Protection schemes are surveyed in this section. The two main ones are key-protection applied to pages of memory and base address and field length registers. |
[Full page version] [Review questions ...answers] [Section map] [Chapter 11 home] [Book home] [Quiz] [Another Quiz]