Human problem
Authentication problem
Physical problem
None of these
Must usually be re-complied to use multiple processors
Can always be made efficient on multiple processors
Immediately run on multiple processors
Cannot run on multiple processors
Only allowed to the operating system
Never used
Required to perform any I/O
Entered by programs when they enter the processor
Tables
Rows
Columns
computer systems must be physically secured against armed or surreptitious entry by intruders
users must be screened carefully so that the chance of authorizing a user who then gives access to an intruder
both (a) and (b)
none of these
cannot show the system paging rate
are useless for capacity planning
are most useful for showing performance problems
are used only for capacity planning
Accidental
Malicious
Both (a) and (b)
All of these
Allows the development of system authentication package
NT operates with client server model
Creates a security access token that includes the security ID for users
Security model is based on the notion of user accounts
Receive calls, and calls back if user is authorized
Prevent hackers from calling the computer
Require no effort by systems personnel to implement
Force the user to call the computer twice to get access