What are two probable uses of these multiple modes, Operating System

Assignment Help:

Q. Several CPUs provide for more than two modes of operation. What are two probable uses of these multiple modes?

Answer: Although most systems merely distinguish between user and kernel modes some CPUs have supported multiple modes. Multiple modes could be utilized to provide a finer-grained security policy. For instance rather than distinguishing between just user and kernel mode you could distinguish among different types of user mode. Possibly users belonging to the same group could execute each other's code. The machine would depart into a specified mode when one of these users was running code. While the machine was in this mode a member of the group could run code belonging to anyone else in the group.

An additional possibility would be to provide different distinctions within kernel code. For instance a specific mode could allow USB device drivers to run. This would signify that USB devices could be serviced without having to switch to kernel mode thereby essentially allowing USB device drivers to run in a quasi-user/kernel mode.


Related Discussions:- What are two probable uses of these multiple modes

Operating system.., What is the use of FIFOs in client-server applications

What is the use of FIFOs in client-server applications

Explain the proper distribution of functionality and code, Explain the Prop...

Explain the Proper Distribution of Functionality and Code It is important to note that the bandwidth of the server operating system and server processor availability is fixed.

Write in brief on unix file structure, Write in brief on UNIX file structur...

Write in brief on UNIX file structure. UNIX considers every file to be a sequence of 8-bit bytes no interpretation of these bits is made by the operating system. This system pr

What is low-level formatting, What is low-level formatting? Before a di...

What is low-level formatting? Before a disk can kept data, it must be required into sectors that the disk controller can read and write. This procedure is called low-level form

How is the NTFS namespace planned, Q. How is the NTFS namespace planned? Ex...

Q. How is the NTFS namespace planned? Explain. Answer: The NTFS namespace is prearranged as a hierarchy of directories where every directory uses a B+ tree data structure to

What are the various disk-scheduling algorithms, What are the various disk-...

What are the various disk-scheduling algorithms? The several disk-scheduling algorithms are a. First Come First Served Scheduling b. Shortest Seek Time First Scheduling

Benefits and drawbacks of batch system, Q. Benefits and Drawbacks of Batch ...

Q. Benefits and Drawbacks of Batch System? Benefits of Batch System: Move much of the work of operator to computer. Increased performance as it was possible for j

What is critical section?, What is critical section? Every process has ...

What is critical section? Every process has a segment code called the critical section, in which the process may be updating tables, changing variables, writing file and etc. W

How does windows xp execute transport protocols, Q. What kinds of networkin...

Q. What kinds of networking does Windows XP support? How does Windows XP execute transport protocols? Describe two networking protocols. Answer: Support is offer for bo

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd