How is disadvantage of all-or-nothing approach overcome?
(a) Base/Bound
(b) Relocation technique
(c) Fence method
(d) Tagged architecture
This question was posed to me in unit test.
I want to ask this question from Protection topic in portion Protection of Operating System