A. Program is divided in data memory and program memory
B. Program is executed in segments
C. Program is divided into pieces having different access rights
D. It has effect of an unbounded architecture
A. Name, offset
B. Start, stop
C. Access, rights
D. Offset, rights
Explanation: OS can retrieve the real address via looking for the table then making a simple calculation: address of the name + offset.
A. Ensure all objects are protected individually
B. Objects have different priority and thus different levels of protection
C. Ensure that each object is accessed correctly and only by allowed processes
D. None of the mentioned
A. Less privileges provide difficulty in executing admin tasks
B. Users can get temporary high privilege access
C. Users should be given just enough privileges to perform their tasks
D. None of the mentioned
A. Prevent mischievous violation
B. Prevent and intentional
C. Ensure that each program component uses resources allotted to it only
D. All of the mentioned