1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natima [27]
3 years ago
11

"If a program attempts to modify (or, sometimes, even to read) the contents of memory locations that do not belong to it, the op

erating system s __________ routine intervenes and (usually) terminates the program."
A. reliability
B. security
C. processor management
D. memory protection
Computers and Technology
1 answer:
Monica [59]3 years ago
3 0

The operating system's memory protection routine intervenes and (usually) terminates the program if a program attempts to modify (or, sometimes, even to read) the contents of memory locations that do not belong to it.

Further Explanation

The memory protection routine is most commonly used in multi-programmed systems to prevent one process from affecting the availability of another. When a user opens up multiple processes, by default, they usually reside at the same time in the main memory. Sometimes, a program may attempt to access, modify, or read memory locations allocated to other processes. When this happens, the memory protection program jumps in. Keep in mind that the memory manager somehow works hand in hand with the memory protection routine. It protects the OS from being accessed by other processes and these processes from accessing one another. In addition, it helps save memory by allocating the same amount of memory to all running processes. The memory protection program, on the other hand, should be able to allow controlled sharing of memory among different processes and will usually terminate a program that tries to modify content of memory locations of that does not belong to it.

Learn More about Memory management

brainly.com/question/14241634

#LearnWithBrainly

You might be interested in
The first row of a table is often called the _____ row.
satela [25.4K]

ANSWER:

The first row of a table is often called the header row.

~batmans wife

7 0
3 years ago
Read 2 more answers
In the SoundByte, the Magic Gradient Pen has an algorithm which listens for ________ and then changes the gradient coloring of t
kirill [66]

Answer:

It listens for sound intensity

Explanation:

It listens for the sound intensity and loudness. As the intensity varies the background color changes as well.

4 0
4 years ago
Read 2 more answers
For each problem listed below, use the drop-down menu to select the field of the professional who can help solve the issue.
Paul [167]

Answer:

  • Interactive media
  • Information services and support
  • Programming and software development
  • Network systems administration

Explanation:

The company has finished designing a software program, but users aren’t sure how to use it. <u>interactive media</u>

Several people in the human resources department need new software installed. <u>information services and support</u>

An employee has an idea for a software program that can save the company time, but doesn’t know how to write it. <u> programming and software development</u>

A new branch of the company is opening soon, and the computers there need to be connected to the Internet. <u>network systems administration</u>

<u>OAmalOHopeO</u>

3 0
3 years ago
What does the ‘random’ part of Random Access Memory refer to?
Tems11 [23]

Answer:

it means it store a few in information randomly because it process different information at the same time

7 0
3 years ago
Which expression adds 1 to the element of array arrayname at index i?
NemiM [27]
I believe the answer is <span>++arrayName[ i ].

</span>
8 0
3 years ago
Other questions:
  • Canadian Tire is one of Canada’s largest companies. They operate four large distribution centers service over 470 tire retail ou
    5·1 answer
  • Tristan has moved the Television and related equipment
    10·1 answer
  • Which is a benefit of peer-to-peer networking?
    10·1 answer
  • _______ _____ is the process of creating usable computer pograms and applications and the theories behind those processes. Quest
    13·2 answers
  • In java, a class that is defined without an explicit extends clause ____.
    15·2 answers
  • You don't have policies that force settings for the look of users' computer desktops. Each user's chosen desktop settings are ap
    15·2 answers
  • Which expression correctly determines that String s1 comes before String s2 in lexicographical order
    6·1 answer
  • How long does it take rblx to re open deleted acc
    8·2 answers
  • Program a substitution cipher in Python. Create 2 functions one for encryption and the other for decryption ( get the text as th
    8·1 answer
  • Which best describes sorting, filtering, and deleting records?
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!