Answer:
Directive
Explanation:
A directive access control is used to direct, confine, or control the actions of subject to force compliance with security policies. Some examples of direct access controls are: security guards, guard dogs, posted notifications, monitoring, supervising, work task procedures, and awareness training. It can also be categorized by how it is implemented; for example, it can be administrative, logical/technical, or physical.
Answer:
it goes to the deleted items area
Explanation:
but it also depends on where you deleted it on
Answer:
Maybe take away the 'xtra'
Integrity constraints are enforced by The database designer.
<h3>What are Integrity constraints?</h3>
An Integrity Constraints is known to be the protocols that a table's data columns is mandated to follow.
Note that they are used to hinder the types of information that can be put into a table and as such, Integrity constraints are enforced by The database designer.
Learn more about Integrity constraints from
brainly.com/question/28026113
#SPJ1
Answer: Environment sensing Collector
Explanation:
An environmental monitoring system or collectors is the process which a device uses in monitoring the quality of the environment. These devices or software allows for a realtime monitoring and checking of any parameter required. They are used to monitor and collect data on environmental conditions such as relative humidity, temperature, dew and frost point, differential pressure, pressure, flow, and many more.