1. How can a computer with only 2G of physical memory run two programs that both use 1.5G each? 2. How is virtual memory related to physical memory? 3. What is the role of the CMOS in the boot process? 4. What happens immediately after the computer is powered up? 5. What steps occur in the POST? 6. What is stored in the boot sector of a fixed disk? 7. A typical Windows machine has two boot sectors- what are they called? 8. What is protected mode? What features become available? 9. What difference is there between kernel mode and user mode? 10. How can the attacker exploit the Windows boot process? Solution 1) using virtual memory and Demand-paging concept 2) Virtual memory mapps real physical address to the virtual memory address to transfer the data between RAM and hard drive 3)CMOS is RAM and it stores the parameters of the devices which are in BIOS.and also it runs our system clock. 4)When power is on two things done in two steps >POST (power-on Self Test) >Operating system loading these two are done in sequence and it first is fails then second will not be happen. POST : It check whether all the necessary things are present and they are working well Operation System Loading : After successfull of POST, CPU searches for storage device to load the special files which indicates the starting of the operating system. 5) > First CPU is reset > CPU check itself and POST is loaded into BIOS > CPU runs BIOS to check componenents connected to PC >DRAM is checke with sample reading and writing of every byte. > keyboard is checked for any key is pressed. > if any key is pressed it goes to BIOS settings to change them. > Hard drives are checked whether they are present or not. > Presence of mouse is also checked. > lastly test results are checked with the data in BIOS > IF any mis matches found then POST will results in failure. 6) Some configuaration files and operating system 8)protected mode is first added in x86 machine and it is also called as protected virtual address mode. It provides access to Virtual address, Paging and multitasking for system software to have control over application software. 9)Kernel Mode is to have communication with hardware and it happens under OS. >Kernel mode programs are most supervised. >these may terminate the process > any clashes comes system may crashes --->User mode is just excuting porgrams and he has no permission to have connection with hardware. >less priority >any clashes comes nothing is going to happen.