If a program attempts to modify (or, sometimes, even to read) the contents of memory locations that do not belong to it, the operating system’s __________ routine intervenes and (usually) terminates the program.

a. reliability
b. security
c. processor management
d. memory protection

d. memory protection

Computer Science & Information Technology

You might also like to view...

Which of The following are encrypted protocols? (Select TWO)

A. TELNET B. SSH C. POP3 D. FTP E. HTTPS

Computer Science & Information Technology

The ____() method of the Math object eliminates the decimal part of the resulting number.

A. decimal B. floor C. roof D. number

Computer Science & Information Technology