Fig. 11.5.1 shows a system in operation with four jobs and the operating system.
Fig. 11.5.1: IBM's key protection of memory