8. (10 points) Some computer systems do not provide a privileged mode of operation in hardware. Is it possible to construct a secure operating system for these computer systems? Give arguments both that it is and that it is not possible. For a machine of this type the OS would have to be in full control at all times and that can be achieved by software interpretation that would provide for what the hardware lacks(software interpretation allows for a program to directly execute instructions written in programming languages or scripts without having been compiled in a machine language program)Another way is by coding all programs in a high-level language where the compiler can be capable of generating protection checks that the hardware lacks9. (10 points) Consider a computing cluster consisting of two nodes running a database. Describetwo ways in which the cluster software can manage access to the data on the disk. Discuss the benefits and disadvantages of each.Asymmetric clustering- this type of cluster has one machine in hot-standby mode meaning that there are two hosts one that runs the database applications while the other only monitors in case the one running the database fails it can take over, the issue with this is that the full potential of the hosts is not usedSymmetric clustering - has multiple nodes running applications that monitor each other and the issue with this is being able to provide some type of mechanism that would lock files that are stored in a shared disk withing a device.