((QUESTION)) for a Single Task in Protected Mode, the 80386 Can Address--- Al Memory of Virtual Memory 32 GB

Total Page:16

File Type:pdf, Size:1020Kb

((QUESTION)) for a Single Task in Protected Mode, the 80386 Can Address--- Al Memory of Virtual Memory 32 GB ((MARKS)) 1 (1/2/3...) ((QUESTION)) For a single task in protected mode, the 80386 can address--- ----Vitual memory the virtual memory of Virtual memory ((OPTION_A)) 32 GB ((OPTION_B)) 64 MB ((OPTION_C)) 32 TB ((OPTION_D)) 64 TB ((CORRECT_C D HOICE)) (A/B/C/D) ((EXPLANATI ON)) (OPTIONAL) ((MARKS)) 1 (1/2/3...) ((QUESTION)) The mechanism to provide protection, that is accomplished with the help of read/write privileges is with the help of read/write ((OPTION_A)) restricted use of segments ((OPTION_B)) restricted accesses to segments ((OPTION_C)) privileged instructions ((OPTION_D)) privileged operations ((CORRECT_C A HOICE)) (A/B/C/D) ((EXPLANATI ON)) (OPTIONAL) ((MARKS)) 1 (1/2/3...) ((QUESTION)) The mechanism that is accomplished using descriptor usages limitations, and rules of privilege check is ((OPTION_A)) privileged instruction check ((OPTION_B)) operation reference check ((OPTION_C)) segment load check ((OPTION_D)) none of the mentioned ((CORRECT_C B HOICE)) (A/B/C/D) ((EXPLANATI ON)) (OPTIONAL) ((MARKS)) 1 (1/2/3...) ((QUESTION)) The mechanism that is executed at certain privilege levels, determined by CPL (Current Privilege Level) and I/O privilege level (IOPL) is ((OPTION_A)) restricted use of segments ((OPTION_B)) restricted accesses to segments ((OPTION_C)) privileged instructions or operations ((OPTION_D)) none of the mentioned ((CORRECT_C C HOICE)) (A/B/C/D) ((EXPLANATI ON)) (OPTIONAL) ((MARKS)) 1 (1/2/3...) ((QUESTION)) The paging unit is enabled only in ((OPTION_A)) virtual mode ((OPTION_B)) addressing mode ((OPTION_C)) protected mode ((OPTION_D)) none of the mentioned ((CORRECT_C c HOICE)) (A/B/C/D) ((EXPLANATI ON)) (OPTIONAL) ((MARKS)) 1 (1/2/3...) ((QUESTION)) The bit that is used for providing protection is ((OPTION_A)) User/Supervisor bit ((OPTION_B)) Read bit ((OPTION_C)) Write bit ((OPTION_D)) all of the mentioned ((CORRECT_C d HOICE)) (A/B/C/D) ((EXPLANATI The User/Supervisor (U/S) bit and Read/Write (R/W) bit are used ON)) to provide protection (OPTIONAL) ((MARKS)) 1 (1/2/3...) ((QUESTION)) To enter in protected mode,____________ bit should be at logic 1. ((OPTION_A)) PG ((OPTION_B)) ET ((OPTION_C)) PE ((OPTION_D)) NT ((CORRECT_C C HOICE)) (A/B/C/D) ((EXPLANATI ON)) (OPTIONAL) ((MARKS)) 1 (1/2/3...) ((QUESTION)) In 80386, privilege levels are defined by _______ ((OPTION_A)) DPL ((OPTION_B)) CPL ((OPTION_C)) RPL ((OPTION_D)) All of above ((CORRECT_C D HOICE)) (A/B/C/D) ((EXPLANATI) ) (OPTIONAL) ((MARKS)) 1 (1/2/3...) ((QUESTION)) How many privilege levels are available in 80386 ((OPTION_A)) 1 ((OPTION_B)) 2 ((OPTION_C)) 3 ((OPTION_D)) 4 ((CORRECT_C D HOICE)) (A/B/C/D) ((EXPLANATI