Search for question
Question

Q2.From an architectural design perspective, how does the Operating System protect itself from malicious applications? Provide one or more examples to justify your answers.

Fig: 1