1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alchen [17]
3 years ago
14

Consider a computer system with three users: Alice, Bob, and Cyndy. Alice owns the file alicerc, and Bob and Cyndy can read it.

Cyndy can read and write the file bobrc, which Bob owns, but Alice can only read it. Only Cyndy can read and write the file cyndyrc, which she owns. Assume that the owner of each of these files can execute it.
a. Create the corresponding access control matrix.
b. Cindy gives Alice permission to read cyndyrc, and Alice removes Bob's ability to rad alicerc. Show the new access control matrix.
Computers and Technology
1 answer:
MAXImum [283]3 years ago
6 0

Answer:

Following are the solution to this question:

Explanation:

For point a:

                      alicerc \ \ \ \ \ \ \ \ \ \ \  bobrc \ \ \ \ \ \ \ \ \ \ \ \ \ \ cyndyrc\\

Alice \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ ox \ \ \ \ \ \ \ \ \ \ \ \ \ \ r\\\\ Bob \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ r \ \ \ \ \ \ \ \ \ \ \ \ \ \  ox \\\\Cyndy \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ r\ \ \ \ \ \ \ \ \ \ \ \ \ \ rw \ \ \ \ \ \ \ \ \ \ \ \ \ \ orwx

For point b:

               alicerc \ \ \ \ \ \ \ \ \ \ \ \ \ \ \  bobrc \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ cyndyrc

Alice \ \ \ \ \ \ \ \ \ \ \ \ \ \  ox \ \ \ \ \ \ \ \ \ \ \ \ \ \ r \ \ \ \ \ \ \ \ \ \ \ \ \ \  r\\\\Bob \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ ox \\\\Cyndy \ \ \ \ \ \ \ \ \ \ \ \ \ \ r \ \ \ \ \ \ \ \ \ \ \ \ \ \  rw \ \ \ \ \ \ \ \ \ \ \ \ \ \ orwx

You might be interested in
Suppose the program counter (pc) is set to 0x2000 0000. is it possible to use the jump (j) mips assembly instruction to set the
lesya [120]
<span>With jump-YES. SInce we know that the instruction format of the jump instruction is 6 bits opcode and 26-bit jump address we can sufficiently encode the given address in the 26-bit space.</span>
7 0
4 years ago
The number of bits used to store color information about each pixel is called ____.
Nadya [2.5K]
The answer to this question is Bit Depth.
Bit depth usually determines the number of bits that is used to create colors on a single pixel.
This usually will influence both the quality of an image or a video and the amount of time needed for users to buffer the image and videos.
6 0
4 years ago
Which of the following is considered a period cost in absorption​ costing? A. variable manufacturing overhead costs B. fixed man
sasho [114]
Ccccccccccccccccccccc
5 0
3 years ago
What feature allows you to access previous copies of a document on OneDrive?
irga5000 [103]

Version history feature

OneDrive's Version history feature allows you to view older versions of an Office Online document. If you find a version you want, you can then restore it, moving it to the top of the list as the latest version of the file.

3 0
3 years ago
Read 2 more answers
WILL GIVE BRAINLIEST
malfutka [58]

Answer:

25

Explanation:

259÷10=25

4 0
3 years ago
Read 2 more answers
Other questions:
  • Answer how do you properly dispose of a large box of assorted computer parts, including hard drives, optical drives, computer ca
    11·1 answer
  • What possible effects could cyber attack have on Johannesburg stock exchange
    6·1 answer
  • When deciding how to invest your money, which of the following is least important to know
    7·1 answer
  • What is wrong with each of the following?
    6·1 answer
  • Animations and transitions are added from the _____.
    11·2 answers
  • Which entity might hire a Computer Systems Analyst to help it catch criminals?
    12·2 answers
  • How do you change your grade level
    10·1 answer
  • What is the best memory to be used? Why?
    8·1 answer
  • You've adjusted your bicycle seat so it's centimeters from the ground how high should your handlebars be
    10·2 answers
  • Which addresses represent valid local loopback addresses? check all that apply.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!