1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
viva [34]
3 years ago
9

In a multiprogramming and time-sharing environment, several users share the system simultaneously. This situation can result in

various security problems.
a) What are two such problems?
1. One user can read the private data of another user - privacy.
2. One user can corrupt the private data of another user - integrity.
3. One user can prevent another user from getting anything done - denail of service.
b) Can we ensure the same degree of security in a time-shared machine as we have in a dedicated machine? Explain your answer.
There are two answers, either one correct.
a. Yes - if we can ensure that the operating system prevents any sharing of data between users, either for reading or writing, and fairly shares the computer, then we can achieve the same level of security.
b. No - we can never be sure that our software doesn't have bugs, so we can never be sure that we prevent all sharing of data and fairly allocate computer resources.
Computers and Technology
1 answer:
kap26 [50]3 years ago
7 0

<u>Explanation:</u>

a.

  • One user can read the private data of another user-privacy.
  • One user can prevent another user from getting anything done-denial of service.

Indeed, in any multiprogramming and time-sharing environment since the computers of users are networked together, then it is very possible for a bad actor to read the private data of another user, or even prevent another user from accessing their computer by employing a denial of service attack on the network. In other words, the network would be unable to handle the request of users since has been overloaded by another user.

b. a. Yes - if we can ensure that the operating system prevents any sharing of data between users, either for reading or writing and fairly shares the computer, then we can achieve the same level of security.

You might be interested in
Which cell formatting is most likely to use $?
TiliK225 [7]
Currency is the correct answer
4 0
3 years ago
Read 2 more answers
Why do you think that so many of these sources have similar names?
Anon25 [30]

Answer:

What sources? WILL ANSWER in comments

4 0
3 years ago
Computers that are close to one another are connected to form a LAN
Archy [21]

Explanation:

different computer are connected to a LAN by a cable and an interface card

6 0
3 years ago
What correlation is obtained when the pearson correlation is computed for data that have been converted to ranks?
professor190 [17]

The correlation that is obtained when the pearson correlation is computed for data that have been converted to ranks is option A) The Spearman correlation.

<h3>What is Spearman correlation used for?</h3>

Spearman's correlation is known to be one that tends to look into or measures the strength and way of monotonic relationship between two variables.

It is one that is a nonparametric measure that is often known to be rank correlation and it tends to examine  how well the association between two variables can be said to using a monotonic function.

Hence, The correlation that is obtained when the pearson correlation is computed for data that have been converted to ranks is option A) The Spearman correlation.

Learn more about correlation from

brainly.com/question/12479370

#SPJ4

See full question below

) What correlation is obtained when the Pearson correlation is computed for data that have been converted to ranks?

A) The Spearman correlation

B) The point-biserial correlation

C) The phi coefficient

D) It is still called a Pearson correlation

8 0
2 years ago
PLEASE HELP!!! Me turn this into a video &amp; add liana flores- raise the moon (instrumental) in the background for the music.
Marina CMI [18]

Answer:

Try going to your settings and allow output camera

Explanation:

5 0
2 years ago
Read 2 more answers
Other questions:
  • An automobile battery, when connected to a car radio, provides 12.5 V to the radio. When connected to a set of headlights, it pr
    11·1 answer
  • How Java provides protection through stack inspection approach ?
    7·1 answer
  • Which css property configures the capitalization of text?
    12·1 answer
  • Can I change my brainly username?
    9·2 answers
  • Jeffrey works with a huge database of spreadsheet records each day. To organize and identify these spreadsheets, he wants to ass
    7·2 answers
  • Energy is defined as stored energy
    13·2 answers
  • When planning the structure of a spreadsheet, columns are for _______ items and rows are for _______ items.
    5·2 answers
  • The repeated use of electronic communications, such as chat rooms and email, to seek out, harass, or frighten someone is called
    12·1 answer
  • A bastion host allows the firewall to connect to the internal network and the perimeter network.TrueFalse
    15·1 answer
  • A circle surrounding the earth at the equator would consist of ___________ “degrees” of angular measurement.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!