Question

What are three ways that multi-user operating systems provide protected environments?

What are three ways that multi-user operating systems provide protected environments?

Homework Answers

Answer #1

Three ways that multi user OS provide protected environments are

  • Through Account Seperation : This means that the different users accessing the system have their own accounts and with that comes their own storage space isolated from one other which prevents accidently deleting other person's work.
  • By Assigning Roles and Permissions : Each user accessing the system will be given a defined set of permissions within which only he can do the work.
  • Protecting each persons work with the use of a secure encryption which is unique to the particular user.Accidently or purposefully if some one tries to access the work of others then that user must be authenticated to access the particular resource.
Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Which of the following statements is incorrect? Operating systems must provide both protection and security. Operating...
Which of the following statements is incorrect? Operating systems must provide both protection and security. Operating systems provide both command line as well as graphical user interfaces. An operating system manages system resources. An operating system provides an environment for the execution of programs.
What can a financial statement user learn from analyzing the operating statement? Will this provide all...
What can a financial statement user learn from analyzing the operating statement? Will this provide all the information necessary to understand the organization’s cash positions?
OPERATING SYSTEMS: Which of the methods used to map user threads to kernel threads can exploit...
OPERATING SYSTEMS: Which of the methods used to map user threads to kernel threads can exploit a multiprocessor environment? Justify your answer.
Please provide me with the advantages of a three phase systems over other polyphase systems (NOT...
Please provide me with the advantages of a three phase systems over other polyphase systems (NOT single phase systems). Please provide me with clear points that have proper emphasis on each point, and make sure the answer is professional.
In what ways could an understanding of systems theory and complexity science impact the role of...
In what ways could an understanding of systems theory and complexity science impact the role of the NP? Take a few minutes to reflect on the NP practice model that is most predominant in advanced practice environments you have observed. Are you satisfied with the demonstrated level of interprofessional collaboration? Briefly consider what appears to be the driving practice model for advanced practice nursing in your state. If your state lags behind in its practice model language, what might you...
What are three ways companies can target individuals to opt in for coupons? Provide an example...
What are three ways companies can target individuals to opt in for coupons? Provide an example where you have been reached to opt in for mobile couponing. Please explain in detail. 300 words minimum.
Discuss the three ways in which educational systems perpetuate social inequality as suggested by conflict theorists....
Discuss the three ways in which educational systems perpetuate social inequality as suggested by conflict theorists. Explain the functionalist and conflict theorist view about education as an institution in the United States.
Operating systems have to balance the conflicting goals of convenient resource sharing and protection against unauthorized...
Operating systems have to balance the conflicting goals of convenient resource sharing and protection against unauthorized resource access. Windows offers a variety of mechanisms such as user and group permissions, shares, and access control lists with inheritance. Linux has a much simpler implementation of users and groups. What do you see as the ideal balance between sharing, protection, and complexity? Can you provide an instance that comes close to your ideal? Explain.
what are specific examples of ways administrators might apply systems theory to their work?
what are specific examples of ways administrators might apply systems theory to their work?
A user logs on to a laptop and opens her email. What device will provide emails...
A user logs on to a laptop and opens her email. What device will provide emails to the laptop?