analyze and compare the access control models in terms of how access control lists (acl) are written and determine which statement accurately explains the discretionary access control (dac) model.