1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yKpoI14uk [10]
3 years ago
7

When an interrupt transfers control to an operating system, a Kernel stack area separate from the stack of the interrupted proce

ss is generally used.Why?
Computers and Technology
1 answer:
Roman55 [17]3 years ago
5 0

Answer:

Control is transmitted to the operating system when an interrupt happens, which determines what action is to be done to be taken or usually what interrupt services.

  • If the kernel leaves data in the memory space of a user program when returning from a system call, it may be possible for a malicious user to use this data to find out about other processes.
  • In these systems, the kernel synchronizes by preventing interrupts in critical sections with interrupt handlers on a processor.
  • Operating system may crash if it controls the interrupts because a poorly written user program does not provide sufficient stacking room.
You might be interested in
To join a social network you create an avatar true or false
svp [43]
False because not all social media webstites provide avatars
7 0
3 years ago
Read 2 more answers
does an access control list looks for patterns of traffic between multiple packets and takes action to stop detected attacks?
Kryger [21]

The access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

<h3>What is the access control list?</h3>

An access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

Based on the IP header data, such as the source or destination IP address, protocol, or socket number, an access control list filters traffic.

Thus, the access control list searches for patterns in the communication between different packets and responds to any assaults that are found.

Learn more about the access control list here:

brainly.com/question/13718195

#SPJ4

5 0
2 years ago
Ports that expand the options for input, output, and storage, are commonly called ____________ ports.
Ostrovityanka [42]
The answer is expansion ports
5 0
3 years ago
Which type of firewall policy calls for a firewall to deny all traffic by default?
charle [14.2K]
Restrictive policy is a kind of policy calls for a firewall to contradict all traffic by default. The first rule denies all traffic on any service and using any port. To permit a specific type of traffic, a new rule must be placed ahead of the deny all rule. A firewall should enforce the overall policy recognized by the network administrator. Enforcement is controlled mainly over setting up packet filtering rules which is a rule base comprises a set of these rules. 
3 0
3 years ago
Analysts use _____ to show the objects that participate in a use case and the messages that pass between the objects over time f
ch4aika [34]

Answer:Sequence diagrams

Explanation: Sequence diagram is the diagram that displays about the connection of the objects in a sequential manner. The sequence depicted through the vertical lines in parallel form was about the object function and the horizontal line showed interaction between them for the exchange of the information.

Other options are incorrect because structural models have the infrastructure in particular format, communication diagrams depicts the exchange of information through communication and class diagram is the diagram that displays the system's class.Thus the correct option is sequence diagram.

5 0
3 years ago
Other questions:
  • You should use html elements instead of server controls when
    11·1 answer
  • When studying an information system, illustrations of actual documents should be collected using a process called _____.
    12·1 answer
  • NEED HELP NOW 25 POINTS!!!!!!
    15·2 answers
  • during zach's second visit of the year, he incurred a $450 bill. Describe how much is paid by Zach and the insurance carrier
    7·1 answer
  • ____________ refers to the computer-to-computer transmission of business data in a structured format.
    15·1 answer
  • 2. What is data redundancy?
    14·1 answer
  • Which option is the default when creating appointments and meetings in a user’s own calendar as it relates to Free/Busy informat
    8·1 answer
  • Fill in this function that takes three parameters, two Strings and an int. 4- // Write some test function calls here! The String
    9·1 answer
  • I will give Brainliest and Extra points for correct answers!!!
    13·2 answers
  • The operating systems, and utility programs that perform system
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!