subject
Computers and Technology, 14.12.2019 04:31 sim2004

Explain which implementation of the protection matrix is more suitable for the following

(a) granting read access to a file for all users.
(b) revoking write access to a file from all users.
(c) granting write access to a file to john, lisa, christie, and jeff.
(d) revoking execute access to a file from jana, mike, molly, and shane.

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 08:00
Aplan to budget time for studying and activities is referred to as a study routine. study habits. study skills. a study schedule.
Answers: 1
question
Computers and Technology, 22.06.2019 09:00
Howard is designing a chair swing ride. the swing ropes are 5 meters long, and in full swing they tilt in an angle of 29° outside chairs to be 2.75 m above the ground in full swing.
Answers: 1
question
Computers and Technology, 23.06.2019 00:30
Which one of the following is considered a peripheral? a software b mouse c usb connector d motherboard
Answers: 2
question
Computers and Technology, 23.06.2019 03:00
State 7 common key's for every keyboard
Answers: 1
You know the right answer?
Explain which implementation of the protection matrix is more suitable for the following

Questions
Questions on the website: 13722362