Answer:
"student ID, number and title" is the correct answer for the above question.
Explanation:
- The primary key is used to read the data of a table. It can not be duplicated or null for any records.
- The "student ID" is used to identify the data of the "student" entity. It is because the "student ID" can not be duplicated or null for any records. It is because every student has a unique "student ID".
- The "number" is used to identify the data of the "Locker" entity. It is because the "number" can not be null or duplicate for any records. It is because every locker has a unique "number".
- The "title" is used to identify the data of the "Movie" entity. It is because the "title" can not be Null or duplicate for any records. It is because every movie has a unique "title".
Answer:
1. (1) Travel guide, (2) Study notes for students , (3) Some creative ideas that I want to share with others
2. (1) he or she would have some work related to the website I have created, (2) he or she would be interested in knowing about something which would be available in my created website
3. I want to learn how to add photos in the html pages
Answer:
The three components used by defense in depth strategy are:
1) Physical controls
2) Technical controls
3) Adminstrative controls
Explanation:
Defense in depth is a strategy using multiple security measures to protect to protect the integrity of information. Today's cyberthreat are evolving and growing rapidly. Defense in depth is a solid, comprehensive approach to utilizing a combination of advanced security tools to protect critical data and block threats before they reach endpoint.
If one line of defense is compromised, additional layers of defense are in place to ensure that cracks don't slip through the cracks.
Defense in depth strategy uses three components which are:
* physical controls: are anything that physically limits or prevents access to IT systems. Examples are security guards and locked doors.
* Technical controls: are hardware or software whose purpose is to protect systems and resources. Examples are disk encryption, fingerprint readers and authentication.
* Adminstrative controls: are an organization's policies and procedures which ensures that there is proper guidance are available in regards to security and that regulations are met. Examples are hiring practices and data handling procedures.
Limited access to a document usually means that the creator of the document is able to limit how much access one person is able to get.