1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
viva [34]
3 years ago
9

In a multiprogramming and time-sharing environment, several users share the system simultaneously. This situation can result in

various security problems.
a) What are two such problems?
1. One user can read the private data of another user - privacy.
2. One user can corrupt the private data of another user - integrity.
3. One user can prevent another user from getting anything done - denail of service.
b) Can we ensure the same degree of security in a time-shared machine as we have in a dedicated machine? Explain your answer.
There are two answers, either one correct.
a. Yes - if we can ensure that the operating system prevents any sharing of data between users, either for reading or writing, and fairly shares the computer, then we can achieve the same level of security.
b. No - we can never be sure that our software doesn't have bugs, so we can never be sure that we prevent all sharing of data and fairly allocate computer resources.
Computers and Technology
1 answer:
kap26 [50]3 years ago
7 0

<u>Explanation:</u>

a.

  • One user can read the private data of another user-privacy.
  • One user can prevent another user from getting anything done-denial of service.

Indeed, in any multiprogramming and time-sharing environment since the computers of users are networked together, then it is very possible for a bad actor to read the private data of another user, or even prevent another user from accessing their computer by employing a denial of service attack on the network. In other words, the network would be unable to handle the request of users since has been overloaded by another user.

b. a. Yes - if we can ensure that the operating system prevents any sharing of data between users, either for reading or writing and fairly shares the computer, then we can achieve the same level of security.

You might be interested in
You use the _____ sheet in the format cells dialog box to position data in a cell by centering it, for example.​
Oliga [24]
You use the Alignment sheet in the format cells dialog box to position data in a cell by centering it, for example. Generally along the middle branch is a line or centerline of the definite pipeline on a scale of whatever is indicated.
3 0
3 years ago
A lever has an effort arm that is 8 meters long and the residence (load) arm that is 1.5 meters long, how much effort is needed
andrew11 [14]

Answer:

1066.67 N

Explanation:

Given that two measurements of the arm and an input weight. To answer this problem,we need to balance the forces and use the lengths of the arms. 

Force × effort of arm distance= input weight × load distance

200 N * 8 m = x * 1.5 m

1600 = 1.5x

x = 1600/1.5

x = 1066.666 N

it takes 1066.67 N to lift the input weight

4 0
3 years ago
If a salesperson were trying to sell this cabin, which word would be best to use to make its size seem most positive?
TiliK225 [7]
cozy because it gives it more of a positive connotation
7 0
3 years ago
Read 2 more answers
The first step in creating photographs with good backgrounds is which of the following? Learning to see the background before ta
defon

Oh I got this! I'm a professional photographer! The answer is Leaning to se the background before taking the photograph.

Plz mark brainliest! So glad I could help, and Have an AWESOME day!!!

4 0
3 years ago
Read 2 more answers
Which pair of devices have the same input motion and different outputs?
allochka39001 [22]

Answer:

nutcracker and can opener

Explanation:

5 0
3 years ago
Other questions:
  • How can you make a circle in JavaScript? Thank you!
    9·1 answer
  • _____ are types of changes that occur when text has been omitted from a document and must be inserted later.
    8·2 answers
  • hello my friend is doing a give away at 100 followers would you follow him for a chance to win 2000 vbucks his name is ZoVa_Velo
    15·2 answers
  • If the predetermined overhead allocation rate is 245% of direct labor cost, and the Baking Department's direct labor cost for th
    13·1 answer
  • A _______ template is used to maintain consistency in terms of margins and page numbers .
    6·1 answer
  • Two threads try to acquire the same resource at the same time and both are blocked. Then, they continually change their states i
    14·1 answer
  • A row in a table _____? for computer class and i’m in the middle of a test!
    14·1 answer
  • In binary, the second digit from the right is multiplied by the first power of two, and the _____ digit from the right is multip
    10·2 answers
  • 2. Released in 1992, Street Fighter II, the revolutionary fighting game, was developed by which company?
    8·2 answers
  • 3. Special keys labelled Fl to F12.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!