
Consider user accounts on a computer system with a Web server configured to
provide user Web areas. In general, this uses a standard directory name, such as
“public_html,” in a user’s home directory. However, access control needs to be properly set
to allow users (with or without user accounts on the system) to browse the webpages.
Assuming there are one main page (index.html), two pictures files (a.jpg and b.jpg) stored in
an sub-directory (Image) and one pdf file (c.pdf) stored in an sub-directory (Doc), all under
the public_html.
(a) Specify the access matrix for each directory (excluding home directory) and files that allows everyone to view the webpage.
(b) Draw a directed graph that represented to the access matrix

Step by stepSolved in 3 steps with 1 images

- Write a program that implements the FIFO and LRU page-replacement algorithms presented in this chapter. First, generate a random page reference string to each algorithm, and record the number of page faults incurred by each algorithm. Implement the replacement algorithms so that the number of page frames can vary from 1 to 7. Assume that demand paging is used.arrow_forwardWrite a Pandas program to display a summary of the basic information about a specified DataFrame and its data. And then get the first 3 rows, two specific columns and some specific cells of a given DataFrame.arrow_forwardPart 2: Encryption Objective: Develop a program that encrypts a plaintext file by XORing 128-bit blocks of the file with a key repeatedly until the entire file is encrypted. Details: • The plaintext file will be a book from Project Gutenberg. • The encryption method should use the XOR operation on the file, 128 bits at a time, with the key. • Each 128-bit block is XORed with the same key. • The program should work from the command line and accept three parameters: o The name of the key file o The name of the plaintext file o The desired name of the resulting ciphertext file Note: This encryption method is not supposed to be secure. Usage: $ ./bad_streamcipher_enc kf pt ctarrow_forward
- Consider a system where free space is kept in a free-space list. a. Suppose that the pointer to the free-space list is lost. Can the system reconstruct the free-space list? Explain your answer. b. Consider a file system similar to the one used by UNIX with indexed allocation. How many disk 1/0 operations might be required to read the contents of a small local file at /a/b/c? Assume that none of the disk blocks is currently being cached. c. Suggest a scheme to ensure that the pointer is never lost as a result of memory failure.arrow_forwardA machine has a memory of 64 frames, with each frame being 1K bytes. Current free-frame list is: O×2E, Ox27, Ox37, Ox25, OX0C, Ox04, OXOE, Ox09, O×1D, Ox14, Ox16, Ox07, 0x22, 0×3E, and Ox30. You just scheduled a process that requires 10 frames. Show the resulting page table. Show the translation of logical address Ox240B and OX5A32 into physical addresses using your page table. Express your result in hex.arrow_forwardYou're not sure what the data represents, but you've been told it uses a dual layer obfuscation as follows: Hex with "\x" delimiter Base64 with standard alphabet After you de-obfuscate the given Hex dats, what information do you find? Do some research. What have you found? NOTE: DO NOT BROWSE THESE! Hint: focus on the strings following "/". Essentially, this practical has two stages: 1. De-obfuscate the Hex and give the output. 2. Research the nature of what you found and identify it.arrow_forward
- Assuming that we have a list of audio music channels, and the user system wants to traverse them one after another or on a channel- For instance, some user systems want only English channels to function and do not wantto process other kinds of channels. Thus, we can supply the client with a collection of channels and let them publish the channels through it and determine if they will be processed.Which design pattern you should adopt? Describe with respect to the full consistent format.arrow_forwardDevelop an algorithm in the form of a Raptor to identify and display the names of stocks whose share prices are greater than the mean share price and lower than half the highest share price. The stock names and share prices are stored in the text file stocks.txt, attached, where each stock record is stored on two consecutive lines (stock name in the first, and the share price in the second). The solution must work for any arbitrarily large file containing arbitrary values for stock names and share prices (i.e. the number of stocks must not be hard coded in the algorithm). The algorithm must display the names and share prices of the identified stocks, in the following format: CNE Apex: 50.89BCD Micro: 123.23… etc. Hint: Read and store stock names and prices in two separated arrays. Pls. use Raptorarrow_forwardsee imagearrow_forward
- Sockets are low-level networking interfaces between computers. Many programming languages come standard with socket libraries for creating socket connections. In this lab, we’ll study the usage of networking sockets in Python to write a custom client/server program. Client/Server source code as a ZIP or RAR file in D2L Word document outlining the description of your program. The word document should contain screenshots containing your name on the VM and reports of what’s occurring in them. Demonstrate your socket solution accomplishes the following: The client connects to the server Client and server successfully exchange messages Following the TCP stream in Wireshark Identifying the message sent in Wireshark Any additional functionality you created in your solution. please use python.arrow_forwardThe WIMP layout is used in computer displays. Most WIMP implementations adhere to the Desktop metaphor, which links common actions to their physical counterparts. A file may be relocated by selecting it and dragging it to a new location, such as a folder or a filing cabinet. Provide two actions and their corresponding real-world instances.arrow_forward1. Build a web crawler function that starts with a URL representing a topic (a sport, your favorite film, a celebrity, a political issue, etc.) and outputs a list of at least 15 relevant URLs. The URLs can be pages within the original domain but should have a few outside the original domain.arrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education





