Given the protection state shown in Figure and the rules shown in Figure, do the following.
a. Explain how S3 can cause the protection state to be changed so that it has write access to F2.
b. Specify two different ways by which S3 can obtain read permission to F1.
c. Explain whether S3 can obtain seek permission to D1 from S1. Why or why not?