problem 1: prepare brief notes on the following:
a) One-time passwords.
problem 2: Describe which of the given systems permit module designers to enforce the need to know principle.
a) The MULTICS ring protection scheme.
b) Hydra’s capabilities.
c) JVM’s inspection scheme.
problem 3: Describe various security threats in detail.
problem 4: How does surveillance programs which are used in the threat monitoring?
problem 5: describe some checks a surveillance program might make to find out, if a user is attempting to corrupt a critical file.
problem 6: prepare in brief about Multiprogramming, Timesharing, CPU Scheduling and Virtual Memory?
problem 7: Describe about Distributed system.
problem 8: Define the term operating system.
problem 9: Describe basic structure of a computer system and as well describe its basic elements.
problem 10: Compare and Contrast the batch systems with multi programming systems.