1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
viva [34]
3 years ago
9

In a multiprogramming and time-sharing environment, several users share the system simultaneously. This situation can result in

various security problems.
a) What are two such problems?
1. One user can read the private data of another user - privacy.
2. One user can corrupt the private data of another user - integrity.
3. One user can prevent another user from getting anything done - denail of service.
b) Can we ensure the same degree of security in a time-shared machine as we have in a dedicated machine? Explain your answer.
There are two answers, either one correct.
a. Yes - if we can ensure that the operating system prevents any sharing of data between users, either for reading or writing, and fairly shares the computer, then we can achieve the same level of security.
b. No - we can never be sure that our software doesn't have bugs, so we can never be sure that we prevent all sharing of data and fairly allocate computer resources.
Computers and Technology
1 answer:
kap26 [50]3 years ago
7 0

<u>Explanation:</u>

a.

  • One user can read the private data of another user-privacy.
  • One user can prevent another user from getting anything done-denial of service.

Indeed, in any multiprogramming and time-sharing environment since the computers of users are networked together, then it is very possible for a bad actor to read the private data of another user, or even prevent another user from accessing their computer by employing a denial of service attack on the network. In other words, the network would be unable to handle the request of users since has been overloaded by another user.

b. a. Yes - if we can ensure that the operating system prevents any sharing of data between users, either for reading or writing and fairly shares the computer, then we can achieve the same level of security.

You might be interested in
What skills do you need to be a marketing manager
faust18 [17]

Answer:

Good teamwork skills.

Communication skills and networking ability.

Adaptability.

Strong attention to detail.

Good organisation and planning skills.

Creativity and writing skills.

Commercial awareness.

Numerical skills.

7 0
3 years ago
Read 2 more answers
Which type of software is primarily used to organize a collection of information for easy access?Which type of software is prima
MaRussiya [10]

Answer:

database - you could also use a spreadsheet but you can't ask questions that you can with a database

Explanation:

8 0
4 years ago
Which of the following general classes of computers designed for medical, engineering, or animation and graphics design uses are
jasenka [17]

Servers is the general classes of computers designed for medical, engineering, or animation and graphics design uses are optimized for visualization and rendering of three-dimensional models, and typically have fast processors, large memory, and advanced video cards.

D) servers

<u>Explanation:</u>

Better to use servers, where it can handle multiple tasks since it has enough multiple microprocessors.

Normal PC memory is little slow then server memory.  In case slow processing the graphics or animation end user can include memory cards in servers.  Good advanced video graphics card be insert to the server slot for better performance. Good advance video graphics has also extra memory to process the graphics animation.

Normally personal computers also be achieved but it has own limitation.  Simple animation can be achieved by personal computers.

7 0
4 years ago
If a user has one column in a table and would like to make it into two columns, which command should be used?
8090 [49]

Answer:

Split Cells

Explanation:

7 0
3 years ago
While their rational of a drug user's mind knows that they shouldn't use it again, another part of the brain overrides such warn
Levart [38]
I'm unsure in What it is you're asking.

While their rational of a drug user's mind???
this alone makes no direct sense.

also I'm unsure what Computers and Technology have to do with drug user's or their brains.

I can leave you with this a drug addict is and addict hence the name it's an addiction so there is no rationality or distinctiveness in knowing not to use again until one truly wants to get help and change for the better of self.

hope this helps
4 0
3 years ago
Other questions:
  • Which of the following techniques has to do with how the people who make the commercial manipulate the way it looks?
    8·1 answer
  • As a trainer for Exempla Healthcare, Tina is faced with many challenges to properly training her new hires. There are over 40 di
    15·1 answer
  • Someone please help me with the right answer please
    13·1 answer
  • An attacker captures an encrypted message. he tries decrypting with every possible key until the decryption process reveals a se
    14·1 answer
  • A web designer calls to report that the web server web-s1.cisco is not reachable through a web browser. The technician uses comm
    6·1 answer
  • SONET: is a standard for optical transmission that currently operates at Terabit per second speeds is almost identical to the IT
    7·1 answer
  • From the set ( 5 , 7 , 9 , 11 , 13 make the inequality w - 4 &lt; 8 true
    12·1 answer
  • How can I get more views on my you tube channel "Braeden Eischen" without paying anything
    5·1 answer
  • State differences between title bar and menu bar​
    5·1 answer
  • REOLVER EL SIGUIENTE PROBLEMA: R1=1.7K, R2=33K R3=4.7K R4=5.9K R5=17K IT=20mA CALCULAR: VT, I1, I2, I3, I4, I5 Y RT
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!