subject

Consider a system which uses a ring-based access control mechanism with 9 rings (from 0 to 8). Consider two procedures running in this system p1 and p2. Procedure p1 is executing and needs to invoke procedure p2. Procedure p2’s bracket is (3,5,6). Procedure p2’s ACL gives p1 full (read, write, append, and execute) rights to p2. In which ring(s) must p1 execute for the following to happen? p1 can invoke p2, but a ring-crossing fault occurs p1 can invoke p2 provided that a valid gate is used as an entry point p1 cannot invoke p2 p1 can invoke p2 without any ring-crossing fault occurring, but not necessary through a valid gate.

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 19:00
In he example code, what does the title attribute create? a tool tip an element a source a markup
Answers: 1
question
Computers and Technology, 22.06.2019 23:30
For her science class, elaine is creating a presentation on weather in the united states. she wants to make the presentation beautiful and interesting by drawing simple cloud or wave shapes. which is the best way for elaine to draw these shapes?
Answers: 1
question
Computers and Technology, 23.06.2019 05:20
Which operating system is a version of linux?
Answers: 1
question
Computers and Technology, 23.06.2019 09:30
The place where the extended axis of the earth would touch the celestial sphere is called the celestial
Answers: 1
You know the right answer?
Consider a system which uses a ring-based access control mechanism with 9 rings (from 0 to 8). Consi...
Questions
question
Geography, 12.02.2021 21:30
question
Computers and Technology, 12.02.2021 21:30
question
Mathematics, 12.02.2021 21:30
question
Mathematics, 12.02.2021 21:30
question
Mathematics, 12.02.2021 21:30
Questions on the website: 13722363