COMPUTER SCIENCE:OVERVIEW-TEXT
12th Edition
ISBN: 2810015047178
Author: BROOKSHEAR
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 3, Problem 4SI
Explanation of Solution
Responsibility of
“Yes”, it is our responsibility to lock the house in such a way that intruders cannot get in. However, public also has moral duty not to enter a house unless invited.
“Yes”, it is the duty of the operating system developers to safeguard the access to computer and its content so that that it cannot be leaked out by the hackers.
Explanation:
- Operating system security is the process of ensuring integrity, confidentiality and availability.
- Information insecurity costs billions in terms of information theft, financial theft, etc. Hacking leads to productivity loss, both when networks stop working and in dozens of minor security inconvenience that have to be endured.
- It is the responsibility of operating system to create a protection system which ensures that the user who is running that particular program is authentic...
Expert Solution & Answer
Want to see the full answer?
Check out a sample textbook solutionStudents have asked these similar questions
Is it permissible, in your opinion, to trade a small amount of privacy for free or nearly free software? Is there a method to hold them accountable for the data they collect and how they use it? Always be ready to defend your position. There must be evidence to support your claim.
Most software, including operating systems, is not error free when it is first released. Some programs, in fact, contain thousands of problems, called bugs. Software companies regularly release fixes (called patches) to correct known issues with released software. Many hackers and other criminals target these bugs with computer viruses or other attacks, frequently on the day a new vulnerability is announced—called a zero-day attack. Obviously, the acts by these criminals are not ethical, but what responsibility does a software company have to consumers if they are put at risk due to the company’s carelessness or rush to market? What responsibility do consumers have to make sure they keep their computers patched against new vulnerabilities?
How fresh is the problem of computer ethics or is it an ancient one that has been revived?
Chapter 3 Solutions
COMPUTER SCIENCE:OVERVIEW-TEXT
Ch. 3.1 - Identify examples of queues. In each case,...Ch. 3.1 - Which of the following activities require...Ch. 3.1 - Prob. 3QECh. 3.1 - Prob. 4QECh. 3.2 - Prob. 1QECh. 3.2 - What is the difference between application...Ch. 3.2 - Prob. 3QECh. 3.2 - Prob. 4QECh. 3.3 - Summarize the difference between a program and a...Ch. 3.3 - Summarize the steps performed by the CPU when an...
Ch. 3.3 - Prob. 3QECh. 3.3 - If each time slice in a multiprogramming system is...Ch. 3.3 - Prob. 5QECh. 3.4 - Prob. 1QECh. 3.4 - Suppose a two-lane road converges to one lane to...Ch. 3.4 - Prob. 3QECh. 3.4 - Prob. 4QECh. 3.5 - Prob. 1QECh. 3.5 - Prob. 2QECh. 3.5 - If a process in a multiprogramming system could...Ch. 3 - List four activities of a typical operating...Ch. 3 - Summarize the distinction between batch processing...Ch. 3 - Prob. 3CRPCh. 3 - Prob. 4CRPCh. 3 - What is a multitasking operating system?Ch. 3 - Prob. 6CRPCh. 3 - On the basis of a computer system with which you...Ch. 3 - a. What is the role of the user interface of an...Ch. 3 - What directory structure is described by the path...Ch. 3 - Define the term process as it is used in the...Ch. 3 - Prob. 11CRPCh. 3 - What is the difference between a process that is...Ch. 3 - What is the difference between virtual memory and...Ch. 3 - Suppose a computer contained 512MB (MiB) of main...Ch. 3 - What complications could arise in a...Ch. 3 - What is the distinction between application...Ch. 3 - Prob. 17CRPCh. 3 - Summarize the booting process.Ch. 3 - Why is the booting process necessary?Ch. 3 - If you have a PC, record the sequence activities...Ch. 3 - Suppose a multiprogramming operating system...Ch. 3 - Prob. 22CRPCh. 3 - Prob. 23CRPCh. 3 - Prob. 24CRPCh. 3 - Prob. 25CRPCh. 3 - Would greater throughput be achieved by a system...Ch. 3 - Prob. 27CRPCh. 3 - What information is contained in the state of a...Ch. 3 - Identify a situation in a multiprogramming system...Ch. 3 - List in chronological order the major events that...Ch. 3 - Prob. 31CRPCh. 