ON)) (OPTIONAL) ((MARKS)) 1 (1/2/3...) ((QUESTION)) Which is highest privilege level in 80386 ((OPTION_A)) 1 ((OPTION_B)) 3 ((OPTION_C)) 2 ((OPTION_D)) 0 ((CORRECT_C D HOICE)) (A/B/C/D) ((EXPLANATI ON)) (OPTIONAL) ((MARKS)) 1 (1/2/3...) ((QUESTION)) Which is LOWEST privilege level in 80386 ((OPTION_A)) 1 ((OPTION_B)) 0 ((OPTION_C)) 3 ((OPTION_D)) 2 ((CORRECT_C C HOICE)) (A/B/C/D) ((EXPLANATI) ) (OPTIONAL) ((MARKS)) 1 (1/2/3...) ((QUESTION)) The unit that provides a four level protection mechanism, for system‟s code and data against application program is ((OPTION_A)) central processing unit ((OPTION_B)) segmentation unit ((OPTION_C)) bus interface unit ((OPTION_D)) none of the mentioned ((CORRECT_C B HOICE)) (A/B/C/D) ((EXPLANATI) ) (OPTIONAL) ((MARKS)) 1 (1/2/3...) ((QUESTION)) In protected mode of 80386, the VM flag is set by using ((OPTION_A)) IRET instruction ((OPTION_B)) task switch operation ((OPTION_C)) IRET instruction or task switch operation ((OPTION_D)) none of the mentioned ((CORRECT_C C HOICE)) (A/B/C/D) ((EXPLANATI) ) (OPTIONAL) ((MARKS)) 1 (1/2/3...) ((QUESTION)) By using privilege mechanism the protection from unauthorised accesses is done to ((OPTION_A)) operating system ((OPTION_B)) interrupt handlers ((OPTION_C)) system softwares ((OPTION_D)) all of the mentioned ((CORRECT_CHO D ICE)) (A/B/C/D) ((EXPLANATIOPT IONAL) ((MARKS)) 1 (1/2/3...) ((QUESTION)) The task privilege level at the instant of execution is called ((OPTION_A)) Descriptor privilege level (DPL) ((OPTION_B)) Current privilege level (CPL) ((OPTION_C)) Effective privilege level (EPL) ((OPTION_D)) none of the mentioned ((CORRECT_CH B OICE)) A/B/C/D) ((EXPLANATIO N)) (OPTIONAL) ((MARKS)) 1 (1/2/3...) ((QUESTION)) Once the CPL is selected, it can be changed by ((OPTION_A)) HOLD ((OPTION_B)) transferring control using system descriptors ((OPTION_C)) transferring control using gate descriptors ((OPTION_D)) transferring control using interrupt descriptors ((CORRECT_C C HOICE)) (A/B/C/D) ((EXPLANATI ON)) (OPTIONAL) ((MARKS)) 1 (1/2/3...) ((QUESTION)) The data segments defined in GDT (global descriptor table) and the LDT (local descriptor table) can be accessed by a task with ((OPTION_A)) privilege level 0 ((OPTION_B)) privilege level 1 ((OPTION_C)) privilege level 2 ((OPTION_D)) privilege level 3 ((CORRECT_C A HOICE)) (A/B/C/D) ((EXPLANATI ON)) (OPTIONAL) ((MARKS)) 1 (1/2/3...) ((QUESTION)) A task with privilege level 0, does not refer to all the lower level privilege descriptors in ((OPTION_A)) GDT (global descriptor table) ((OPTION_B)) LDT (local descriptor table) ((OPTION_C)) IDT (interrupt descriptor table) ((OPTION_D)) none of the mentioned ((CORRECT_C B HOICE)) (A/B/C/D) ((EXPLANATI ON)) (OPTIONAL) ((MARKS)) 1 (1/2/3...) ((QUESTION)) The selector RPL that uses a less trusted privilege than the current privilege level for further use is known as ((OPTION_A)) Least task privilege