Describe an example in which absolute denial of service to a user (that is, the user gets no response from the computer) is a serious problem to that user. Describe another example where 10 percent denial of service to a user (that is, the user’s computation progresses but at a rate 10 percent slower than normal) is a serious problem to that user. Could access by unauthorized people to a computing system result in a 10 percent denial of service to the legitimate users? How?

What will be an ideal response?

Absolute: Almost any required computing. Ten percent degradation: A real-­?time application that requires almost all available computing power to respond within the required time.

Computer Science & Information Technology

You might also like to view...

A structure in Visual Basic is similar to:

a) an object b) a class c) a String d) None of the above

Computer Science & Information Technology

An exact copy of all the files stored on a drive is a(n) ____.

A. ghost B. system image C. image D. exact image

Computer Science & Information Technology