1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Paraphin [41]
4 years ago
15

Explain which implementation of the protection matrix is more suitable for the following operations___________.

Computers and Technology
1 answer:
Mars2501 [29]4 years ago
5 0

Answer:

See explanation.

Explanation:

(a)

• To grant read access to a file for all users, access control list (ACL) is the best option.

o Create a group called 'all' with all users in it (assume the group name as 'all').

o Make a ACL for the file name with ACL as 'all:R'.

• It can also be done with capability list. With capability lists. it is sufficient to place the capability for the file in appropriate place in a capability system.

(b)

• To revoke write access for a file from all users, access control list (ACL) is the best option.

o Edit the ACL by removing the write access.

o If the group 'all: W' was the entry added to ACL, remove it from the ACL.

• It can also be done with capability list by changing the check field stored with the object.

(c)

• To grant write access to a file to John, Lisa. Christie and Jeff either the access control list method or the capability list can be used.

• It can be implemented with ACL as follows:

o Construct ACL for the file for all users,

o Then the ACL for file would be 'Christie, Jeff. John, Lisa: W'.

• It can be implemented using capability list method as follows:

o First construct the capability list for the file, 'file:W'.

o Then assign the above capability for each user named John, Lisa, Christie and Jeff.  

(d)

• To revoke execute access for a file from Jana, Mike, Molly, and Shane, access control lists are the only possibility.

o Edit the ACL by removing the execute access.

Hope this hels!

You might be interested in
A program that converts a program to binary all at once and runs the entire program when finished with the conversion
Paraphin [41]

A program that converts a program to binary all at once and runs the entire program when finished with the conversion is known as a compiler.

<h3>What is a compiler? </h3>

A Compiler is a computer program that transforms a whole program into machine code at once. The compiler does this by converting source codes written in a programming language to another programming language such as:

  • assembly language,
  • object code etc.

The compiler does this in order to build an executable program.

Learn more about the compiler here:

brainly.com/question/10848659

4 0
2 years ago
Hoda wants to create a new presentation in PowerPoint with existing graphics and designs. What is the easiest and fastest way fo
Paul [167]

Answer: a

Explanation:

6 0
4 years ago
The technology Herman Hollerith created in the 1880s began the modern-day data processing function in computers.
adell [148]

Answer:

Punch Card Machine

Explanation:

The punch cards or the punched cards are also termed as the Hollerith cards or we also know them as the IBM cards. And they happen to be the paper cards where holes can be punched with the help of the hands or with the help of the machine for representing the computer instructions or data. And these were used on quite a large scale for inputting the data when we talk of the early computers. And this technology was developed by the Herman Hollerith.

7 0
4 years ago
Is it true that if the user log out the computer will turn off automatically​
sergiy2304 [10]
Yes that is a true statement
8 0
3 years ago
Read 2 more answers
Intellectual ______ is the legal term for ownership of intangible assets such as ideas, art, music, movies, and software.
77julia77 [94]

Answer:

<u>Property</u>

Explanation:

Intellectual Property (IP) is the lawful protection of human idea/intellect by unauthorised users. These human intellects are intangible assets that have both moral and commercial value. They include ideas, art, music, movies, software e.t.c.

Common types of Intellectual property include

  • Copyrights
  • patents
  • Trade Marks
  • Trade Secrets
6 0
3 years ago
Read 2 more answers
Other questions:
  • A user complains that he cannot access a particular website, although he is able to access other websites. at which layer of the
    5·1 answer
  • HELP URGENT
    12·2 answers
  • What is bigger 4 liters or one gallon
    13·1 answer
  • The power saving state that saves all work to the hard drive and powers down the system is known by what term?
    11·1 answer
  • Which of these devices collects the most information on network activity?
    11·1 answer
  • Analyze the code and identity the value of variable a,b and c after the code execution. int a=40, b=50, c=60; if(! (a&gt;=40)) b
    15·1 answer
  • Jamal wants to write a program that will find the 10 most common words in Romeo and Juliet. Which of the following constructs wi
    5·1 answer
  • Which sentence describes a biotechnology method of treating sulfur liquor in the paper industry?
    11·1 answer
  • Jennifer has written a short story for children. What should be her last step before she submits the story for publication?
    6·1 answer
  • 1. What are the main uses for Protein in the body?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!