level ((OPTION_B)) descriptor privilege level ((OPTION_C)) effective privilege level ((OPTION_D)) none of the mentioned ((CORRECT_C C HOICE)) (A/B/C/D) ((EXPLANATI ON)) (OPTIONAL) ((MARKS)) 1 (1/2/3...) ((QUESTION)) The effective privilege level is ((OPTION_A)) maximum numeric of RPL and CPL ((OPTION_B)) minimum privilege of RPL and CPL ((OPTION_C)) numeric minimum and privilege maximum of RPL and CPL ((OPTION_D)) none of the mentioned ((CORRECT_C C HOICE)) (A/B/C/D) ((EXPLANATI ON)) (OPTIONAL) ((MARKS)) 1 (1/2/3...) ((QUESTION)) The task requesting an access to a descriptor is allowed to access after checking the ((OPTION_A)) type of descriptor ((OPTION_B)) privilege level ((OPTION_C)) type of descriptor and privilege level ((OPTION_D)) corresponding segment ((CORRECT_C C HOICE)) (A/B/C/D) ((EXPLANATI ON)) (OPTIONAL) ((MARKS)) 1 (1/2/3...) ((QUESTION)) A CALL instruction can reference only a code segment descriptor with ((OPTION_A)) DPL less privilege than CPL ((OPTION_B)) DPL equal privilege to CPL ((OPTION_C)) DPL greater privilege than CPL ((OPTION_D)) all of the mentioned ((CORRECT_C B HOICE)) (A/B/C/D) ((EXPLANATI ON)) (OPTIONAL) ((MARKS)) 1 (1/2/3...) ((QUESTION)) The RPL of a selector that referred to the code descriptor must have a) b) c) d) ((OPTION_A)) less privilege than CPL ((OPTION_B)) greater privilege than CPL ((OPTION_C)) equal privilege than CPL ((OPTION_D)) any privilege regarding CPL ((CORRECT_C C HOICE)) (A/B/C/D) ((EXPLANATI ON)) (OPTIONAL) ((MARKS)) 1 (1/2/3...) ((QUESTION)) The instruction that refers to only code segment descriptors with DPL equal to or less than the task CPL is ((OPTION_A)) CALL ((OPTION_B)) IRET ((OPTION_C)) ESC ((OPTION_D)) RET and IRET ((CORRECT_C D HOICE)) (A/B/C/D) ((EXPLANATI ON)) (OPTIONAL) ((MARKS)) 1 (1/2/3...) ((QUESTION)) By using privilege mechanism the protection from unauthorised accesses is done to ((OPTION_A)) operating system ((OPTION_B)) interrupt handlers ((OPTION_C)) system softwares ((OPTION_D)) all of the mentioned ((CORRECT_C D HOICE)) (A/B/C/D) ((EXPLANATI ON)) (OPTIONAL) ((MARKS)) 1 (1/2/3...) ((QUESTION)) The mechanism to provide protection, that is accomplished with the help of read/write privileges is ((OPTION_A)) restricted use of segments ((OPTION_B)) restricted accesses to segments ((OPTION_C)) privileged instructions ((OPTION_D)) privileged operations ((CORRECT_C A HOICE)) (A/B/C/D) ((EXPLANATI ON)) (OPTIONAL) ((MARKS)) 1 (1/2/3...) ((QUESTION)) The mechanism that is accomplished using descriptor usages limitations, and rules of privilege check is ((OPTION_A)) privileged instruction check ((OPTION_B)) operation reference check ((OPTION_C)) segment load check ((OPTION_D)) none of the mentioned ((CORRECT_C B HOICE)) (A/B/C/D) ((EXPLANATI ON)) (OPTIONAL) ((MARKS)) 1 (1/2/3...) ((QUESTION)) The mechanism that is executed at certain privilege levels, determined by CPL (Current Privilege Level) and