subject

Consider a system which uses a ring-based access control mechanism with 9 rings (from 0 to 8). Consider two procedures running in this system p1 and p2. Procedure p1 is executing and needs to invoke procedure p2. Procedure p2’s bracket is (3,5,6). Procedure p2’s ACL gives p1 full (read, write, append, and execute) rights to p2. In which ring(s) must p1 execute for the following to happen? p1 can invoke p2, but a ring-crossing fault occurs p1 can invoke p2 provided that a valid gate is used as an entry point p1 cannot invoke p2 p1 can invoke p2 without any ring-crossing fault occurring, but not necessary through a valid gate.

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 14:00
Mr. johnson creates a game in which the players see the world from their avatar’s perspective. what genre of game is this?
Answers: 2
question
Computers and Technology, 21.06.2019 23:30
You picked the corridor which led you here. if the guards find you, they're going to be really angry! what is the synonym of angry
Answers: 1
question
Computers and Technology, 23.06.2019 01:10
Problem 1 - hashing we would like to use initials to locate an individual. for instance, mel should locate the person mark e. lehr. note: this is all upper case. generate a hash function for the above using the numbers on your telephone. you know, each letter has a number associated with it, so examine your telephone keypad. generate 512 random 3 letter initials and take statistics on a linked list array size 512 to hold this information report how many have no elements, 1 element, 2 elements, does this agree with the hashing statistics distribution?
Answers: 1
question
Computers and Technology, 23.06.2019 03:10
Acomputer has a two-level cache. suppose that 60% of the memory references hit on the first level cache, 35% hit on the second level, and 5% miss. the access times are 5 nsec, 15 nsec, and 60 nsec, respectively, where the times for the level 2 cache and memory start counting at the moment it is known that they are needed (e.g., a level 2 cache access does not even start until the level 1 cache miss occurs). what is the average access time?
Answers: 1
You know the right answer?
Consider a system which uses a ring-based access control mechanism with 9 rings (from 0 to 8). Consi...
Questions
question
Mathematics, 01.09.2020 05:01
question
Mathematics, 01.09.2020 05:01
question
Chemistry, 01.09.2020 05:01
question
Mathematics, 01.09.2020 05:01
question
Mathematics, 01.09.2020 05:01
question
Mathematics, 01.09.2020 05:01
question
Mathematics, 01.09.2020 05:01
Questions on the website: 13722367