1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
viva [34]
3 years ago
9

In a multiprogramming and time-sharing environment, several users share the system simultaneously. This situation can result in

various security problems.
a) What are two such problems?
1. One user can read the private data of another user - privacy.
2. One user can corrupt the private data of another user - integrity.
3. One user can prevent another user from getting anything done - denail of service.
b) Can we ensure the same degree of security in a time-shared machine as we have in a dedicated machine? Explain your answer.
There are two answers, either one correct.
a. Yes - if we can ensure that the operating system prevents any sharing of data between users, either for reading or writing, and fairly shares the computer, then we can achieve the same level of security.
b. No - we can never be sure that our software doesn't have bugs, so we can never be sure that we prevent all sharing of data and fairly allocate computer resources.
Computers and Technology
1 answer:
kap26 [50]3 years ago
7 0

<u>Explanation:</u>

a.

  • One user can read the private data of another user-privacy.
  • One user can prevent another user from getting anything done-denial of service.

Indeed, in any multiprogramming and time-sharing environment since the computers of users are networked together, then it is very possible for a bad actor to read the private data of another user, or even prevent another user from accessing their computer by employing a denial of service attack on the network. In other words, the network would be unable to handle the request of users since has been overloaded by another user.

b. a. Yes - if we can ensure that the operating system prevents any sharing of data between users, either for reading or writing and fairly shares the computer, then we can achieve the same level of security.

You might be interested in
When a customer makes an online hotel booking the database is updated by using
Valentin [98]
I think it’s a form,if wrong please don’t be mad
4 0
3 years ago
Read 2 more answers
The period of time during which an IDPS monitors network traffic to observe what constitutes normal network behavior is referred
horrorfan [7]

Answer: Training period

Explanation:

The training period is refers to the period of time where we can monitor all the network traffic and also observe all the networking behavior with the constitute.

  • During the training period we get a proper training about the specific topic and also get a chance to learn various types of things.

 According to the given question, in the training period an IDPS monitor is used observing the networking traffic and the network behavior. Therefore, raining period is the correct answer.

 Therefore, Training period is the correct answer.

5 0
3 years ago
What mistake do you think you might make related to changing the data in a cell that's used in a formula?
Virty [35]

Answer

Hi,

The mistake could be the #DIV/0! error , or a #REF! error

Explanation

When changing the data in a cell that’s used in a formula, a #DIV/0! Error can occur when the formula attempts to divide a number by 0 or an empty cell. To rectify this, you will need to change the value of that cell to a value not equal to 0. In some cases, the #REF! error could be displayed. This means that the formula refers to a cell that is not valid.

Hope this Helps!

4 0
3 years ago
Allows the Content-Aware Move tool to sample the entire document as viewed, rather than only sampling the selected layer.
Shalnov [3]

simply all layers hope i was helpful xD

3 0
3 years ago
assume a five-stage single-pipeline microarchitecture (fetch, decode, execute, memory, write- back) and the code given below. al
spin [16.1K]

Answer:

Hello the loop required for your question is missing below is the loop

Loop: lw x1,0(x2)

     addi x1,x1, 1

     sw x1,0(x2)

     addi x2,x2,4

     sub x4,x3,x2

 bnz x4,Loop

answer : attached below

Explanation:

<u>Show the phases of each instruction per clock cycle for one iteration of the loop </u>

                                                               loop length

       loop                                            

     lw x1,0(x2)

 addi x1,x1, 1 values attached below

     sw x1,0(x2)

     addi x2,x2,4

     sub x4,x3,x2

     bnz x4,Loop

Attached below are the phases of each instruction per clock cycle for one iteration of the loop

4 0
3 years ago
Other questions:
  • With ____ editing, Word automatically displays a Paste Options button near the pasted or moved text.
    14·1 answer
  • Suppose that a machine with a 5-stage pipeline uses branch prediction. 15% of the instructions for a given test program are bran
    13·1 answer
  • A low concentration of market power has positive affects. A low concentration of market share has which of the following effects
    7·1 answer
  • A company uses the account code 669 for maintenance expense. However, one of the company's clerks often codes maintenance expens
    15·1 answer
  • Dylan, an interior designer, has sketched out a layout for a client's living room. He wants the client's approval of the layout
    11·2 answers
  • Sonic the Hedgehog (1991)
    14·1 answer
  • Create an application named Percentages whose main() method holds two double variables. Assign values to the variables. Pass bot
    14·1 answer
  • Savings accounts usually offer _________ interest rates than checking accounts. It is _________ to access your money in a saving
    10·2 answers
  • What technology would a bank's website use a scramble information as it is transmitted over the Internet
    7·1 answer
  • What’s the name of the technology that lets ryzen™ 5 series cpus access the entire gddr memory of radeon™ rx gpus?.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!