I/O privilege level (IOPL) is ((OPTION_A)) restricted use of segments ((OPTION_B)) restricted accesses to segments ((OPTION_C)) privileged instructions or operations ((OPTION_D)) none of the mentioned ((CORRECT_C C HOICE)) (A/B/C/D) ((EXPLANATI ON)) (OPTIONAL) ((MARKS)) 1 (1/2/3...) ((QUESTION)) If CPL is not of the required privilege level, then the instructions that get affected is ((OPTION_A)) IRET ((OPTION_B)) POPF ((OPTION_C)) IRET and POPF ((OPTION_D)) none of the mentioned ((CORRECT_C C HOICE)) (A/B/C/D) ((EXPLANATI ON)) (OPTIONAL) ((MARKS)) 1 (1/2/3...) ((QUESTION)) If CPL is greater than zero, then the instruction that remains unaffected is ((OPTION_A)) IRET ((OPTION_B)) POPF ((OPTION_C)) IRET and POPF ((OPTION_D)) none of the mentioned ((CORRECT_C C HOICE)) (A/B/C/D) ((EXPLANATI ON)) (OPTIONAL) ((MARKS)) 1 (1/2/3...) ((QUESTION)) The condition, “CPL not equals to zero” satisfies, when executing the instruction ((OPTION_A)) LIDT ((OPTION_B)) LGDT ((OPTION_C)) LTR ((OPTION_D)) all of the mentioned ((CORRECT_C D HOICE)) (A/B/C/D) ((EXPLANATI ON)) (OPTIONAL) ((MARKS)) 1 (1/2/3...) ((QUESTION)) While
Recommended publications
  • CA Top Secret for Z/OS Control Options Guide
    CA Top Secret® for z/OS Control Options Guide r15 Ninth Edition This Documentation, which includes embedded help systems and electronically distributed materials (hereinafter referred to as the “Documentation”), is for your informational purposes only and is subject to change or withdrawal by CA at any time. This Documentation is proprietary information of CA and may not be copied, transferred, reproduced, disclosed, modified or duplicated, in whole or in part, without the prior written consent of CA. If you are a licensed user of the software product(s) addressed in the Documentation, you may print or otherwise make available a reasonable number of copies of the Documentation for internal use by you and your employees in connection with that software, provided that all CA copyright notices and legends are affixed to each reproduced copy. The right to print or otherwise make available copies of the Documentation is limited to the period during which the applicable license for such software remains in full force and effect. Should the license terminate for any reason, it is your responsibility to certify in writing to CA that all copies and partial copies of the Documentation have been returned to CA or destroyed. TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THIS DOCUMENTATION “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NONINFRINGEMENT. IN NO EVENT WILL CA BE LIABLE TO YOU OR ANY THIRD PARTY FOR ANY LOSS OR DAMAGE, DIRECT OR INDIRECT, FROM THE USE OF THIS DOCUMENTATION, INCLUDING WITHOUT LIMITATION, LOST PROFITS, LOST INVESTMENT, BUSINESS INTERRUPTION, GOODWILL, OR LOST DATA, EVEN IF CA IS EXPRESSLY ADVISED IN ADVANCE OF THE POSSIBILITY OF SUCH LOSS OR DAMAGE.
