Why is it desirable to incorporate certain operating systems security functions directly into hardware?

What will be an ideal response?


Presumably functions incorporated directly into the hardware are more difficult to
tamper with.

Computer Science & Information Technology

You might also like to view...

Here are several function members of a class. Tell whether each may be used as an l-value, only, an r-value only or both. B is a class that has mutators.

a. //declarations of these appear together in the //definition of class A int& A::f( ){ /* */} const int& A::f( )const{ /* */} b. const int& A::f( ){ /* */} c. const B A::f( ){ /* */} d. B A::f( ){ /* */}

Computer Science & Information Technology

Searches take place faster in personal folders than any others on the PC

Indicate whether the statement is true or false

Computer Science & Information Technology

A header or footer can be deactivated by ________ in the body of the document

Fill in the blank(s) with correct word

Computer Science & Information Technology

MC is an abundant material found in sand that is used to create computer chips.

a) Mica b) Silicon c) Clay d) None of the above

Computer Science & Information Technology