Design a file security mechanism that alleviates the need for the “set user ID” feature.

What will be an ideal response?


There is no real answer here; the exercise should lead to a discussion of issues. One might use an
Access Control List (found in other operating systems) to solve the problem.

Computer Science & Information Technology

You might also like to view...

Which of the following statements about virtual functions is false?

a. They allow the program to select the correct implementation at execution time. b. They can use either static or dynamic binding, depending on the handles on which the functions are called. c. They do not remain virtual down the inheritance hierarchy. d. They can be called using the dot operator.

Computer Science & Information Technology

Initial exchanges of public keys are vulnerable to the man-in-the-middle attack. Describe as many defences against it as you can.

What will be an ideal response?

Computer Science & Information Technology

Logging on to a virtual private network prohibits others from capturing your network traffic when you are connected to a Wi-Fi hotspot

Indicate whether the statement is true or false

Computer Science & Information Technology

The picture or pattern that displays on the Windows desktop is called the desktop ________

Fill in the blank(s) with correct word

Computer Science & Information Technology