Answer:
ad-hoc network
Explanation:
Ad-hoc network is a type of network that is setup to allow computers to talk to each other without the use of a router or server. The computers communicate directly with each other. In windows operating system ad-hoc is implemented as a communication mode which can be turned on.
Answer: ??
Explanation: explain to her that you don't have your own. keep asking and convince her you're doing good in school, (if u are) and that you listen and you should be responsible to have your own
Answer:
Interrupt (INT) helps operating system to stop work on one process and start work on other process using interrupt signals.
Explanation:
Purpose of interrupts:
• Interrupts are useful when an I/O device needs to be serviced only occasionally at low data transfer rate.
• For example, when a peripheral requires the attention of the processor to perform an I/ O operation.
A trap:
• also known as an exception or a fault, is typically a type of synchronous interrupt caused by an exceptional condition
• is a software-generated interrupt.
• For example it's caused by division by zero or invalid memory access.
Can traps be generated intentionally by a user program? Yes.
If so, for what purpose?
• the usual way to invoke a kernel routine (a system call) because those run with a higher priority than user code.
• Handling is synchronous, so the user code is suspended and continues afterwards.
• In a sense they are active - most of the time, the code expects the trap.
Answer:
And clicking the security tab option.
Explanation:
Lets explain what an object's ACL is. I will use an example to best explain this. Let's suppose that user Bob would want to access a folder in a Windows environment. What supposedly will happen is that Windows will need to determine whether Bob has rights to access the folder or not. In order to do this, an ACE with the security identity of John will be created. These ACEs are the ones that grant John access to the folder and the ACLs of this particular folder that John is trying to access is a list of permissions of everyone who is allowed to access this folder. What this folder will do is the to compare the security identity of John with the folders ACL and determine whether John has Full control of the folder or not.
By right clicking the folder and selecting the security tab, John will be in a position to see a list of the permissions (ACLs) granted to him by the folder.
Answer:
Click at the pic above and the ans will appear.
Hope it helps :)