adplus-dvertising
frame-decoration

Question

In domain structure what is Access-right equal to ?

a.

Access-right = object-name, rights-set

b.

Access-right = read-name, write-set

c.

Access-right = read-name, execute-set

d.

Access-right = object-name, execute-set

Posted under Operating System

Answer: (a).Access-right = object-name, rights-set

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. In domain structure what is Access-right equal to ?

Similar Questions

Discover Related MCQs

Q. What is meaning of right-set ?

Q. What is Domain ?

Q. What does access matrix represent ?

Q. What are the three additional operations to change the contents of the access-matrix ?

Q. Who can add new rights and remove some rights ?

Q. What are the three copy rights ?

Q. Which two rights allow a process to change the entries in a column ?

Q. Which is an unsolvable problem in access-matrix ?

Q. Which of the following objects require protection ?

Q. What is ‘separation’ in security of Operating systems ?

Q. Which of the following statements are correct?
i) Physical separation – in which process use different physical objects like separate printers
ii) Physical separation – in which process having different security requirement at different times
iii) Logical separation – In which users operate under illusion that no other processes exist
iv) Logical sepration – In which processes conceal their data and computations

Q. Which of the following statements are correct?
i) Physical separation – in which process use different physical objects like separate printers
ii) Temporal separation – in which process having different security requirement at different times
iii) Physical separation – In which users operate under illusion that no other processes exist
iv) Temporal sepration – In which processes conceal their data and computations

Q. Which of the following statements are correct?
i) logical separation – in which process use different physical objects like separate printers
ii) cryptographic separation – in which process having different security requirement at different times
iii) Logical separation – In which users operate under illusion that no other processes exist
iv) cryptographic sepration – In which processes conceal their data and computations

Q. What are various roles of protection ?

Q. Which of the following objects require protection ?

Q. Which principle states that programs, users and even the systems be given just enough privileges to perform their task?

Q. _______ is an approach to restricting system access to authorized users.

Q. For system protection, a process should access

Q. The protection domain of a process contains

Q. If the set of resources available to the process is fixed throughout the process’s lifetime then its domain is