1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
djverab [1.8K]
3 years ago
6

Select a classification for File2 so that: Alice can read and write to File2 Bob and Charlie can write to File2, but can't read

it. Eve can write to File1 but can't read it. Alice has Top Secret, {A,B,C}. Bob has Secret{A,B}, Charlie has Confidential,{C} and Eve is Unclassified. File2 should be classified as
Computers and Technology
1 answer:
natita [175]3 years ago
6 0

Answer:

Top Secret, (A,B,C)

Explanation:

Solution:

Some information are known to be sensitive, and has a higher level of classification.

Examples for such levels are: Secret, Top secret ,Unclassified and  Confidential, and Unclassified.  all users of the system has a  level of clearance. fro a user to be able to gain access to document, he or she must have posses a level of the document.

Now, this is governed by two rules which is stated below:

No user can have access to any information that is considered higher than their level of clearance.

Secondly, a user can write to files only that contains an equal level or lower of his clearance level, this is to stop what is called the write down effect.

It is important to note that ABC, categories determine what type of access is permitted.

Now, for the given example, since, Bob and charlie cannot read it, which shows that the file must be of top priority or importance, then Bob and Charlie needs clearance to the file,the file 2 is considered a top priority.

Therefore, the File 2 is classified as a Top Secret, (A,B,C)

You might be interested in
In a multiprogramming and time-sharing environment, several users share the system simultaneously. This situation can result in
kap26 [50]

<u>Explanation:</u>

a.

  • One user can read the private data of another user-privacy.
  • One user can prevent another user from getting anything done-denial of service.

Indeed, in any multiprogramming and time-sharing environment since the computers of users are networked together, then it is very possible for a bad actor to read the private data of another user, or even prevent another user from accessing their computer by employing a denial of service attack on the network. In other words, the network would be unable to handle the request of users since has been overloaded by another user.

b. a. Yes - if we can ensure that the operating system prevents any sharing of data between users, either for reading or writing and fairly shares the computer, then we can achieve the same level of security.

7 0
3 years ago
Employers hiring for entry-level positions in Hospitality and Tourism expect workers to learn the required skills after they sta
vovikov84 [41]
<h2>have basic skills required to do the job</h2>

Explanation:

expect workers to learn the required skills after they start:  

The must have basic skills then only they can employ to upgrade further skill

have the required skills before they start:  

We cannot expect all the skills. Skill will develop through experience too.

acquire the necessary skills through education: only if they have necessary education for performing the job, then only the company will short-list. So, this is an entry criterion.

have basic skills required to do the job: This is the right answer. This aspect is enough for an entry-level position.

8 0
3 years ago
Read 2 more answers
There is one clear definition of IT. True False
Elenna [48]

Answer:

That is False. it has more definitions not only one.

8 0
3 years ago
A. Calculate the diffusion coefficient for magnesium in aluminum at 450°C.
SIZIF [17.4K]

Answer:

a) D = 4.88 * 10^(-14) m^2 / s

b)   <em>t </em>= 1.1 hr

Solution:

a) Magnesium in Aluminum diffusion:

D = Do * exp(-Qd / RT)

  =  (1.2 * 10^(-4) m^2 / s) * exp ( - 130,000 / 8.31 * 723.15)

  = 4.88 * 10^(-14) m^2 / s

D = 4.88 * 10^(-14) m^2 / s

b) The composition remains same at say the distance Xo:

(Cx - Co) / (Cs - Co) = Constant

Xo^2 / D_{550} * <em>t </em>= Xo^2 / D_{450} * 15

D_{550} * <em>t </em>= D_{450} * 15

(1.2 * 10^(-4) m^2 / s) * exp ( - 130,000 / 8.31 * 723.15) * <em>t</em>

(4.88 * 10^(-14) m^2 / s) * 15

by, solving for <em>t </em>we get:

 <em>t </em>= 1.1 hr

So, the time required is 1.1 hr.

5 0
3 years ago
Within a major students can choose to study a specific area within major. For example a journalism student may study military jo
crimeas [40]

Answer:

Specialization

Hope this helps!

6 0
3 years ago
Other questions:
  • Write an application that encodes English-language phrases into pig Latin. Pig Latin is a form of coded language. There are many
    8·1 answer
  • Riley is using access to collect data for a science project. he is creating a report and wants to apply predefined color and fon
    6·1 answer
  • A database table contains the Group_ID and Group_Name fields. Which field can be the primary key of the table?
    5·1 answer
  • According to the Doppler effect, objects moving away from Earth would have a
    12·2 answers
  • What is true about investments and risk
    14·1 answer
  • . Convert your age into binary and then to hexadecimal. Show your work.
    5·1 answer
  • Another method that might be desired is one that updates the Goalie's jerseyNumber. This method will receive a new number of Jer
    9·1 answer
  • 2ND LAST QUESTION
    13·1 answer
  • Cual de las siguientes es una desventaja del uso de las computadoras?
    5·1 answer
  • Question 4 (5 points) If your social media accounts are___________, college admissions representatives can look at your social m
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!