Preview

Faith Integration

Satisfactory Essays
Open Document
Open Document
613 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Faith Integration
Homework I
1.6 How does the distinction between kernel mode and user mode function as a rudimentary form of protection (security) system?
It seems that any certain instruction(s) can be executed, only when the CPU is in kernel mode. At the same instance, the hardware devices could only be accessed, only when the program is executing in the kernel mode. There is a propensity that control over when interrupts could be enabled or disabled is also possible only when the CPU is in kernel mode. Therefore, the Computer Processing Unit (CPU) has very limited capability when executing in user mode. This in turn will enforce protection of critical resources.
1.8 Describe a mechanism for enforcing memory protection in order to prevent a program form modifying the memory associated with other programs?
The processor could keep track of what locations are associated with each process and limit access to locations that are outside of a program's extent. By using base and limits registers and by performing a check for every memory access, information regarding the extent of a program's memory could be maintained
1.9 What are the tradeoffs inherent in hand-held computer?
1. There will be limitation of size in memory; usually in megabytes as compared to gigabytes in computer systems. 2. The speed of the processor would be very much limited, due to lesser power ability. In fact, this suggests that the Operating System has to be designed for low power consumption. 3. Assuredly lack of physical space limits the input/output capability; input method are small screen based keyboard or hand-writing recognition while small display screen for output.
1.22 Describe the differences between symmetric and asymmetric multitude processing? Asymmetric multiprocessing - In asymmetric multiprocessing (ASMP), the operating system would typically sets aside at least one or several processors for its exclusive use, remainder of the processors would run user applications. As a result, the

You May Also Find These Documents Helpful

  • Good Essays

    Some OS routines directly support application programs as they run and thus must be resident. Other transient routines are stored on disk and read into memory only when needed. Fixed-length partitions can also be used to allocate the set amount of memory that a particular program needs to run. Under dynamic memory management, the transient area is treated as a pool of unstructured free space. When the system decides to load a particular program, a region of memory just sufficient to hold the program is allocated from the pool. Using segmentation, programs are divided into independently addressed segments and stored in noncontiguous memory. Paging breaks a program into fixed-length pages.…

    • 7085 Words
    • 29 Pages
    Good Essays
  • Satisfactory Essays

    SD1230 Lab 1

    • 239 Words
    • 2 Pages

    1. Why is virtual memory addresses used for applications? – So it can have its own address space on the memory.…

    • 239 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Is418 Project 1-2-3

    • 1343 Words
    • 6 Pages

    Unix security systems were designed into the architecture. Raw hardware devices are protected from direct access, and the file system has an inbuilt security system giving individual access to files on three levels, user only, group membership, and world access. Each category has read, executable and write flags that may be set in any combination. Kernel -or- System…

    • 1343 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    When processes running in Kernel mode encounter a problem and Windows must stop the system.…

    • 850 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 3 Os

    • 1341 Words
    • 6 Pages

    +Micro kernel: A microkernel architecture assigns only a few essential functions to the kernel, including address spaces, inter process communication (IPC), and basic scheduling. Other OS services are provided by processes, sometimes called servers, that run in user mode and are treated like any other application by the microkernel. This approach decouples kernel and server development. Servers may be customized to specific application or environment requirements. The microkernel approach simplifies implementation, provides flexibility, and is well suited to a distributed environment. In essence, a microkernel interacts with local and remote server processes in the same way, facilitating construction of distributed…

    • 1341 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Unit 1&2 Discussion

    • 379 Words
    • 2 Pages

    Access control is typically achieved by reserving a collection of bits within the general “Flag Register” to indicate the current “access control level”. Certain instructions are restricted so that they are only legal if the “access control level” is at least some minimum value; otherwise the instruction generates an “illegal operation” interrupt.…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Week 5 Pos 355

    • 2010 Words
    • 9 Pages

    Operating systems were not in existence before the 1960s. The definition of operating systems is a program designed to run other programs on the computer and is the most important program. In the past, computers were built to execute a series of single task similar to a calculator. In the 1960s came the MCP (Master Control Program) for the B5000 mainframe computer created by the company Burroughs/Unisys. The MCP was the first OS written exclusively in a high-level language. As the years progressed, OS giants were starting to form such as Windows, Linux, and Mac. In, this paper, these 3 tech OS giants will be examined thoroughly while covering memory management, process management, file management, and security.…

    • 2010 Words
    • 9 Pages
    Better Essays
  • Good Essays

    Protection is the next requirement to be satisfied. Protection deals with security against unwanted interference by other processes. Programs from other process should not be able to access memory locations in a process for reading or writing Purposes without permission. The processor must be able to abort such instructions at the point of execution.…

    • 573 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Hardening servers, desktops, laptops and mobile devices through their configuration by turning off unused services. Constraining remote access and other convenience features; setting administrator and user identities; defining execution policy for required applications.…

    • 746 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Integration of Faith

    • 340 Words
    • 2 Pages

    Joseph, Master Project Manager: A view of Biblical History as it applies to Project Management.…

    • 340 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Faith Integration

    • 952 Words
    • 4 Pages

    A main reason for the existence of the Christian college or university is to provide an educational environment that includes both academic subject matter and Christian knowledge. At Azusa Pacific University, the school emphasizes their motto “God First” in and out of the classroom. According to APU’s Mission Statement, APU is a “Christian community of disciples and scholars who seek to advance the work of God in the world through academic excellence in liberal arts and professional programs of higher education that encourage students to develop a Christian perspective of truth and life."…

    • 952 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Operating System security

    • 3500 Words
    • 14 Pages

    Operating System Security Abstract Information systems are now becoming the social infrastructure so it is necessary to improve the security level because of privacy and data theft. One of the important issues which have to concern in the security of cyberspace is the security of operating system. This paper helps us to know about the security of most commercial Operating system like UNIX and Microsoft windows which are widely using in whole world.…

    • 3500 Words
    • 14 Pages
    Best Essays
  • Better Essays

    Risc Sisc

    • 1304 Words
    • 6 Pages

    microprocessor architecture that utilizes a small, highlyoptimized set of instructions, rather than a more specialized…

    • 1304 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Operating System

    • 638 Words
    • 3 Pages

    The operating system of a large computer system has even more work to do. Such operating systems monitor different programs and users, making sure everything runs smoothly, without interference, despite the fact that numerous devices and programs are used simultaneously. An operating system also has a vital role to play in security. Its job includes preventing unauthorized users from accessing the computer system.…

    • 638 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Data Types

    • 951 Words
    • 4 Pages

    Two things generally a ect the advance of computer architectures: a better understanding of program execution, and new or better implementation technologies. It is therefore very important to understand the dynamics of program execution when considering the design of future-generation architectures. To date, most processors have either executed instructions sequentially, or have overlapped the execution of a few instructions from a sequential instruction stream (via pipelining). For such processors, the relevant…

    • 951 Words
    • 4 Pages
    Powerful Essays