The three operating system security layers are: physical hardware, operating system kernel, and _________.

Fill in the blank(s) with the appropriate word(s).

user applications and utilities

Computer Science & Information Technology

You might also like to view...

When filtering, the Filter By Form command is used to restrict records based on one or more fields

Indicate whether the statement is true or false

Computer Science & Information Technology

The rule that inline elements must be placed inside a block-level element comes from the ____ DTD.

A. Strict B. Transitional C. Frameset D. Modular

Computer Science & Information Technology