If a program attempts to modify (or, sometimes, even to read) the contents of memory locations that do not belong to it, the operating system’s __________ routine intervenes and (usually) terminates the program.
a. reliability
b. security
c. processor management
d. memory protection
d. memory protection
Computer Science & Information Technology
You might also like to view...
Which of The following are encrypted protocols? (Select TWO)
A. TELNET B. SSH C. POP3 D. FTP E. HTTPS
Computer Science & Information Technology
The ____() method of the Math object eliminates the decimal part of the resulting number.
A. decimal B. floor C. roof D. number
Computer Science & Information Technology