The following is an access verification technique, listing several files and the access allowed for a single use. Identify the control technique used here and for each, explain the type of access allowed . a. File_1 R-E- b. File_12 RWE c. File_13 RW-- d. File_14 --E- 2. . The following is an access verification technique, listing several users and the access allowed for File_13. Identify the control technique used here and for each and explain the type of access allowed. Finally, describe who is included in the WORLD category. a. User_10 --E- b. User_14 RWED c. User_17 RWE- d. WORLD R--- .