Question
a.
Every word of machine memory has one or more extra bits
b.
Extra bits are used to do padding
c.
Extra bits are not used to identify rights to that word
d.
It is very compatible to code upgrades
Posted under Operating System
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. What is true regarding tagged architecture ?
Similar Questions
Discover Related MCQs
Q. What is best solution to have effect of unbounded number if base/bound registers?
View solution
Q. What is major feature of segmentation ?
View solution
Q. What is correct way the segmentation program address is stored ?
View solution
Q. What is main objective of protection ?
View solution
Q. What is principle of least privilege ?
View solution
Q. What is need of protection ?
View solution
Q. What is incorrect methods of revocation of access rights ?
View solution
Q. Why is it difficult to revoke capabilities ?
View solution
Q. What is reaquisition scheme to revoke capability ?
View solution
Q. What is false regarding Back-Pointers scheme to revoke capability ?
View solution
Q. What is true about Indirection to revoke capability ?
View solution
Q. How can Keys be defined or replaced ?
View solution
Q. What are characteristics of Hydra system ?
View solution
Q. What are characteristics of rights amplification in Hydra ?
View solution
Q. What is the problem of mutually suspicious subsystem ?
View solution
Q. What are characteristics of Cambridge CAP system as compared to Hydra system ?
View solution
Q. What are two capabilities defined in CAP system ?
View solution
Q. Trojan-Horse programs
View solution
Q. Link encryption
View solution
Q. The most common security failure is
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Operating System? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!
Software Engineering
Learn about the systematic approach to developing software with our Software...
Cyber Security
Understand the fundamentals of safeguarding digital assets with our Cyber Security...