Fill in the blank(s) with correct word
composite key
On a Pentium, privilege level __________ has the highest priority.
a. 3 b. 2 c. 1 d. 0
Discuss three techniques for breaching operating system controls.
What will be an ideal response?