1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Cloud [144]
3 years ago
5

One feature of a capability-based protection syhstem is the ability of one process to transfer a copy of a capability to another

process. Describe a situation in which one process should be able to transfer a capability to another
Computers and Technology
1 answer:
KonstantinChe [14]3 years ago
3 0

Answer:

A situation in which one process should be able to transfer a capability to another can occur if one user T has the capability to transfer resource A and at the same time another user S wants to access the same resource A, then the capability can be transfer to user S after checking the access list or matrix and the access rights for which user can transfer.

You might be interested in
viết phương trình nhập vào bàn phím một dãy số nguyên a1,a2 ....ăn gồm n phần tử nguyên hãy đếm xem trong dãy a có bao nhiêu phầ
Alina [70]

Answer:

Wala ko ka sabot ana oy sorry

5 0
3 years ago
Read 2 more answers
Which best describes TPM?
rodikova [14]

Answer:

Encryption used on hard drives

Explanation:

TPM is a hardware chip. It is a type of module that is used to authenticate the hardware devices with the help of encryption keys (passwords). It is the short form of Trusted Platform module. The hardware devices that be authenticated through this module may include personnel computer or laptops. There are different keys, password and security codes.

So, the best sentence that describes, TPM is Encryption built into hardware .

4 0
3 years ago
Late at night, some traffic signals change patterns and become _____.
Dimas [21]

Answer:

combined in color.

Explanation:

It's because the modern traffic signals are controlled by the computers, and they are programmed to display different signals for different times of day, night, days of week and holidays etc.

6 0
3 years ago
Read 2 more answers
Ugh these are hard questions
SVEN [57.7K]
9 is B, and 10 is D I think ... brainliest pls
8 0
3 years ago
Plato I need answers asap will
Alja [10]

Answer:

Thanks for the points  

Explanation:

3 0
3 years ago
Other questions:
  • Key Categories: more libraries and thousands of functions
    7·1 answer
  • Which of the following provides astronomical evidence for the age of the earth?
    11·1 answer
  • What feature is available to add a suggestion in the margin of someone else's document?
    7·1 answer
  • True or False. Students taking courses log into Blackboard with their "key account" username and password.
    8·1 answer
  • Select the correct answer.
    10·2 answers
  • Which of the following is a hardware component used to hold the BitLocker encryption key and ensures encrypted data is not acces
    5·1 answer
  • ____ is one of the primary operations of a computer.
    10·1 answer
  • What are five features of word 2016 you would use to make a brochure
    6·2 answers
  • তথ্য ও যোগাযোগ প্রযুক্তির প্রশ্ন(45)10 সংখ্যাটির সমতুল্য মান?
    14·1 answer
  • A file named loan.html, write an HTML document that looks similar to figure 9-7 in the textbook. Write four functions with these
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!