Студопедия

КАТЕГОРИИ:


Архитектура-(3434)Астрономия-(809)Биология-(7483)Биотехнологии-(1457)Военное дело-(14632)Высокие технологии-(1363)География-(913)Геология-(1438)Государство-(451)Демография-(1065)Дом-(47672)Журналистика и СМИ-(912)Изобретательство-(14524)Иностранные языки-(4268)Информатика-(17799)Искусство-(1338)История-(13644)Компьютеры-(11121)Косметика-(55)Кулинария-(373)Культура-(8427)Лингвистика-(374)Литература-(1642)Маркетинг-(23702)Математика-(16968)Машиностроение-(1700)Медицина-(12668)Менеджмент-(24684)Механика-(15423)Науковедение-(506)Образование-(11852)Охрана труда-(3308)Педагогика-(5571)Полиграфия-(1312)Политика-(7869)Право-(5454)Приборостроение-(1369)Программирование-(2801)Производство-(97182)Промышленность-(8706)Психология-(18388)Религия-(3217)Связь-(10668)Сельское хозяйство-(299)Социология-(6455)Спорт-(42831)Строительство-(4793)Торговля-(5050)Транспорт-(2929)Туризм-(1568)Физика-(3942)Философия-(17015)Финансы-(26596)Химия-(22929)Экология-(12095)Экономика-(9961)Электроника-(8441)Электротехника-(4623)Энергетика-(12629)Юриспруденция-(1492)Ядерная техника-(1748)

The writing Module. VII. Reading Exercises:




THE SPEAKING MODULE

After text activity

VII. Reading Exercises:

Exercise 1. Read and memorize using a dictionary:

Currently, accountable for, confusion, extra piece of hardware, impenetrable, contents, executing program, integrity, responsible, to perform, to load, requester

Exercise 2. Answer the questions:

1) What might one expect the supervisor program to maintain?

2) What does virtual processor implementation contain?

3) What protection mechanisms are described in the text?

4) What does each mechanism protect?

5) What program is part of all three protection mechanisms?

 

Exercise 4. Match the left part with the right:

1 So far, this virtual processor implementation contains a) three protection mechanisms that we can associate with our abstractions.
2. For the first, the information being protected is the   b) forces all references to memory through the descriptor mechanism.
3. The guard is represented by the extra   c) distinct programs of Fig. 1.
4. The impenetrable wall with a door is the hardware that d) piece of hardware that enforces the descriptor restriction.

 

II. Speaking Exercises:

Exercise 1. Define the terms using the suggested words and expressionsas in example:

Information science Descriptor Code Binary code
discipline, deals with, processes, storing, transferring, information piece stored data indicates how data stored system, symbols, rules, used, expressing, information code, digital, computers, based, binary, number, system, there are, two, possible, states, off and on, usually, symbolized, 0 and 1  

 

EXAMPLE: Information science is a discipline that deals with the processes of storing and transferring information.

Exercise 2. Ask questions to the given answers:

1) Question: ___________________________________________?

Answer: When the privileged state bit is OFF, the index in this table of the program currently in control identifies exactly which program--and thus which virtual processor--is accountable for the activity of the real processor.

 

2) Question: ___________________________________________?

Answer: For protection to be complete, a virtual processor must not be able to change arbitrarily the values in the table of descriptors.

 

3) Question: ___________________________________________?

Answer: If we suppose the table to be stored inside the supervisor program, it will be inaccessible to the virtual processors.

 

Writing exercises:

Exercise 1. Fill in the gaps with the suggested words:

requester, not, first, identified, mechanism

The second ________protects the contents of the descriptor register. The wall, door, and guard are implemented in hardware, as with the ______mechanism. An executing program requesting to load the descriptor register is__________ by the privileged state bit. If this bit is OFF, indicating that the requester is a user program, then the guard does ______allow the register to be loaded. If this bit is ON, indicating that the______ is the supervisor program, then the guard does allow it.

 

Exercise 2. Compose a story on one of the topics (up to 100 words):

1) Different protection mechanisms

2) Authority check

 

Lesson 8




Поделиться с друзьями:


Дата добавления: 2015-08-31; Просмотров: 157; Нарушение авторских прав?; Мы поможем в написании вашей работы!


Нам важно ваше мнение! Был ли полезен опубликованный материал? Да | Нет



studopedia.su - Студопедия (2013 - 2024) год. Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав! Последнее добавление




Генерация страницы за: 0.008 сек.