You are configuring an Access Control List (ACL) for a file on a Linux server. The system administrators should be able to read and modify the file, but not execute it. The developers should be able to read and execute the file, but not modify it. Which of the following ACL setups would best meet these requirements?