1. Compare the authorization model used by the network operating systems (NOS) to that used by the old stand-alone operating systems.
2. List and discuss the most common access privileges in a computing system.
3. Discuss the three components of a global access model.
4. Physical access to resources is essential and must be the most restricted. Why?