENIUS [597]
<span>What is a sending device? </span>
A sending device is a device that initiates an instruction to transmit data, instructions or information.

8 0
3 years ago
25-words or more in your OWN words the meaning of digital literacy.
jolli1 [7]

Answer:

Digital literacy means having the skills you need to live, learn, and work in a society where communication and access to information are increasingly through digital technologies like internet platforms, social media, and mobile devices.

Explanation:

6 0
3 years ago
__________ implements a security policy that specifies who or what may have access to each specific system resource and the type
malfutka [58]

Answer: Access control

Explanation:

Access control implements a security policy that specifies who or what may have access to each specific system resource and the type of access that is permitted in each instance.

A typical example of this is in ERPs where access controls defines what access codes a process owner has and what access a reviewer and an approval has. Where a personnel has access to carry out a transaction, review and approve the transaction, access controls are said to be deficient.

The right answer is Access control

Hope this helps!!

6 0
3 years ago
Need the answer rn!!!!
Julli [10]

Answer:

what language is this? english or no

Explanation:

8 0
3 years ago
What are organization tools?
Nonamiya [84]
An app or software created to optimize your daily task performance
4 0
3 years ago
Other questions:
  • A(n) __________________ device is a breath analyzer on your vehicle that is electronically connected to the ignition.
    11·1 answer
  • 13. The Save As command is useful if you want to copy an open document and
    7·2 answers
  • Which statement reflect a culture that value collectivism
    7·1 answer
  • (5 points) Create a user-defined data structure (i.e., struct) called Point that represents a two-dimensional Cartesian coordina
    5·1 answer
  • Zara is typing the names of all the States in Pakistan. She has not numbered the list. Suggest her the way by which she can numb
    5·1 answer
  • What function returns a line and moves the file pointer to the next line?
    9·1 answer
  • According to the passage, what are the goals of the<br> program? Check all that apply.
    11·1 answer
  • Ria and her team ....................... they will win. *
    8·1 answer
  • Explain why this scenario could put an organization in jeopardy of losing some of its workforce.
    12·1 answer
  • Draw the 2-3 tree that results when you insert the keys E A S Y Q U T I O N in that order into an initially empty tree
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!