Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Ch.14 flash cards | C S 3113 - Introduction to Operating Systems, Quizzes of Computer Science

Flash cards for Ch. 14 Class: C S 3113 - Introduction to Operating Systems; Subject: COMPUTER SCIENCE; University: University of Oklahoma; Term: Fall 2009;

Typology: Quizzes

Pre 2010

Uploaded on 12/06/2009

ebranecky
ebranecky 🇺🇸

16 documents

1 / 5

Toggle sidebar

Related documents


Partial preview of the text

Download Ch.14 flash cards | C S 3113 - Introduction to Operating Systems and more Quizzes Computer Science in PDF only on Docsity! TERM 1 Principles of Protection DEFINITION 1 dictates that programs, users, and even systems be given just enough privileges to perform their tasks. TERM 2 neet-to-know principle DEFINITION 2 process should be allowed to access only those resources for which it authorization. Furthermore, at any time, a process should be able to access only those resources that it currently requires to complete its task. TERM 3 protection domain DEFINITION 3 specifies the resources that the process may access. TERM 4 access right DEFINITION 4 ability to execute an operation on an object TERM 5 static association DEFINITION 5 set of resources available to the process is fixed throughout the process's lifetime! use need-to-know principle for static association TERM 6 dynamic association DEFINITION 6 set of resources available to the process is not fixed throughout the process's lifetime! mechanism is available to allow domain switching, enabling the process to sV'..ritch from one domain. to another. TERM 7 1st way a domain can be realized DEFINITION 7 Each user may be a domain. In this case, the set of objects that can be accessed depends on the identity of the user. Domain switching occurs when the user is changed-generally when one user logs out and another user logs in. TERM 8 2nd way a domain can be realized DEFINITION 8 Each process may be a domain. In this case, the set of objects that can be accessed depends on the identity of the process. Domain switching occurs when one process sends a message to another process and then waits for a response. TERM 9 3rd way a domain can be realized DEFINITION 9 Each procedure may be a domain. In this case, the set of objects that can be accessed corresponds to the local variables defined within. the procedure. Domain switching occurs when a procedure call is made. TERM 10 monitor-user mode model DEFINITION 10 When a process executes in monitor mode, it can execute privileged instructions and thus gain complete control of the computer system. In contrast, when a process executes in user mode, it can invoke only non-privileged instructions. Consequently, it can execute only within its predefined memory space.
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved