1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paraphin [41]
3 years ago
15

Explain which implementation of the protection matrix is more suitable for the following operations___________.

Computers and Technology
1 answer:
Mars2501 [29]3 years ago
5 0

Answer:

See explanation.

Explanation:

(a)

• To grant read access to a file for all users, access control list (ACL) is the best option.

o Create a group called 'all' with all users in it (assume the group name as 'all').

o Make a ACL for the file name with ACL as 'all:R'.

• It can also be done with capability list. With capability lists. it is sufficient to place the capability for the file in appropriate place in a capability system.

(b)

• To revoke write access for a file from all users, access control list (ACL) is the best option.

o Edit the ACL by removing the write access.

o If the group 'all: W' was the entry added to ACL, remove it from the ACL.

• It can also be done with capability list by changing the check field stored with the object.

(c)

• To grant write access to a file to John, Lisa. Christie and Jeff either the access control list method or the capability list can be used.

• It can be implemented with ACL as follows:

o Construct ACL for the file for all users,

o Then the ACL for file would be 'Christie, Jeff. John, Lisa: W'.

• It can be implemented using capability list method as follows:

o First construct the capability list for the file, 'file:W'.

o Then assign the above capability for each user named John, Lisa, Christie and Jeff.  

(d)

• To revoke execute access for a file from Jana, Mike, Molly, and Shane, access control lists are the only possibility.

o Edit the ACL by removing the execute access.

Hope this hels!

You might be interested in
How is a transaction verified on a cryptocurrency network?.
Agata [3.3K]

Answer:

By being a part of a block to a block chain and each block in the block chain is precisely connected to the block that was before it.

Explanation:

I Hope This Helps You

6 0
2 years ago
A proper divisor of a positive integer $n$ is a positive integer $d < n$ such that $d$ divides $n$ evenly, or alternatively i
juin [17]

Answer:

The program written in Python is as follows:

<em>See Explanation section for line by line explanation</em>

for n in range(100,1000):

     isum = 0

     for d in range(1,n):

           if n%d == 0:

                 isum += d

     if isum == n * 2:

           print(n)

Explanation:

The program only considers 3 digit numbers. hence the range of n is from 100 to 999

for n in range(100,1000):

This line initializes sum to 0

     isum = 0

This line is an iteration that stands as the divisor

     for d in range(1,n):

This line checks if a number, d can evenly divide n

           if n%d == 0:

If yes, the sum is updated

                 isum += d

This line checks if the current number n is a double-perfect number

     if isum == n * 2:

If yes, n is printed

           print(n)

<em>When the program is run, the displayed output is 120 and 672</em>

4 0
3 years ago
What is the basic purpose of Google calendar?
goldenfox [79]
The basic purpose of a google calendar is basically the same as a regular calendar. it is used to keep track life's important events all in one place.    
7 0
3 years ago
Read 2 more answers
Due to a fire at ABC Software Solutions, all
zaharov [31]

Answer:

chaos among people who worked in the company.

6 0
2 years ago
Am i in elementary yes no
IgorLugansk [536]

Answer:

no

Explanation:

7 0
3 years ago
Other questions:
  • When doing a complex presentation, which of the following would be the best tool to begin designing your presentation?
    11·2 answers
  • A form of Internet identity theft involving phony e-mail messages asking customers to update their credit card numbers, account
    7·1 answer
  • Your computer has gradually slowed down. What's the most likely reason?
    8·1 answer
  • Which statement is not true? An audit objective for systems maintenance is to detect unauthorized access to application database
    8·1 answer
  • Which HTML tag is used to add a paragraph to a web page?
    15·1 answer
  • Implement function bin2dec that takes a binary number bin_num as a string argument and prints out the corresponding decimal numb
    9·1 answer
  • Which of the following is one of the options available on the Columns menu on the
    6·1 answer
  • The I/O modules take care of data movement between main memory and a particular device interface.A. TrueB. False
    9·1 answer
  • Checking for and correcting errors may need to be done numerous during which of the following phases of the software development
    7·1 answer
  • What are three coding languages that are used to build websites?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!