3 - Prob. 32CRPCh. 3 - Explain an important use for the test-and-set...Ch. 3 - Prob. 34CRPCh. 3 - Prob. 35CRPCh. 3 - Prob. 36CRPCh. 3 - Prob. 37CRPCh. 3 - Each of two robot arms is programmed to lift...Ch. 3 - Prob. 39CRPCh. 3 - Prob. 40CRPCh. 3 - Prob. 41CRPCh. 3 - Prob. 42CRPCh. 3 - Prob. 43CRPCh. 3 - Prob. 44CRPCh. 3 - Prob. 45CRPCh. 3 - Prob. 46CRPCh. 3 - Prob. 47CRPCh. 3 - Prob. 48CRPCh. 3 - Prob. 49CRPCh. 3 - Prob. 50CRPCh. 3 - Prob. 51CRPCh. 3 - Prob. 52CRPCh. 3 - How is the window manager related to the operating...Ch. 3 - Prob. 54CRPCh. 3 - Prob. 55CRPCh. 3 - Suppose you are using a multiuser operating system...Ch. 3 - Prob. 2SICh. 3 - Prob. 3SICh. 3 - Prob. 4SICh. 3 - Prob. 5SI
Knowledge Booster
Similar questions
- Operating systems and the vast majority of programmes do not begin their lives devoid of bugs. Applications have tens of thousands of bugs in them at any one time. It is common practise for software suppliers to give fixes for recognised software defects (also known as patches). Criminals often launch zero-day attacks the day after a newly discovered vulnerability is disclosed to the public. Nobody can dispute the immorality of what these criminals are doing, but a software firm has what duty to its customers if their inexperience or haste to compete in the market causes them harm? Users of computers are required to install the latest security updates.arrow_forwardHow fresh is the problem of computer ethics or is it an ancient one that has been revived by new technology?arrow_forwardComputer Science Scenario: Suppose you were to let your friend use your computer for a couple of hours in order for them to complete their homework assignments. What kind of precautions would you take before letting them use your computer? In those precautions, what is the logic behind your reasoning? How would your precautions change if this computer was being used by the general public instead?arrow_forward
- Do you think coercion is a good idea? Why or why not?arrow_forwardDo you think it's fair to trade some of your privacy for free or almost free software? Is there any way to hold them accountable for the information they collect and how it is used? Always be prepared to defend your position. Your argument has to be supported by evidence.arrow_forwardDo you believe that it is OK to give up part of your privacy in exchange for free or almost free software? Are they required to provide an explanation for the information that they gather and how they put it to use? Don't allow your ability to defend your point of view become worse over time. You must offer proof for your allegations.arrow_forward
- Do you believe it is ethical to have free (or almost free) software in exchange for your personal information? Are they responsible for the facts they receive and how they are used? Justify your position. Justify your place.arrow_forwardThe moment to act is now. Which dismissals should you make sure you are informed of? What ways may those persons be of assistance? Dismissals result in irregularities? science of computersarrow_forwardHow does the "Race Condition" affect a computer's operating system?arrow_forward
- Malware uses various techniques to covertly execute code on systems. One such technique is DLL injection. DLL injection involves causing code to execute within the address space of some other process. This is accomplished by forcing the targeted program to load a DLL. Why are malware hiding techniques like DLL injection successful? Shouldn't the operating system have built-in controls to prevent DLL injection? Shouldn't anti-malware software be able to detect and prevent DLL injection 100 percent of the time?arrow_forwardIf a computer suddenly ceased functioning, how would you go about fixing it?arrow_forwardWhen a computer malfunctions, how do you go about fixing it? To what means do you resort in order to discover information?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningA+ Guide To It Technical SupportComputer ScienceISBN:9780357108291Author:ANDREWS, Jean.Publisher:Cengage,
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
A+ Guide To It Technical Support
Computer Science
ISBN:9780357108291
Author:ANDREWS, Jean.
Publisher:Cengage,