КАТЕГОРИИ: Архитектура-(3434)Астрономия-(809)Биология-(7483)Биотехнологии-(1457)Военное дело-(14632)Высокие технологии-(1363)География-(913)Геология-(1438)Государство-(451)Демография-(1065)Дом-(47672)Журналистика и СМИ-(912)Изобретательство-(14524)Иностранные языки-(4268)Информатика-(17799)Искусство-(1338)История-(13644)Компьютеры-(11121)Косметика-(55)Кулинария-(373)Культура-(8427)Лингвистика-(374)Литература-(1642)Маркетинг-(23702)Математика-(16968)Машиностроение-(1700)Медицина-(12668)Менеджмент-(24684)Механика-(15423)Науковедение-(506)Образование-(11852)Охрана труда-(3308)Педагогика-(5571)Полиграфия-(1312)Политика-(7869)Право-(5454)Приборостроение-(1369)Программирование-(2801)Производство-(97182)Промышленность-(8706)Психология-(18388)Религия-(3217)Связь-(10668)Сельское хозяйство-(299)Социология-(6455)Спорт-(42831)Строительство-(4793)Торговля-(5050)Транспорт-(2929)Туризм-(1568)Физика-(3942)Философия-(17015)Финансы-(26596)Химия-(22929)Экология-(12095)Экономика-(9961)Электроника-(8441)Электротехника-(4623)Энергетика-(12629)Юриспруденция-(1492)Ядерная техника-(1748) |
The writing Module. VII. Reading Exercises:
THE SPEAKING MODULE After text activity VII. Reading Exercises: Exercise 1. Read and memorize using a dictionary:
Exercise 2. Answer the questions: 1) What might one expect the supervisor program to maintain? 2) What does virtual processor implementation contain? 3) What protection mechanisms are described in the text? 4) What does each mechanism protect? 5) What program is part of all three protection mechanisms?
Exercise 4. Match the left part with the right:
II. Speaking Exercises: Exercise 1. Define the terms using the suggested words and expressionsas in example:
EXAMPLE: Information science is a discipline that deals with the processes of storing and transferring information. Exercise 2. Ask questions to the given answers: 1) Question: ___________________________________________? Answer: When the privileged state bit is OFF, the index in this table of the program currently in control identifies exactly which program--and thus which virtual processor--is accountable for the activity of the real processor.
2) Question: ___________________________________________? Answer: For protection to be complete, a virtual processor must not be able to change arbitrarily the values in the table of descriptors.
3) Question: ___________________________________________? Answer: If we suppose the table to be stored inside the supervisor program, it will be inaccessible to the virtual processors.
Writing exercises: Exercise 1. Fill in the gaps with the suggested words:
The second ________protects the contents of the descriptor register. The wall, door, and guard are implemented in hardware, as with the ______mechanism. An executing program requesting to load the descriptor register is__________ by the privileged state bit. If this bit is OFF, indicating that the requester is a user program, then the guard does ______allow the register to be loaded. If this bit is ON, indicating that the______ is the supervisor program, then the guard does allow it.
Exercise 2. Compose a story on one of the topics (up to 100 words): 1) Different protection mechanisms 2) Authority check
Lesson 8
Дата добавления: 2015-08-31; Просмотров: 157; Нарушение авторских прав?; Мы поможем в написании вашей работы! Нам важно ваше мнение! Был ли полезен опубликованный материал? Да | Нет |