Database System Concepts
7th Edition
ISBN: 9780078022159
Author: Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher: McGraw-Hill Education
expand_more
expand_more
format_list_bulleted
Question
Consider a computer system with three users: Alice, Bob, and Cyndy. Alice owns the file alicerc, and Bob and Cyndy can read it. Cyndy can read and write the file bobrc, which Bob owns, but Alice can only read it. Only Cyndy can read and write the file cyndyrc, which she owns. Assume that the owner of each of these files can execute it.
- Create the corresponding access control matrix.
- Cyndy gives Alice permission to read cyndyrc, and Alice removes Bob's ability to read alicerc. Show the new access control matrix
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
This is a popular solution
Trending nowThis is a popular solution!
Step by stepSolved in 3 steps
Knowledge Booster
Similar questions
- Write a java program that will solve the problem: For a given ListADT that contains Items with numerical key value (integer), reorder it into two partitions of equal size such as the difference between the sum of those integers in the first partition and the second partition would be minimal. The program should have a class code separate from the main code. 1. Use a separate file to store the graph data. The name of the file should be "yourname_floyd.dat". 2. Use a few (3- 4) different graphs to compare actual performance (execution time).arrow_forwardjava program For this question, the server contains the id, name and cgpa of some Students in a file. The client will request the server for specific data, which the server will provide to the client. Server: The server contains the data of some Students. For each student, the server contains id, name and cgpa data in a file. Here's an example of the file: data.txt101 Saif 3.52201 Hasan 3.81.... Create a similar file in you server side. The file should have at least 8 students. The client will request the server to provide the details (id, name, cgpa) of the Nth highest cgpa student in the file. If N's value is 1, the server will return the details of the student with the highest cgpa. if N's value is 3, the server will return the details of the student with the third highest cgpa. If N's value is incorrect, the server returns to the client: "Invalid request". Client: The client sends the server the value of N, which is an integer number. The client takes input the value of N…arrow_forwardI may need help with this project: A combined cycle gas turbine power station requires a webbased system to manage the storage and installation of spare parts and the acquisition of new parts from the Central Storage Warehouse (the CSW). The powerstation maintains an inventory of all the parts it owns comprising: part name, description and specification. There are many copies of some parts – each part has a unique ID, known as an asset tag number. The asset tag number is used when there is damage to particular parts. The power station also keeps a catalogue of all the possible spare parts types used.Only registered maintenance engineers and team leaders are allowed to install and repair parts on the plant. Maintenance engineers and team leaders can use the parts catalogue tosearch for part types and can also search the parts inventory. Maintenance engineers work in teams, currently: electrical, mechanical and environmental. Each team has its own team lead. However, the system needs to…arrow_forward
- Write a class FileConverter with a constructor that accepts a String file name as its argument. It should store filename as its attribute (with a accessor getFilename(). The class should have the following methods: • createUpperCaseFile(): Accepts a String parameter targetFilename. It will open up both the file specified in class attribute filename and the method parameter targetFilename. Then it will convert all lines of the class attribute filename to upper case and write it to target file, line by line. • createRowCharCountFile(): Accepts a String parameter targetFilename. It will open up both the file specified in class attribute filename and the method parameter targetFilename. Then it will count the number of chars in each line of the class attribute filename and write it to target file line by line. The class must come with a main() method, which will create an object instance and generate two target files based on the source file, one all upper case, and another row char count.arrow_forward#4. Task Programming Language and Technologies▪ C# Programming Language.▪ Visual Studio 2019. Build a method called Encrypt to receive a string and return another string.The method will be a static.Build a method called Decrypt to return original string.The encryption method will be a very simple one: to encrypt add 1 to eachcharacter and to decrypt subtract 1 to each character.Note: we do not need to create any object of type Encrypter..arrow_forwardWhen you compile and run packaged software from an IDE, the execution process can be as easy as clicking a run icon, as the IDE will maintain the classpath for you and will also let you know if anything is out of sorts. When you try to compile and interpret the code yourself from the command line, you will need to know exactly how to path your files. Let us start from c:\Code directory for this assignment. Consider a java file who's .class will result in the com.CITC1318.course package as follows: package com.CITC1318.course; public class GreetingsClass { public static void main(String[] args) { System.out.println("$ Greetings, CITC1318!"); } } This exercise will have you compiling and running the application with new classes created in a separate package: 1. Compile the program: c:\Code>javac -d . GreetingsClass.java 2. Run the program to ensure it is error-free: c:\Code>java -cp . com.CITC1318.course.GreetingsClass 3. Create three classes named Chapter1, Chapter2, and Chapter3…arrow_forward
- Java Computer Programming. Each robot: - Has a name (attribute name: string) - Has a position: given by the integer attributes x and y. - Has a direction: given by the direction attribute that takes one of the values "North", "East", "South" or "West". The name, position and direction of a robot are given to it at the moment of its creation - Can advance one step forward: with method without parameter advance () - Can turn right 90 ° to change direction (if its direction was "North" it becomes "East", if it was "East" it becomes "South", etc.): with the method without parameter right(). Robots cannot turn left. - Can display its detail with the method detail() Detail: name, position, and current direction.arrow_forwardmodule is csci262 system security. Need help on this. TIA!arrow_forwardWrite a Python program for a movie database management system. The program should allow users to add movies, remove movies, and display the current collection. Each movie has a title, director, release year, and rating. The program should have the following features: 1. A menu-based system that allows users to choose between adding a movie, removing a movie, and displaying the collection. 2. When adding a movie, the user should input the title, director, release year, and rating. 3. When removing a movie, the user should input the title of the movie to be removed. 4. Display the current movie collection with details of each movie, including title, director, release year, and rating. Make sure to include comments that explain the purpose of the program, input and output details, and any complex logic. Use self-documenting variable names, white spaces, and indentation for readability. Test your program with sample data to ensure correct functionality and provide screenshots of two…arrow_forward
- Scenario: You have been tasked with building a URL file validator for a web crawler. A web crawler is an application that fetches a web page, extracts the URLs present in that page, and then recursively fetches new pages using the extracted URLs. The end goal of a web crawler is to collect text data, images, or other resources present in order to validate resource URLs or hyperlinks on a page. URL validators can be useful to validate if the extracted URL is a valid resource to fetch. In this scenario, you will build a URL validator that checks for supported protocols and file types.arrow_forwardComplete the copier simulation of How To 7.1. Your program should first show the main menu: U)ser A)dministrator q)uit For a user, prompt for the ID and the number of copies, increment the appropriate account, and return to the main menu. For an administrator, show this menu: B)alance M)aster P)roject In the balance option, show the balances of the master account and the ten project accounts. In the master option, prompt for a user ID and link it to the master account. In the project option, prompt for user and project IDs. Afterward, return to the main menu.arrow_forwardDevelop a data type for a buffer in a text editor that implements the following API:public class BufferBuffer() create an empty buffervoid insert(char c) insert c at the cursor positionchar delete() delete and return the character at the cursorvoid left(int k) move the cursor k positions to the leftvoid right(int k) move the cursor k positions to the rightint size() number of characters in the bufferAPI for a text bufferHint : Use two stacksarrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education