1. Give some examples of poor choices for passwords and explain why they would be poor choices.
2. Processors in Intel”s Pentium series use four privilege levels. Why would the designers decide to have four levels rather than three or five?
3. If a process in a time-sharing system could access memory cells outside its allotted area, how could it gain control of the machine?