1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
WARRIOR [948]
3 years ago
11

Which of the following instructions should be allowed only in kernel mode? (a) Disable all interrupts. (b) Read the time-of-day

clock. (c) Set the time-of-day clock. (d) Change the memory map.
Computers and Technology
1 answer:
slamgirl [31]3 years ago
3 0

Answer:

A, B and D

Explanation:

The kernel is the central core of the computer's operating system, that has total control of all the activities of the computer. The kernel is a very small program in memory and runs first during the boot of the system. It is the interactive link between the hardware and operating system and other system softwares.

The uses a command line to receive and execute command for various system configurations like storage and memory mapping, enable and disable interrupts, set timers or allocate time slice to run programs etc.

You might be interested in
In python please!! Write the definition of a function named countPos that needs integer values from standard input until there a
jek_recluse [69]

Answer:

Explanation:

The following code is written in Python it doesn't use any loops, instead it uses a recursive function in order to continue asking the user for the inputs and count the number of positive values. If anything other than a number is passed it automatically ends the program.

def countPos(number=input("Enter number: "), counter=0):

   try:

       number = int(number)

       if number > 0:

           counter += 1

           newNumber = input("Enter number: ")

           return countPos(newNumber, counter)

       else:

           newNumber = input("Enter number: ")

           return countPos(newNumber, counter)

   except:

       print(counter)

       print("Program Finished")

countPos()

8 0
3 years ago
Plz Help!! How should I answer the second question?
Harman [31]

Answer:

Just keep doing what you were doing explain what you would be doing in the future or where you see yourself in like 5 years and put details and things that make since to you!

4 0
3 years ago
Whats the name of the windows 10 nucleus
stepan [7]

Answer:

motheboard

Explanation:

7 0
3 years ago
I'm learning how to use Python in JES (Jython). i just need to know 1) how to do a robust copyIn and 2) how to call functions fr
BartSMP [9]

well make sure you access your files and make sure they are easily attainable.

4 0
3 years ago
____ hack systems to conduct terrorist activities through network or Internet pathways
Advocard [28]

Answer:

Cyberterrorists

Explanation:

Cyberterrorists -

These are the people who illegally , without any authentication , are able access some other person's personal system or internet server , are referred to as cyber terrorists.  

Internet service is used in this process , which can lead to loss of life , harm , threat or some illegal practice.  

Hence, from the statement of the question,  

The correct term is cyberterrorists.

6 0
4 years ago
Other questions:
  • Following a company on likedin is most similar to
    8·1 answer
  • The logical view Select one: a. shows how data are organized and structured on the storage media. b. presents an entry screen to
    7·1 answer
  • A disadvantage of creating a website with tables, without CSS is
    15·2 answers
  • ____ refers to data, applications, and even resources stored on computers accessed over the Internet. Answer
    5·1 answer
  • A coworker asks your opinion about how to minimize ActiveX attacks while she browses the Internet using Internet Explorer. The c
    14·1 answer
  • __________________ ensures that each row is uniquely identified by the primary key, which means that a proper search for an exis
    10·1 answer
  • Please debug the below code in Java please.
    15·1 answer
  • Science can give us
    5·2 answers
  • PLEASE HELP!! Computer science test
    11·1 answer
  • 12. Your project specifications call for a business rule that the database design can't
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!