Describe an example in which absolute denial of service to a user (that is, the user gets no response from the computer) is a serious problem to that user. Describe another example where 10 percent denial of service to a user (that is, the user’s computation progresses but at a rate 10 percent slower than normal) is a serious problem to that user. Could access by unauthorized people to a computing system result in a 10 percent denial of service to the legitimate users? How?
What will be an ideal response?
Absolute: Almost any required computing. Ten percent degradation: A real-?time application that requires almost all available computing power to respond within the required time.
Computer Science & Information Technology
You might also like to view...
A structure in Visual Basic is similar to:
a) an object b) a class c) a String d) None of the above
Computer Science & Information Technology
An exact copy of all the files stored on a drive is a(n) ____.
A. ghost B. system image C. image D. exact image
Computer Science & Information Technology