Explain two-bit system noninterference-secure

Modify the two-bit system in the first example as follows: Whenever a High operation is performed, the High state bit is output. Whenever a Low operation is performed, the Low state bit is output. The initial state is not output. The initial state is not output (in contrast to the example). Is this version of the two-bit system noninterference-secure with respect to Lucy? Why or why not?

find the cost of your paper