Protection boundary??
Answer / guest
A protection boundary protects one software subsystem on a
computer from another, in such a way that only data that is
explicitly shared across such a boundary is accessible to
the entities on both sides. In general, all code within a
protection boundary will have access to all data within
that boundary.
The canonical example of a protection boundary on most
modern systems is that between processes and the kernel.
The kernel is protected from processes, so that they can
only examine or change its internal state in certain
strictly-defined ways.
Protection boundaries also exist between individual
processes on most modern systems. This prevents one buggy
or malicious process from wreaking havoc on others.
| Is This Answer Correct ? | 2 Yes | 0 No |
Explain what is scheduling?
HOW can I work UNIX commands on Windows XP without installing UNIX O/S in PC
What is the working set of a process?
Explain what are the main families of threads?
List the system calls used for process management?
Explain what is protection boundary?
What are the different kinds of threads?
3 Answers Ericsson, Fashion Technology,
Explain how to work unix commands on windows xp without installing unix o/s in pc?
Explain what is critical section?
If your server is running on Unix and one of the sessions are keep on running without loading any data. how would you kill it?
Explain critical section?
What is Critical section?