    [Show full text]
  • OS Structures and System Calls
    COS 318: Operating Systems OS Structures and System Calls Kai Li Computer Science Department Princeton University (http://www.cs.princeton.edu/courses/cos318/) Outline Protection mechanisms OS structures System and library calls 2 Protection Issues CPU Kernel has the ability to take CPU away from users to prevent a user from using the CPU forever Users should not have such an ability Memory Prevent a user from accessing others’ data Prevent users from modifying kernel code and data structures I/O Prevent users from performing “illegal” I/Os Question What’s the difference between protection and security? 3 Architecture Support: Privileged Mode An interrupt or exception (INT) User mode Kernel (privileged) mode • Regular instructions • Regular instructions • Access user memory • Privileged instructions • Access user memory • Access kernel memory A special instruction (IRET) 4 Privileged Instruction Examples Memory address mapping Flush or invalidate data cache Invalidate TLB entries Load and read system registers Change processor modes from kernel to user Change the voltage and frequency of processor Halt a processor Reset a processor Perform I/O operations 5 x86 Protection Rings Privileged instructions Can be executed only When current privileged Level (CPR) is 0 Operating system kernel Level 0 Operating system services Level 1 Level 2 Applications Level 3 6 Layered Structure Hiding information at each layer Layered dependency Examples Level N THE (6 layers) . MS-DOS (4 layers) . Pros Level 2 Layered abstraction
    [Show full text]
  • CA Top Secret R16 Security Target
    CA Top Secret r16 Security Target ST Version: 1.0 August 18, 2017 3333 Warrenville Road Suite 800 Lisle, IL 60532 Prepared By: Cyber Assurance Testing Laboratory 304 Sentinel Drive, Suite 100 Annapolis Junction, MD 20701 Security Target CA Top Secret r16 Table of Contents 1 Security Target Introduction ................................................................................................................. 6 1.1 ST Reference ................................................................................................................................. 6 1.1.1 ST Identification ................................................................................................................... 6 1.1.2 Document Organization ........................................................................................................ 6 1.1.3 Terminology .......................................................................................................................... 7 1.1.4 Acronyms .............................................................................................................................. 8 1.1.5 References ............................................................................................................................. 9 1.2 TOE Reference .............................................................................................................................. 9 1.3 TOE Overview .............................................................................................................................
    [Show full text]
  • CICS Essentials Auditing CICS – a Beginner’S Guide
    CICS Essentials Auditing CICS – A Beginner’s Guide Julie-Ann Williams Mike Cairns Martin Underwood Craig Warren ii CICS ESSENTIALS Foreword by Brian Cummings A thorough Audit Guide for CICS is something that is long overdue. This document provides a wealth of information about CICS, its operations, and its various resources and capabilities along with audit guidelines and recommendations. Various documents on AuditNet and other sources have taken a stab at parts or all of CICS, but are likely not up to date or sufficiently complete. CICS largely remains an environment that holds its mysteries against auditors and security officers alike. The results of poor understanding can lead to dangerous levels of unidentified risk to the applications and sensitive information of entities that use the power of CICS for critical business applications. Unlike any other environment, CICS security implementations fail in the first place because all of the security control is often only focused on transactions. Transactions are many levels of resources removed from the data files and data bases they query or update. In the end, we see the greatest level of security established for the least sophisticated technical users – end business users, and the least security facing the most technically sophisticated – the CICS sub-system programmer and the CICS Application programmer. For example, it is typical to leave FCT resources unsecured and to allow the CICS regions to have total rights to the data sets they access. This condition gives sub-system and application programmers full-reign to use CICS utilities to inherit the CICS regions’ authorities and gain full access to freely browse and update data.
    [Show full text]
  • 402197 350 System Manual.Book
    350 Cable Survey System System Manual Covers DeepView Software Version 5.x.x and Firmware Version 3.7 TSS (International) Ltd 1, Garnett Close Greycaine Industrial Estate Watford, Herts, WD24 7GL Telephone +44 (0)1923 470800 Facsimile +44 (0)1923 470842 24 hr Customer Support +44 (0)7899 665603 e-mail: [email protected] The information in this Manual is subject to change without notice and does not represent a commitment on the part of TSS (International) Ltd Document P/N 402197 Issue 2.4 abcdef January 2008 1 9 9 3 THE QUEEN'S AWARD FOR EXPORT ACHIEVEMENT Contents CAUTIONARY NOTICE This System Manual contains full installation and operating instructions and is an important part of the 350 System. This Manual should remain easily available for use by those who will install, operate and maintain the System. WARNINGS and CAUTIONS Where appropriate, this Manual includes important safety information. Safety infor- mation appears as WARNING and CAUTION instructions. You must obey these instructions: ❐ WARNING instructions alert you to a potential risk of death or injury to users of the 350 System. ❐ CAUTION instructions alert you to the potential risk of damage to the 350 System. For your convenience, the Table of Contents section includes copies of all the WARNING and CAUTION instructions contained in this Manual. Technical Support and contact information TSS (International) Ltd 1 Garnett Close, Greycaine Industrial Estate, Watford, Herts, WD24 7GL Tel: +44 (0)1923 470800 Fax: +44 (0)1923 470842 Out of UK Hours Technical Helpline: +44 (0)7899
    [Show full text]
  • Virtual Memory in X86
    Fall 2017 :: CSE 306 Virtual Memory in x86 Nima Honarmand Fall 2017 :: CSE 306 x86 Processor Modes • Real mode – walks and talks like a really old x86 chip • State at boot • 20-bit address space, direct physical memory access • 1 MB of usable memory • No paging • No user mode; processor has only one protection level • Protected mode – Standard 32-bit x86 mode • Combination of segmentation and paging • Privilege levels (separate user and kernel) • 32-bit virtual address • 32-bit physical address • 36-bit if Physical Address Extension (PAE) feature enabled Fall 2017 :: CSE 306 x86 Processor Modes • Long mode – 64-bit mode (aka amd64, x86_64, etc.) • Very similar to 32-bit mode (protected mode), but bigger address space • 48-bit virtual address space • 52-bit physical address space • Restricted segmentation use • Even more obscure modes we won’t discuss today xv6 uses protected mode w/o PAE (i.e., 32-bit virtual and physical addresses) Fall 2017 :: CSE 306 Virt. & Phys. Addr. Spaces in x86 Processor • Both RAM hand hardware devices (disk, Core NIC, etc.) connected to system bus • Mapped to different parts of the physical Virtual Addr address space by the BIOS MMU Data • You can talk to a device by performing Physical Addr read/write operations on its physical addresses Cache • Devices are free to interpret reads/writes in any way they want (driver knows) System Interconnect (Bus) : all addrs virtual DRAM Network … Disk (Memory) Card : all addrs physical Fall 2017 :: CSE 306 Virt-to-Phys Translation in x86 0xdeadbeef Segmentation 0x0eadbeef Paging 0x6eadbeef Virtual Address Linear Address Physical Address Protected/Long mode only • Segmentation cannot be disabled! • But can be made a no-op (a.k.a.
    [Show full text]
  • Windows Security Hardening Through Kernel Address Protection
    Windows Security Hardening Through Kernel Address Protection Mateusz \j00ru" Jurczyk August 2011 Abstract As more defense-in-depth protection schemes like Windows Integrity Control or sandboxing technologies are deployed, threats affecting local system components become a relevant issue in terms of the overall oper- ating system user's security plan. In order to address continuous develop- ment of Elevation of Privileges exploitation techniques, Microsoft started to enhance the Windows kernel security, by hardening the most sensitive system components, such as Kernel Pools with the Safe Unlinking mecha- nism introduced in Windows 7[19]. At the same time, the system supports numerous both official and undocumented services, providing valuable in- formation regarding the current state of the kernel memory layout. In this paper, we discuss the potential threats and problems concerning un- privileged access to the system address space information. In particular, we also present how subtle information leakages can prove useful in prac- tical attack scenarios. Further in the document, we conclusively provide some suggestions as to how problems related to kernel address information availability can be mitigated, or entirely eliminated. 1 Introduction Communication between distinct executable modules running at different priv- ilege levels or within separate security domains takes place most of the time, in numerous fields of modern computing. Both hardware- and software-enforced privilege separation mechanisms are designed to control the access to certain re- sources - grant it to modules with higher rights, while ensuring that unathorized entities are not able to reach the protected data. The discussed architecture is usually based on setting up a trusted set of modules (further referred to as \the broker") in the privileged area, while hav- ing the potentially malicious code (also called \the guest") executed in a con- trolled environment.
