1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
djverab [1.8K]
3 years ago
6

Select a classification for File2 so that: Alice can read and write to File2 Bob and Charlie can write to File2, but can't read

it. Eve can write to File1 but can't read it. Alice has Top Secret, {A,B,C}. Bob has Secret{A,B}, Charlie has Confidential,{C} and Eve is Unclassified. File2 should be classified as
Computers and Technology
1 answer:
natita [175]3 years ago
6 0

Answer:

Top Secret, (A,B,C)

Explanation:

Solution:

Some information are known to be sensitive, and has a higher level of classification.

Examples for such levels are: Secret, Top secret ,Unclassified and  Confidential, and Unclassified.  all users of the system has a  level of clearance. fro a user to be able to gain access to document, he or she must have posses a level of the document.

Now, this is governed by two rules which is stated below:

No user can have access to any information that is considered higher than their level of clearance.

Secondly, a user can write to files only that contains an equal level or lower of his clearance level, this is to stop what is called the write down effect.

It is important to note that ABC, categories determine what type of access is permitted.

Now, for the given example, since, Bob and charlie cannot read it, which shows that the file must be of top priority or importance, then Bob and Charlie needs clearance to the file,the file 2 is considered a top priority.

Therefore, the File 2 is classified as a Top Secret, (A,B,C)

You might be interested in
A newspaper runs stories that suggest that most people in the country support cutting taxes. After reading the stories, people w
Nataliya [291]

Answer:

Spiral of silence

Explanation:

The spiral of silence theory states that people remain silent regarding a topic when they feel that their views are in opposition with the rest of the majority.

As stated in the question, the newspaper's stories suggest that majority of the people support cutting taxes, this leads people who supoort raising taxes to not air their opinions because they think that everyone else supports cutting taxes like the papers say.

5 0
3 years ago
Read 2 more answers
Suppose the CashRegister needs to support a method void undo() that undoes the addition of the preceding item. This enables a ca
a_sh-v [17]

Answer:

previousAddition instance variable

Explanation:

In order to accomplish this you would need to add a previousAddition instance variable. In this variable you would need to save the amount that was added at the end of the process. Therefore, if a mistake were to occur you can simply call the previousAddition variable which would have that amount and subtract it from the total. This would quickly reverse the mistake, and can be easily called from the undo() method.

3 0
3 years ago
1. Which of the following is the most effective password? a)bankaccount1
Yuliya22 [10]
Choice C. Choice C includes uppercase and lowercase leters, has a number, and two characters.

:)
7 0
3 years ago
Read 2 more answers
What does the “MIN” and “MAX” functions allow you to do when inserted in a spreadsheet?
Aleks04 [339]

Answer:

Please see explanation

Explanation:

A spreadsheet is used to make calculations and payrolls etc. Different functions are used in spreadsheet. Two of them are MIN and MAX.

The MIN function gives the minimum value out of all the cells in the range.

It is written as:

= MIN(number1, number2..)

OR

= MIN(Starting_cell_address:Last_cell_address)

Similarly, MAX function gives the maximum value from the selected range of cells.

= MAX(number1, number2..)

OR

= MAX(Starting_cell_address:Last_cell_address)

7 0
3 years ago
I need help plz it keeps on happening and idk what to do
Citrus2011 [14]

Answer:

Hi I have never had this problem but maybe you can reset it if it doesn't work you should call your administrators

5 0
4 years ago
Other questions:
  • Encrypt the message ENCRYPTION using a tabular transposition cipher with encryption keyword ONE. If necessary, pad the message w
    7·1 answer
  • The final element of an e-mail message should be
    15·1 answer
  • Suppose you have a 16-bit machine with a page size of 16B. Assume that any unsigned 16-bit integer can be a memory address. Also
    9·1 answer
  • A is a paid placement that appears in a search engines results page at or near the top of the results
    5·1 answer
  • Discuss the types of data that business might collect and how the business could use that data to drive decision-making in a spe
    15·1 answer
  • refers to a problem-solving approach that requires defining the scope of a system, dividing it into its components, and then ide
    12·1 answer
  • Question 12 (2 points)
    10·2 answers
  • Why can’t I see one individual’s questions in the app through their profile, but I can see their questions on the website?
    12·2 answers
  • Please NEED HELP ASAP WILL MARK BRAINLIEST ONLY #8
    8·1 answer
  • What programming language supports relational databases?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!