1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
viva [34]
3 years ago
9

In a multiprogramming and time-sharing environment, several users share the system simultaneously. This situation can result in

various security problems.
a) What are two such problems?
1. One user can read the private data of another user - privacy.
2. One user can corrupt the private data of another user - integrity.
3. One user can prevent another user from getting anything done - denail of service.
b) Can we ensure the same degree of security in a time-shared machine as we have in a dedicated machine? Explain your answer.
There are two answers, either one correct.
a. Yes - if we can ensure that the operating system prevents any sharing of data between users, either for reading or writing, and fairly shares the computer, then we can achieve the same level of security.
b. No - we can never be sure that our software doesn't have bugs, so we can never be sure that we prevent all sharing of data and fairly allocate computer resources.
Computers and Technology
1 answer:
kap26 [50]3 years ago
7 0

<u>Explanation:</u>

a.

  • One user can read the private data of another user-privacy.
  • One user can prevent another user from getting anything done-denial of service.

Indeed, in any multiprogramming and time-sharing environment since the computers of users are networked together, then it is very possible for a bad actor to read the private data of another user, or even prevent another user from accessing their computer by employing a denial of service attack on the network. In other words, the network would be unable to handle the request of users since has been overloaded by another user.

b. a. Yes - if we can ensure that the operating system prevents any sharing of data between users, either for reading or writing and fairly shares the computer, then we can achieve the same level of security.

You might be interested in
________ are viruses that masquerade as useful programs or files. hydras spyware programs worms adware programs trojan horses
Harrizon [31]
Trojan horse is the correct answer
5 0
3 years ago
I am trying to write a c++ program like the game typeracer. When the player starts the program he will be asked to write a sente
murzikaleks [220]
Http://www.cprogramming.com/tutorial/string.html

--------------------------------------------------------------------
6 0
3 years ago
Renter’s insurance is not necessary if you don’t have a lot of expensive things.
attashe74 [19]

Wrong, You should get renters insurance to insure your items that you do have or will recieve in the future are safe

7 0
3 years ago
Displays information a bout drivers, network connections, and other program-related details.
slava [35]

Answer:

library

Explanation:

hope you like it

6 0
3 years ago
1. What is the relationship between liquidity and the interest rates?
Alenkasestr [34]
Liquidity Effect. When the Fed pursues a tight monetary policy, it takes money out of the system by selling Treasury securities and raising the reserve requirement at banks. This raises interest rates because the demand for credit is so high that lenders price their loans higher to take advantage of the demand.
7 0
3 years ago
Other questions:
  • True or False, PDF documents have many benefits, but their main disadvantage is that the formatting of their text and graphic el
    15·1 answer
  • Why is it important to know who reviews the information posted on a Web site?​
    15·1 answer
  • Answer these two if u can❤️
    5·2 answers
  • Nina is trying to learn more about how computers work. She has repeatedly read that the motherboard is the "brain” of the comput
    7·2 answers
  • Name and describe the two (2) broad categories of files
    9·1 answer
  • Compare and contrast the role that business users play when software is developed using Waterfall and Agile software development
    10·1 answer
  • A descriptive study represents the highest level on the knowledge-level continuum.
    11·1 answer
  • You are driving on expressway with three lanes in your direction at a speed lower then
    8·2 answers
  • Why should running your unit test suites not take a long time?A. Unit tests aren't that important, so less time should be spent
    5·1 answer
  • We have studied machine cycle in class. Suppose that each of the four modules of machine cycle is taking 2 seconds. If there are
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!