What are some other modes of access that users might want to apply to code or data, in addition to the common read, write, and execute permission?
What will be an ideal response?
Some
possible
answers:
Limit
the
number
of
concurrent
accesses;
limit
types
of
processes
that
can
access;
limit
times
of
day
for
access.
Computer Science & Information Technology
You might also like to view...
In Outline view, body text is text that does not have a heading style applied
Indicate whether the statement is true or false
Computer Science & Information Technology
The command ________ executes a Java application.
a. run b. javac c. java d. None of the above
Computer Science & Information Technology