Question

Explain why the virtual memory implementation of hardware and OSes is also a security feature.

Explain why the virtual memory implementation of hardware and OSes is also a security feature.

Homework Answers

Answer #1

ANSWER;

In computers,we can implement virtual memory in both hardware and in software. Usually embeded systems needa strong security why becuase they handle lerge data and secure related transactions.Generally in standard virtual machine (VM) environment,root system’s I/O resources, like serial ports,USB etc., are organized as a generic pool, and these are generally assigned on a “as-needed” basis. But if we configure virtual memory implementation on hardware,those I/O resources are predefined by the topology to be in specific groupings by the administrator.Thus security exists while accessing those I/) resources.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Why main memory disk hierarchy is called virtual memory, what are the two motivations behind the...
Why main memory disk hierarchy is called virtual memory, what are the two motivations behind the development of virtual memory schemes and which one is still relevant
Briefly explain how free() determines the amount of memory to be freed from the heap. What...
Briefly explain how free() determines the amount of memory to be freed from the heap. What are the additional hardware capabilities necessary to support virtual memory?
Consider a virtual memory system that can address a total of 232 bytes. You have unlimited...
Consider a virtual memory system that can address a total of 232 bytes. You have unlimited hard drive space, but are limited to only 8 MB of physical memory. Assume that virtual and physical pages are each 4 KB in size. a. How many bits is the physical address? What is the maximum number of virtual pages in the system? How many physical pages are in the system? How many bits are the virtual and physical page numbers? Suppose that...
Cyber Security question: Describe one wireless vulnerability. Explain why this vulnerability exist. Also describe how its...
Cyber Security question: Describe one wireless vulnerability. Explain why this vulnerability exist. Also describe how its exploited and how to mitigate it.
1. The TLB holds Question 1 options: L1 Cache address Virtual memory address Data Location of...
1. The TLB holds Question 1 options: L1 Cache address Virtual memory address Data Location of logical addresses Question 2 (1 point) Content addressable memory Question 2 options: Is used in cache memory. Is broken into multiple sections. Is used in binary files. Is used in standard program execution. Question 3 (1 point) Thrashing is caused by Question 3 options: The usage of segmentation in memory organization. The usage of paging in memory organization. Pages being swapped back and forth...
Name three reasons businesses invest in computer hardware and explain why how it would impact the...
Name three reasons businesses invest in computer hardware and explain why how it would impact the business.
Programming Languages Explain why Java is a compilation implementation and not hybrid. Are there any hybrid...
Programming Languages Explain why Java is a compilation implementation and not hybrid. Are there any hybrid systems left? Explain how you arrived at your answer
Explain why the concept of working memory has been tied to the concept of intelligence
Explain why the concept of working memory has been tied to the concept of intelligence
You are to watch the Netflix documentary "The Mind Explained" episode "Memory". This episode is also...
You are to watch the Netflix documentary "The Mind Explained" episode "Memory". This episode is also on YouTube. You must watch the "Memory" episode and tell me 3 things you liked about it, why you liked it, and what was something new you learned?
Explain why this statement is true or false: The capital asset pricing model predicts that security...
Explain why this statement is true or false: The capital asset pricing model predicts that security with a beta less than zero will provide an expected return higher than the market portfolio return. Explain why this statement is true or false: According to CAPM, the price of a security will fall if its expected rate of return lies above the security market line.
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT