1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VikaD [51]
3 years ago
10

Which of the following statement is correct? Select one: a. Base register holds the size of a process. b. Limit register holds t

he size of a process. c. Base and limit registers can be loaded by the standard load instructions in the instruction set. d. Any attempt by a user program to access memory at an address higher than the base register value results in a trap to the operating system.
Computers and Technology
1 answer:
Valentin [98]3 years ago
4 0

Answer:

b. Limit register holds the size of a process.

Explanation:

A limit register is a form of registers used in memory management background that contains logical addresses. It is utilized to determines the size of the psychical memory range for a process. It can only be loaded only by the operating system, through a unique specific instruction.

Hence, in this case, the right answer is option B

Option A is not correct because the Base register specifies where the page table begins in memory

Option C is not correct because Base and limit registers can be only be loaded through the operating system

Option D is also not correct.

You might be interested in
Choose all items that represent HTML characteristics.
hram777 [196]

Answer:

A,C,D,E are the answers at least on the test i took

Explanation:

3 0
4 years ago
Read 2 more answers
Microsoft <br> Excel Module 6
Sonbull [250]

Answer:

what Is your question?

6 0
3 years ago
Describe a situation in which you have experienced harm as a consequence of a failure of computer security. Was the failure mali
frutty [35]

Answer: The goals of computer security are to protect computers and users from data theft or loss as well as damage to any part of the computer.

Explanation: Common means of achieving computer security are firewalls, anti-virus software and this can fail due to hardware problems  or   weaknesses that prevent malicious attacks.

To answer this question, think of a time when you experienced any one of these. For example, personally, I was once an unfortunate victim of a general malicious attack that took advantage of a weakness in my anti-virus software. After clicking on a link on a dodgy website, a virus was installed on my computer. My computer finally crashed, without any hope of restarting it. I lost all my data and I had to buy a new computer.  This was a malicious attack.

However, sometimes people can be specifically targeted to steal their data or monitor their activities.  

7 0
3 years ago
When code is compiled it
lesantik [10]

Answer:

A compiler takes the program code (source code) and converts the source code to a machine language module (called an object file). Another specialized program, called a linker, combines this object file with other previously compiled object files (in particular run-time modules) to create an executable file. In short, it's A or D.

5 0
3 years ago
Read 2 more answers
The Operating System provides utility software designed to perform specific tasks. What task(s) does it perform? Select all that
viktelen [127]

Answer:

All of the above.

Explanation:

An operating system is a system software pre-installed on a computing device to manage or control software application, computer hardware and user processes.

This ultimately implies that, an operating system acts as an interface or intermediary between the computer end user and the hardware portion of the computer system (computer hardware) in the processing and execution of instructions.

Some examples of an operating system on computers are QNX, Linux, OpenVMS, MacOS, Microsoft windows, IBM, Solaris, VM etc.

Hence, the operating system (OS) provides utility software designed to perform specific tasks. Some of the tasks it performs are;

A. Establishing an Internet connection.

B. Coordinating tasks between programs.

C. Configuring peripheral devices.

D. Monitoring security.

7 0
3 years ago
Other questions:
  • What attack cracks a password or encryption key by trying all possible valid combinations from a defined set of possibilities (a
    12·1 answer
  • For what type of document would you use the landscape page orientation
    11·1 answer
  • A program is run line by line to determine the source of a logic error. Which best describes the specific tool being used?
    11·2 answers
  • An organization is developing an authentication service for use at the entry and exit ports of country borders. The service will
    10·1 answer
  • HELP PLS QUICK TRUE OR FALSE QUESTION
    7·2 answers
  • Consider this binary search tree:______.
    12·1 answer
  • When LDAP traffic is made secure by using Secure Sockets Layer (SSL) or Transport Layer Security (TLS), what is this process cal
    9·1 answer
  • You're doing desktop support and the company policy is that you can only help with company equipment. A user walks in:
    6·1 answer
  • What are the features of the title bar for the Microsoft word application?​
    15·2 answers
  • As a technical support rep, michael is responding to a customer's question sent to him via e-mail. what should michael's first t
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!