answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
liq [111]
1 year ago
5

Some early computers protected the operating system by placing it in a memory partition that could not be modified by either the

user job or the operating system itself. Describe two difficulties that you think could arise with such a scheme.
Computers and Technology
1 answer:
Sav [38]1 year ago
5 0

Answer:

Check the explanation

Explanation:

1. Such operating systems cannot be modified and updating such OS (operating systems) would be almost impossible. This can prove fatal if we detect some serious bug, since there is no way to correct it.

2. The entire password and other credentials of users must be kept in an unsecure and vulnerable memory, since we can’t store it in the protected memory.

You might be interested in
Write a program to read-in a sequence of integers from the keyboard using scanf(). Your program will determine (a) the largest i
Natali [406]
It’s not letting me answer it
3 0
1 year ago
4.17 LAB: Data File A comma separated value (.csv) file has been included to be used for this program. Each line contains two va
Andrej [43]

Answer:

import csv

def Csvreader(filename):

   with open("filename", "r") as file:

   content = file.csv_reader()

   list_content = list(content)

   file.close

   return list_content

Explanation:

This is a python description of the function that reads the csv file and converts it to a list, from the list, each item can accessed with its index and updated directly. Use this to draw the same conclusion for a java program.

7 0
1 year ago
Which type of address is used at the transport layer to identify the receiving application?
monitta

Answer:

Port number  is used at the transport layer to identify the receiving application

Explanation:

Transport layer is responsible for overall “end-to-end” communication. It provides communication service to the application process which might be running on “different hosts”.

TCP (Transmission Control Protocol) or UDP (User Data Protocol) is the protocol used in the Transport layer. The port number is essential so that the transport layer can carry packets to the right destination pointing to the right application.

A port number usually contains 16 bit integer. Normally this number will send along with the header. Port number plays a major role in Transport layer.

5 0
1 year ago
Jannette has been experiencing slow performance on her computer. Today she received an error message saying that an update to he
Marysya12 [62]

Answer: ur never going to get your answer!!!!

ExpElanation: hahahahaha ( pls 5 star pls pls. Shhhh)

3 0
2 years ago
Read 2 more answers
Recall that TCP can be enhanced with SSL to provide process-to-process security services, including encryption. Does SSL operate
Irina-Kira [14]

Answer:

SSL has operate in Application Layer to encrypt the information from user and  pass it to the TCP. To enhance TCP security developer can integrate the code of SSL with application layer.

Explanation:

SSL certificate is used to enhance the security of user data and encrypt the information of passwords, data transfer and other information to make it secure. This certificate is  installed at application layer to make all the information secure and send it to the Transmission Control Protocol (TCP) to send it further. The TCP can be enhanced more by adding SSL code to the application Layer of the Network.

4 0
2 years ago
Other questions:
  • Match each function with its possible output.
    7·2 answers
  • Kleene star of {1} generates {1, 11, 111, 1111, 11111……}.<br> True<br> False
    12·1 answer
  • Modern operating systems decouple a process address space from the machine’s physical memory. List two advantages of this design
    15·1 answer
  • Program MATH_SCORES: Your math instructor gives three tests worth 50 points each. You can drop one of the test scores. The final
    7·1 answer
  • Q3** Write a query to create a new price list for books written by the same author. Allow the user to enter only the first 4 let
    15·1 answer
  • 3.14 LAB: Simple statistics for Python
    7·1 answer
  • ___________is used for drawing 3D objects in the field of Science and Engineering.
    12·2 answers
  • Define a method printAll() for class PetData that prints output as follows with inputs "Fluffy", 5, and 4444. Hint: Make use of
    13·1 answer
  • Quantum units of information deploy the properties of entanglement and ____ to offer exponentially greater computing power.
    9·1 answer
  • George has to present the goals of information management to his team member. What is a goal of information management? The goal
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!