    [Show full text]
  • Technical Services Attachment for Technology Support Services (TSS)
    Technical Services Attachment IBM Deutschland GmbH for T echnology S upport Services (TSS) Offerings Using this Attachment, Client may order TSS offerings from IBM. Additional details are provided in Transaction Documents (TDs). The agreement in place between the parties (CRA or equivalent) referenced in the signature block, this Attachment, and TDs are the complete agreement regarding TSS transactions hereunder. 1. Services IBM will provide Services, as described in this Technical Services Attachment for TSS Offerings (Attachment) and Statements of Work (SOW), Transaction Documents, and Change Authorizations (collectively Transaction Documents or TDs), to support Client’s Eligible Machines and Eligible Programs (collectively Eligible Products). This Attachment replaces all other previously accepted versions of this Attachment for the Client named in the signature block, as to new transactions dated after the effective date of this Attachment. IBM will identify Eligible Products, Specified Locations (entire information processing environment, or a portion thereof, at multiple sites or a single building), hours of coverage selected, applicable Services, and the contract period, in TDs. Additional details may be documented in the TD, as applicable to the specific transaction. Client may place service requests 24x7, by voice or electronically, however IBM will begin servicing the request during the applicable entitled coverage days and hours. Coverage is based on the time zone where the Eligible Machine is located. IBM provides Services during the hours of service selected in the Transaction Document. Eligible Machines must meet IBM’s safety and serviceability requirements. Any IBM inspection for maintenance eligibility is subject to a charge. IBM reserves the right to inspect a Machine within one month from the start of Service.
    [Show full text]
  • Norco College Technology Committee Meeting 12:50Pm-1:50 P.M
    Norco College Technology Committee Meeting 12:50pm-1:50 p.m. CSS 219 December 13, 2017 MINUTES Present Absent Ruth Leal (Co-Chair) Cathy Brotherton (CIS/BEIT) Damon Nance (Library) Kim K. Kamerin (AHWL) Daniel Lambros (IMC) Deven Fafard (ASNC) Sergio Quiroz (ASNC) Daren Koch (Tutorial) Lenny Riley (DOI) Guest James Finley (CIS/GAM) Ricardo Aguilera (TSS) Janet Frewing (Math) Mike Angeles (TSS) Mitzi Sloniger (COMM) Frank Martinez (TSS) Vanessa Acosta (A&R) 1. Call to Order 12:50 p.m. 2. Consent Calendar- Ruth Leal a. October 19, 2017 Minutes were reviewed. b. November 9, 2017 Minutes were reviewed. Motion (Finley/Frewing). Two abstentions. Approved. 3. Technology Plan – Ruth a. Subcommittees Report - Ms. Leal provided an update regarding the subcommittees. i. Goal #6 – Phase II computers were not all installed in the summer as reported and an email has been sent to all of the users to see if their computer was replaced or still needs to be replaced. Responses are slow but the committee will continue to follow-up. TSS will use the computers in inventory which were purchased for this in last year’s resource allocation process. TSS reported that there were 53 computers in the warehouse after installation of the podium computer project. The Phase II list was shared with Business Services and TSS in the September 2017. The committee will be updated on this in the spring. The Technology Principles and Guidelines were updated to reflect the prioritization process and new template approved by the Technology Committee. The committee reviewed the document. Motion (Acosta/Sloniger).
