When programs are running on the server, ____ monitors how they use memory to ensure they are not causing memory problems.

A. virtual memory cache monitor
B. memory verification
C. DEP
D. processor scheduling

Answer: C

Computer Science & Information Technology

You might also like to view...

File access control relates largely to the secrecy dimension of security. What is the relationship between an access control matrix and the integrity of the objects to which access is being controlled?

What will be an ideal response?

Computer Science & Information Technology

________ are synchronization mechanisms employed throughout the kernel to protect access to critical sections.

a) Kernel semaphores b) System V semaphores c) POSIX semaphores d) none of the above

Computer Science & Information Technology