kjones3318 kjones3318 26-10-2022 Computers and Technology contestada analyze and compare the access control models in terms of how access control lists (acl) are written and determine which statement accurately explains the discretionary access control (dac) model.