Describe an example in which absolute denial of service to a user (that is, the user gets no response from the computer) is a serious problem to that user. Describe another example where 10 percent denial of service to a user (that is, the user's computation progresses but at a rate 10 percent slower than normal) is a serious problem to that user. Could access by unauthorized people to a
computing system result in a 10 percent denial of service to the legitimate users? How?
What will be an ideal response?
Absolute:
Almost
any
required
computing.
Ten
percent
degradation:
A
real-?time
application
that
requires
almost
all
available
computing
power
to
respond
within
the
required
time.
Computer Science & Information Technology
You might also like to view...
A(n) ________ can be added to an OpenOffice Writer document to move to another file or a website
A) line break B) hyperlink C) leader D) WYSIWYG
Computer Science & Information Technology
When setting up a VPN for a small company, what firewall feature will the technician use to direct external traffic to an internal server?
A) Port forwarding B) Encryption C) Authentication D) Content filtering
Computer Science & Information Technology