Multiple user identifications and passwords

Assignment Help Operating System
Reference no: EM131029776

Problem 1. Assume  you maintain a database containing confidential patient information and need to restrict UPDATE to only  5 individuals, allow only 15 others to view the database, and disallow any database access to all other users. Which access level would you assign to the 20 individuals in the first two groups and to the  remaining users? For each of the three groups, describe every type of access granted to each one. This is using access levels including read/write, read-only, execute-only, and no access. 

Problem 2. Given multi-network access, it's not unusual for users to have multiple user identifications and passwords. How would you manage these multi-password situations? Describe both the advantages and disadvantages of your solution.

 

Reference no: EM131029776

Questions Cloud

Loan processing operation that processes an average : Determine the utilization and the efficiency for each of the following situations: A loan processing operation that processes an average of 7 loans per day. The operation has a design capacity of 10 loans per day and the effective capacity of 8 loans..
The union had created a sex-based hostile work environment : The EEOC filed a suit against NEA-Alaska, a labor union representing teachers and other public school employees, alleging that the union had created a sex-based hostile work environment for three female employees. The female employees testified that ..
Star topology network : Explain the main advantages and disadvantages of a STAR topology network. In your own words, described the functional differences between a bridge and a gateway. Give an example of each.
Allocation of resources and maximizing the intelligence : By improving the allocation of resources and maximizing the intelligence with which resources are identified and consumed, an organization can extend its finite skills and capabilities further than ever before. As a project manager of a global projec..
Multiple user identifications and passwords : Given multi-network access, it's not unusual for users to have multiple user identifications and passwords. How would you manage these multi-password situations? Describe both the advantages and disadvantages of your solution.
Those options affect each partys negotiation strategy : You are under contract with your current employer for one year at a time. You have been offered a renewal contract that will commence three months from now; however, by the terms of the offer, you must accept it within the next ten days or it will be..
Define value and define process : Define "value", define "process", and describe the relationship between the two. By value, think in terms of delivering value to customers in the form of products or services.
How should adel decide whom to take on the negotiation : Adel works for a major airplane manufacturer in the Midwest. He must travel to Washington, D.C., to negotiate revisions to a contract with the U.S. military. The key issues presented are cost overruns due to complex engineering changes. What factors ..
Public announcement rather than merely proceeding with plans : You may recall that after Martha Stewart's criminal conviction in 2004, she announced she would serve her prision sentence while awaiting the processing of her appeal. After making that public announcement, she sought the court's assistance in commen..

Reviews

Write a Review

Operating System Questions & Answers

  Currently the atm is idle

Currently the ATM is idle. Find the probabilities that, in 3 minutes, the ATM will be idle; will be serving one customer with no one in the queue; will be serving one customer with one customer waiting in the queue

  When a customer buys an item from the store

When a customer buys an item (or several) from the store, several changes to database tables will occur. Explain what those might be.

  Question about throughput and capacity

Throughput and capacity are determining factors for effectiveness of a system more so than processor speed?

  Explain an ip address

Explain an IP address. Explain Class A, B, and C networks. Are a MAC address and an IP address the similar thing?

  What do you think would be a "safe" inventory level

What are the benefits of the just-in-time inventory management sys- tem to Carle's Cath Lab?

  Create a wbs for the b&b problem

Create a WBS for the B&B problem Feasibility Analysis Discuss Web-based options with Tom and Sue. Determine if Web-based or stand-alone system.

  Differences between logical and physical security

With the help of analogy to explain the differences between logical and physical security to a nontechnical person.

  Compare the allocation of t1 bandwidth when using ppp

Compare the allocation of T1 bandwidth when using PPP and Frame Relay as the layer 2 protocols. Discuss the impact of the differences on WAN structure and cost

  What scheme does the kernel in unix system v follow

What scheme does the Kernel in Unix System V follow while choosing a swap device among the multiple swap devices? 2) What is a Region?

  Explain time which you have used quality-of-service in your

you were hired as a network engineer for a small firm that had just recently implemented a voice-over internet protocol

  Creating a child process

Modify the shell interface program so that is provides a history feature that allows the user to access the most recently entered commands.

  Use m8c assembler directives to allocate

Use M8C assembler directives to allocate the constants in ROM. Assume that they are all in the "lit" area.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd