protected mode - definition. What is protected mode
Diclib.com
قاموس ChatGPT
أدخل كلمة أو عبارة بأي لغة 👆
اللغة:

ترجمة وتحليل الكلمات عن طريق الذكاء الاصطناعي ChatGPT

في هذه الصفحة يمكنك الحصول على تحليل مفصل لكلمة أو عبارة باستخدام أفضل تقنيات الذكاء الاصطناعي المتوفرة اليوم:

  • كيف يتم استخدام الكلمة في اللغة
  • تردد الكلمة
  • ما إذا كانت الكلمة تستخدم في كثير من الأحيان في اللغة المنطوقة أو المكتوبة
  • خيارات الترجمة إلى الروسية أو الإسبانية، على التوالي
  • أمثلة على استخدام الكلمة (عدة عبارات مع الترجمة)
  • أصل الكلمة

%ما هو (من)٪ 1 - تعريف


Protected mode         
  • Virtual segments of 80286
  • Paging (on Intel 80386) with page size of 4K
  • An Intel 80386 microprocessor
  • Example of privilege ring usage in an operating system using all rings
  • Common method of using paging to create a virtual address space
OPERATIONAL MODE OF X86-COMPATIBLE CENTRAL PROCESSING UNITS
Pmode; Protected Virtual Address Mode; Protected Mode; Protected virtual address mode; Protected-mode; 286 protected mode
In computing, protected mode, also called protected virtual address mode, is an operational mode of x86-compatible central processing units (CPUs). It allows system software to use features such as virtual memory, paging and safe multi-tasking designed to increase an operating system's control over application software.
protected mode         
  • Virtual segments of 80286
  • Paging (on Intel 80386) with page size of 4K
  • An Intel 80386 microprocessor
  • Example of privilege ring usage in an operating system using all rings
  • Common method of using paging to create a virtual address space
OPERATIONAL MODE OF X86-COMPATIBLE CENTRAL PROCESSING UNITS
Pmode; Protected Virtual Address Mode; Protected Mode; Protected virtual address mode; Protected-mode; 286 protected mode
An operating mode of Intel 80x86 processors. The opposite of real mode. The Intel 8088, Intel 8086, Intel 80188 and Intel 80186 had only real mode, processors beginning with the Intel 80286 feature a second mode called protected mode. In real mode, addresses are generated by adding an address offset to the value of a segment register shifted left four bits. As the segment register and address offset are 16 bits long this results in a 20-bit address. This is the origin of the one megabyte (2^20) limit in real mode. There are 4 segment registers on processors before the {Intel 80386}. The 80386 introduced two more segment registers. Which segment register is used depends on the instruction, on the addressing mode and of an optional instruction prefix which selects the segment register explicitly. In protected mode, the segment registers contain an index into a table of segment descriptors. Each segment descriptor contains the start address of the segment, to which the offset is added to generate the address. In addition, the segment descriptor contains memory protection information. This includes an offset limit and bits for write and read permission. This allows the processor to prevent memory accesses to certain data. The operating system can use this to protect different processes' memory from each other, hence the name "protected mode". While the standard register set belongs to the CPU, the segment registers lie "at the boundary" between the CPU and MMU. Each time a new value is loaded into a segment register while in protected mode, the corresponding descriptor is loaded into a descriptor cache in the (Segment-)MMU. On processors before the Pentium this takes longer than just loading the segment register in real mode. Addresses generated by the CPU (which are segment offsets) are passed to the MMU to be checked against the limit in the segment descriptor and are there added to the segment base address in the descriptor to form a linear address. On a 80386 or later, the linear address is further processed by the paged MMU before the result (the physical address) appears on the chip's address pins. The 80286 doesn't have a paged MMU so the linear address is output directly as the physical address. The paged MMU allows for arbitrary remapping of four klilobyte memory blocks (pages) through a translation table stored in memory. A few entries of this table are cached in the MMU's Translation Lookaside Buffer to avoid excessive memory accesses. After processor reset, all processors start in real mode. Protected mode has to be enabled by software. On the 80286 there exists no documented way back to real mode apart from resetting the processor. Later processors allow switching back to real mode by software. Software which has been written or compiled to run in protected mode must only use segment register values given to it by the operating system. Unfortunately, most application code for MS-DOS, written before the 286, will fail in protected mode because it assumes real mode addressing and writes arbitrary values to segment registers, e.g. in order to perform address calculations. Such use of segment registers is only really necessary with data structures that are larger than 64 kilobytes and thus don't fit into a single segment. This is usually dealt with by the huge memory model in compilers. In this model, compilers generate address arithmetic involving segment registers. A solution which is portable to protected mode with almost the same efficiency would involve using a table of segments instead of calculating new segment register values ad hoc. To ease the transition to protected mode, Intel 80386 and later processors provide "virtual 86 mode". (1995-03-29)
DOS Protected Mode Services         
SET OF EXTENDED DOS MEMORY MANAGEMENT SERVICES
CLOAKING (DOS extender); Novell DPMS; Helix Cloaking; Caldera DPMS; DPMS (DOS extender); NIOS (NetWare); DPMS.EXE; DPMS.SYS; CLOAKING.EXE; DPMSXXX0; CLOAK$$$; DPMS Beta; DPMS 1.0; DPMS 1.1; DOS Protected Mode Services 1.0; DOS Protected Mode Services 1.1; DOS Protected Mode Services 1.2; DOS Protected Mode Services 1.3; DOS Protected Mode Services 1.4; DOS Protected Mode Services Beta; DPMS client; DPMS server; Multimedia Cloaking; NetWare I/O Subsystem; Novell NetWare I/O Subsystem; NetWare Input/Output System; DPMSTEST; DPMSTEST.EXE; NIOS.EXE; DPMS (Novell); DPMS (Caldera); DPMS 1.3; DPMS 1.30; DPMS 1.41; DPMS 1.42; DPMS 1.43; DPMS 1.44; DPMS 1.00; DPMS 1.10; DPMS 1.2; DPMS 1.20; DPMS 1.40; DPMS 1.4; DOS Protected Mode Server; Disk Operating System Protected Mode Services; Helix cloaking engine
DOS Protected Mode Services (DPMS) is a set of extended DOS memory management services to allow DPMS-enabled DOS drivers to load and execute in extended memory and protected mode.
أمثلة من مجموعة نصية لـ٪ 1
1. A version shipping with Vista computers, due out for consumers early next year, will come with parental controls and a "protected mode" so hackers can‘t easily to gain access to the rest of the machine even if the browser is hit.