Describe an example in which absolute denial of service to a user (that is, the user gets no response from the computer) is a serious problem to that user. Describe another example where 10 percent denial of service to a user (that is, the user's computation progresses but at a rate 10 percent slower than normal) is a serious problem to that user. Could access by unauthorized people to a

computing system result in a 10 percent denial of service to the legitimate users? How?

What will be an ideal response?

Absolute:
Almost
any
required
computing.
Ten
percent
degradation:
A
real-­?time
application
that
requires
almost
all
available
computing
power
to
respond
within
the
required
time.

Computer Science & Information Technology

You might also like to view...

A(n) ________ can be added to an OpenOffice Writer document to move to another file or a website

A) line break B) hyperlink C) leader D) WYSIWYG

Computer Science & Information Technology

When setting up a VPN for a small company, what firewall feature will the technician use to direct external traffic to an internal server?

A) Port forwarding B) Encryption C) Authentication D) Content filtering

Computer Science & Information Technology