Question
a.
Rows-Domains, Columns-Objects
b.
Rows-Objects, Columns-Domains
c.
Rows-Access List, Columns-Domains
d.
Rows-Domains, Columns-Access list
Posted under Operating System
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. What does access matrix represent ?
Similar Questions
Discover Related MCQs
Q. What are the three additional operations to change the contents of the access-matrix ?
View solution
Q. Who can add new rights and remove some rights ?
View solution
Q. What are the three copy rights ?
View solution
Q. Which two rights allow a process to change the entries in a column ?
View solution
Q. Which is an unsolvable problem in access-matrix ?
View solution
Q. Which of the following objects require protection ?
View solution
Q. What is ‘separation’ in security of Operating systems ?
View solution
Q. Which of the following statements are correct?
i) Physical separation – in which process use different physical objects like separate printers
ii) Physical separation – in which process having different security requirement at different times
iii) Logical separation – In which users operate under illusion that no other processes exist
iv) Logical sepration – In which processes conceal their data and computations
View solution
Q. Which of the following statements are correct?
i) Physical separation – in which process use different physical objects like separate printers
ii) Temporal separation – in which process having different security requirement at different times
iii) Physical separation – In which users operate under illusion that no other processes exist
iv) Temporal sepration – In which processes conceal their data and computations
View solution
Q. Which of the following statements are correct?
i) logical separation – in which process use different physical objects like separate printers
ii) cryptographic separation – in which process having different security requirement at different times
iii) Logical separation – In which users operate under illusion that no other processes exist
iv) cryptographic sepration – In which processes conceal their data and computations
View solution
Q. What are various roles of protection ?
View solution
Q. Which of the following objects require protection ?
View solution
Q. Which principle states that programs, users and even the systems be given just enough privileges to perform their task?
View solution
Q. _______ is an approach to restricting system access to authorized users.
View solution
Q. For system protection, a process should access
View solution
Q. The protection domain of a process contains
View solution
Q. If the set of resources available to the process is fixed throughout the process’s lifetime then its domain is
View solution
Q. Access matrix model for user authentication contains
View solution
Q. Global table implementation of matrix table contains
View solution
Q. For a domain _______ is a list of objects together with the operation allowed on these objects.
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Operating System? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!