Question: QUESTION 6 What is a system call? The method the computer uses to demand authentication on suspected fraudulent interactions. O Arequest from a program to

QUESTION 6 What is a system call? The method the computer uses to demand authentication on suspected fraudulent interactions. O Arequest from a program to the operating system for a procedure the process doesn't have the authority to perform in it's current state. O Any connection between two separate operating systems, The portion of an operating system that returns the results of searches through storage. It is however, unable to access memory, QUESTION 7 What is an advantage of loosely coupled hardware or software? It is more significantly more likely to break under stress due to the weaker connections. O You can modify one portion of it without having to make significant changes to the other loosely connected pieces. O They are easier to design and most designers naturally fall into this style. The data streams are quicker and require no additional processing QUESTION 8 Which of the following is true of tightly coupled software? Due to the strong connections between portions of code, it is much more robust and easy to modify individual sections without causing a breakdown. This is a method to prevent spaghetti code because it creates software that is easy to understand for the next maintainers, This is a method of design that separates each function into it's own carefully wrapped module. These 'tight bundles provide additional support for users. Untrained programmers often fall into this style automatically, as it is generally quicker and easier to design initially. QUESTION 9 What is one method Operating Systems use to make sure each process has a chance to run every second? O Hammer Reactive reboot O Timer Anti-redundancy algorithms QUESTION 10 if a vital process needs access to resources and Google Chrome is using them what is one way the Operating System balances this out? Chrome is notorious among operating systems and is always given a hidden status. As soon as any other process asks for a resource, the OS will pull from Chrome before using unallocated resources. Chrome will turn white and become unresponsive until the other process has completed. The vital process can use a system call to initiate a 'trial' where the OS will examine what Chrome has been doing for the past 30 minutes and decide if it is being greedy or not. if it is greedy, it will be stripped of its resources until it becomes more responsible. The user's cursor will gently spin to soothe them. It finishes what Google Chrome needs to do as soon as it can and tells the vital process to wait a moment. Meanwhile, the user's cursor will spin gently to soothe them. It grants the vital process a higher priority, which then uses interrupts to gain access to the resources it needs
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