    [Show full text]
  • A Technical History of National CSS
    A Technical History of National CSS By Harold Feinleib Written: March 4, 2005 CHM Reference number: R0363.2016 A Technical History of National CSS By Harold Feinleib I knew I wanted to go into computers when I got my first program to work. That was quite a thrill. It happened in 1964 during my senior year at Cornell when I took the only course given in computers. I had to look to the Electrical Engineering school where we worked on a Burroughs 220, a computer filled with thousands of vacuum tubes that took up a good sized room. It was actually a very nice computer because it worked in decimal instead of binary. That memorable program was of course a Sort program—I had to sort a list of numbers. I wonder how many sort programs have been written before or since. It must be millions. With great enthusiasm, I interviewed at the campus-recruiting program where companies sent people to find new employees for their organization. In the 1960’s, unlike today, the job market was very active and no one had a problem getting started right after they graduated from college. I got some interest from three companies: Equitable Life to work in their actuarial program in New York City; IBM as a programmer to work in upstate NY; and with the Service Bureau Corporation to also work in midtown Manhattan. New York City was very appealing to me; I was 20 years old, and living in Manhattan was a very exciting prospect, so I took great interest in the Equitable and the SBC interviews.
    [Show full text]
  • MTS on Wikipedia Snapshot Taken 9 January 2011
    MTS on Wikipedia Snapshot taken 9 January 2011 PDF generated using the open source mwlib toolkit. See http://code.pediapress.com/ for more information. PDF generated at: Sun, 09 Jan 2011 13:08:01 UTC Contents Articles Michigan Terminal System 1 MTS system architecture 17 IBM System/360 Model 67 40 MAD programming language 46 UBC PLUS 55 Micro DBMS 57 Bruce Arden 58 Bernard Galler 59 TSS/360 60 References Article Sources and Contributors 64 Image Sources, Licenses and Contributors 65 Article Licenses License 66 Michigan Terminal System 1 Michigan Terminal System The MTS welcome screen as seen through a 3270 terminal emulator. Company / developer University of Michigan and 7 other universities in the U.S., Canada, and the UK Programmed in various languages, mostly 360/370 Assembler Working state Historic Initial release 1967 Latest stable release 6.0 / 1988 (final) Available language(s) English Available programming Assembler, FORTRAN, PL/I, PLUS, ALGOL W, Pascal, C, LISP, SNOBOL4, COBOL, PL360, languages(s) MAD/I, GOM (Good Old Mad), APL, and many more Supported platforms IBM S/360-67, IBM S/370 and successors History of IBM mainframe operating systems On early mainframe computers: • GM OS & GM-NAA I/O 1955 • BESYS 1957 • UMES 1958 • SOS 1959 • IBSYS 1960 • CTSS 1961 On S/360 and successors: • BOS/360 1965 • TOS/360 1965 • TSS/360 1967 • MTS 1967 • ORVYL 1967 • MUSIC 1972 • MUSIC/SP 1985 • DOS/360 and successors 1966 • DOS/VS 1972 • DOS/VSE 1980s • VSE/SP late 1980s • VSE/ESA 1991 • z/VSE 2005 Michigan Terminal System 2 • OS/360 and successors
    [Show full text]
  • Empirical Performance Comparison of Hardware and Software Task Context Switching
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Calhoun, Institutional Archive of the Naval Postgraduate School Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 2009-06 Empirical Performance Comparison of Hardware and Software Task Context Switching Schultz, Eric A. Monterey, California. Naval Postgraduate School http://hdl.handle.net/10945/46226 NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS EMPIRICAL PERFORMANCE COMPARISON OF HARDWARE AND SOFTWARE TASK CONTEXT SWITCHING by Eric A. Schultz June 2009 Thesis Advisor: Cynthia E. Irvine Second Reader: David J. Shifflett Approved for public release; distribution is unlimited THIS PAGE INTENTIONALLY LEFT BLANK ii Form Approved REPORT DOCUMENTATION PAGE OMB No. 0704–0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704–0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202–4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DD–MM–YYYY) 2. REPORT TYPE 3.
    [Show full text]