Question

Question 2 4 pts 2. Bob and Alice are typical users who share a computer. Which of the following are true of a file sharing pQuestion 4 4 pts 4. Bob and Alice are typical users who share a computer. Which of the following are true of a user isolation

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Answer 2:-
BOB can create,read and modify his own file
BOB and Alice can read files that others can't read
BOB and Alice can share files that other can't read
BOB can read Alice's files

Answer 3:-
BOB can read,create and modify his own files
BOB and Alice can particularly read files that others can't read
BOB can read typical files that Alice creates

Answer 4:-
BOB can read, create and modify his own files
BOB can read typical files that Alice creates
Alice can read and write applicaction files
BOB can modify typical files that Alice creates

Answer 5:-
BOB can read, create and modify his own files
BOB can read typical files that Alice creates
BOB and Alice can share files that other can't read
BOB and Alice can particularly read files that others can't read

Add a comment
Know the answer?
Add Answer to:
Question 2 4 pts 2. Bob and Alice are typical users who share a computer. Which...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • (4 pts) Say that a system has 10 users, each of which has 200 files in...

    (4 pts) Say that a system has 10 users, each of which has 200 files in their home directory. Each user should have read and write access to every file in their own home directory. If this policy were expressed as a DAC matrix, how many nonempty entries would the matrix need to have? Express this policy as a single if-then rule, such as might be used in an Attribute-based Access Control (ABAC) system. PLEASE GIVE ONE WORD OR ONE...

  • D Question 18 4 pts Which of the following statements is incorrect about Management of Public...

    D Question 18 4 pts Which of the following statements is incorrect about Management of Public Keys? • public-key cryptography makes it possible for people who do not share a common key in advance to communicate securely; if Alice and Bob do not know each other and Alice wants to obtain Bob's public key, he can simply post it on his web site an organization that certifies public keys is called a Certification Authority (CA), it issues aj certificate after...

  • visual basic help DI Question 3 2 pts You may only bind an object to a control that the computer creates for you O True O False D | Question 4 2 pts The Do..Loop statement can be used to code b...

    visual basic help DI Question 3 2 pts You may only bind an object to a control that the computer creates for you O True O False D | Question 4 2 pts The Do..Loop statement can be used to code both a pretest loop and a posttest loop. True False Question 5 2 pts You can prevent many unintentional errors from occurring in an application by declaring the variables using the maximum scope needed. True False 2 pts Question...

  • Choose one option that either fills in the blank or answers the provided question. (2.5 pts...

    Choose one option that either fills in the blank or answers the provided question. (2.5 pts each) Lis data about relationships. • Connection data Capital data Content data • Communication data 2. Choose one statement out of the following statements that is true about personal information systems. Personal information systems that support a particular department are called workgroup information systems Adapting to changes in personal information systems is extremely difficult and time consuming. • Personal information systems have a single...

  • James and Edna Smith are a childless married couple who lived apart for all of 2016....

    James and Edna Smith are a childless married couple who lived apart for all of 2016. On December 31, 2016, they were legally separated under a decree of separate maintenance. Which of the following is the only filing status choice available to them for 2016? 1) Married filing joint return. 2) Married filing separate return. 3) Head of household. 4) Single. Question 2 Percy Peterson received a grant from the Department of Education for a special research project on education....

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • Read the case study "Google, Apple, and Facebook Struggle for Your Internet Experience" on page 255....

    Read the case study "Google, Apple, and Facebook Struggle for Your Internet Experience" on page 255. Then discuss the advantages and disadvantages for each company. BUSINESS PROBLEM-SOLVING CASE Google, Apple, and Facebook Battle for Your Internet Experience Apple has a legacy of innovation on its side. In Three Internet titans Google, Apple, and 2011, it unveiled the potentially market disrupting Facebook are in an epic struggle to dominate your Siri (Speech Interpretation and Recognition Internet experience, and caught in the...

  • i have the case study question with the answers but i need help to re-write the...

    i have the case study question with the answers but i need help to re-write the answers. please see the attached files Case Study Analysis (CSF3003) Assessment Description and Requirements CLO1: Case Study 1 Ahmad lef home to study master and PhD in Australia. He has fees for the first semester only. After he arrived to Sydney and settled down, he start looking for a part-time job to save money for the next term. Ahmad has some experience on making...

  • 1. Private data fields: name (of String type, initialized to “Bob”), endurance (of int type, initialized to 4) and happiness (of int type, initialized to 3);

    Language: JAVAPart a: Write a class called Geniegotchi with:1. Private data fields: name (of String type, initialized to “Bob”), endurance (of int type, initialized to 4) and happiness (of int type, initialized to 3);2. Public methods:-void setName(String newName) : renames Genie with newName, printsnewName confirmation to screen;void setName(String newName) : renames Genie with newName, printsnewName confirmation to screen;- intgetEndurance() : returns current endurance;-intgetHappiness() : returns current happiness;-void feed() : this method increases current endurance by 1 if endurance is less...

  • Please see the articles below… 1.  What is your opinion on the subject? 2.  Which ethical views (i.e.,...

    Please see the articles below… 1.  What is your opinion on the subject? 2.  Which ethical views (i.e., utilitarian view, moral rights view, justice view, practical view) you feel are being used by both sides of the argument (i.e., for and against downloading) to justify their positions? High Court Enters File-Sharing Spat; Justices Must Determine Software Providers' Liability For Copyright Violations by Anne Marie Squeo. Wall Street Journal. (Eastern edition). New York, N.Y.: Mar 30, 2005. pg. A.2 WASHINGTON -- The Supreme...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT