What are the three additional operations to change the contents of the access-matrix?
(a) copy
(b) Owner
(c) control
(d) all of the mentioned
I got this question in an online quiz.
This interesting question is from Protection in division Protection of Operating System