Weitere Beispiele werden automatisch zu den Stichwörtern zugeordnet - wir garantieren ihre Korrektheit nicht.
Protected mode, in contrast, is used for almost everything else.
After its appearance in 1982, the protected mode of the 80286 had not been utilized for many years.
And in fact the system is not even in protected mode.
And in this case those new protected modes have mitigated the problem.
The initial protected mode, released with the 286, was not widely used.
It provides 80286 real and protected mode emulation, an important addition to 3.0.
And so it sets all that up, switches the chip into protected mode.
This prevents programs running in protected mode from interfering with each other's memory.
Certain restrictions applied since these programs were executed in the processor's protected mode.
Windows 3.0 was able to run real mode programs in 16-bit protected mode.
An example would be from supervisor mode to protected mode.
Only applications executing in protected mode can use extended memory directly.
In protected mode, a segment can have variable length.
Windows applications are starting to require Windows 3.1 and protected mode.
In protected mode a segment cannot be writable and executable.
With the release of the 386, the following additional features were added to protected mode:
Redirects you away from red and yellow sites (if protected mode is enabled).
When the 386 was introduced, again a protected mode OS could be written for it.
To access the extended functionality of the 286, the operating system would set the processor into protected mode.
The Intel 80286 processor was the first to introduce the now-ubiquitous protected mode.
It uses Cloaking to relocate and run in protected mode on 386 processors.
Using these new features, however, required a new operating system that was specifically designed for protected mode.
It can then run other real mode code until the program is ready to switch back to protected mode.
Version 5.0 moved to 386 protected mode.
Protected mode has a number of features designed to enhance an operating system's control over application software, in order to increase security and system stability.