Design a file security mechanism that alleviates the need for the “set user ID” feature.

What will be an ideal response?

There is no real answer here; the exercise should lead to a discussion of issues. One might use an
Access Control List (found in other operating systems) to solve the problem.

Computer Science & Information Technology

You might also like to view...

How does a computer with more than one IPv6 enabled network adapter know which network adapter to use when pinging a link local address?

Computer Science & Information Technology

If you change the underlying data on which the PivotTable report is based, you must also ________ or update the PivotTable to reflect the new data

A) reopen B) list C) save D) refresh

Computer Science & Information Technology