A correct option is option (a). The strongest normal form that R=AB is in is not known since we don't know the set of functional dependencies
What are functional dependencies?
An association between two attributes, often the PK and other non-key properties in a database, is known as a functional dependency (FD). If the value of attribute X (often the PK) impacts the value of attribute Y in a unique way for each valid instance of X, then attribute Y is functionally dependent on attribute X for any relation R.
How do you identify functional dependency?
- When two different values of B are related to the same A, this is known as a "functional dependency" A->B.
- A key must be distinct, therefore even if two tuples contain the same value for one or more attributes, the key values must differ.
Learn more about dependency: brainly.com/question/22276156
#SPJ4
An operating encrypts system a password for a given user, converting it into a representation that cannot be understood without the appropriate algorithm
3 encrypts
<u>Explanation:</u>
Normally end user login with user id account with password as login authorization or authentication to operate the system. There are some many technologies for login methods are used. Nowadays to login to operating system bio matric device is also been used.
In windows 10 pin also be used for login to operating systems. In Windows 10 operating system Hotmail accounts (clouds access also been used) so that related windows store or clipboard history are stores across the desktop and laptop.
Cracks: - some algorithm was used to crack password of login for operating system access.
Reverses- it a process or algorithm where reverse password or example: - 1234 where password in reverse process 4321.
Encrypts:- A password is encrypts with some calculation or string or some value. Cracking the password is used by using decrypts technology.
Decrypts is reverse logic applied based on encrypts technology.
Answer:
HIDPSs
Explanation:
The Host based Intrusion Detection and Prevention System abbreviated as HIDPS is a software system designed to monitor and protect the system against danger. The HIDPS system is able to carry out it's protective function as it monitors log files of system and other key system files. This enables it to monitor activities on the local host computer. Therefore, once an intruder performs any action such as creation, modifying or deletion of a file, the HIDPS system notices it in the audit logs which are being monitored and recorded.