1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VikaD [51]
3 years ago
10

Which of the following statement is correct? Select one: a. Base register holds the size of a process. b. Limit register holds t

he size of a process. c. Base and limit registers can be loaded by the standard load instructions in the instruction set. d. Any attempt by a user program to access memory at an address higher than the base register value results in a trap to the operating system.
Computers and Technology
1 answer:
Valentin [98]3 years ago
4 0

Answer:

b. Limit register holds the size of a process.

Explanation:

A limit register is a form of registers used in memory management background that contains logical addresses. It is utilized to determines the size of the psychical memory range for a process. It can only be loaded only by the operating system, through a unique specific instruction.

Hence, in this case, the right answer is option B

Option A is not correct because the Base register specifies where the page table begins in memory

Option C is not correct because Base and limit registers can be only be loaded through the operating system

Option D is also not correct.

You might be interested in
State reasons why new version of application packages are released often?​
Jlenok [28]

- To add new features

- To fix bugs

- To combat security vulnerabilities

- To keep customers engaged by showing the application is still maintained

7 0
3 years ago
Read 2 more answers
How do i put pics on this app ​
natka813 [3]
It says insert image I think. Or there’s a button that looks like a picture
6 0
4 years ago
8.Which of the following IC was used in third generation of computers?Immersive Reader
bezimeni [28]

Answer:

LSI

Explanation:

LSI ( IC ) was used in third generation of computer.

4 0
3 years ago
One emerging type of trojan horse is called a ____-access trojan.
Sliva [168]
<span>One emerging type of Trojan horse is called a remote-access Trojan (RAT).
</span> RAT is a malware program.  With this Trojan horse an intruder is given administrative control over a target computer. The RAT controls the system via a remote network connection as if by physical access. It is typically installed<span> invisibly with a user-requested program.</span>
3 0
4 years ago
Choose the answer that best completes the statement.
Anestetic [448]
1. A - everything starts there
2. D - always
3. C - true
4 0
3 years ago
Read 2 more answers
Other questions:
  • Branching is so called because <br>​
    5·2 answers
  • What is an efficiency target? Give an example of setting an efficiency target
    11·1 answer
  • You want to centrally back up the files users store in the Documents folder in their user profiles, but you don’t want users to
    7·1 answer
  • Host A is a PC, connected to switch SW1 and assigned to VLAN 1. Which of the following are typically assigned an IP address in t
    13·1 answer
  • Give the Division Hashing function and the index it maps the key 2000 into, assuming a primary storage area array size of 61 ele
    6·1 answer
  • Raul converts numbers in base 10 to base 2. Which answer best defends why Raul would need to do this?
    12·1 answer
  • python An instance variable named counter of type int An instance variable named limit of type int. A constructor that takes two
    15·1 answer
  • Type the correct answer in the box. Spell all words correctly.
    7·2 answers
  • JAVA
    10·1 answer
  • Consider the following code segment. How many unique new (do not count the starting process) processes are created? (you may wan
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!