Answer:
Thought experiments are basically devices of the imagination. They are employed for various purposes such an entertainment, education, conceptual analysis, exploration, hypothesizing, theory selection, theory implementation, etc.
Employers should familiarize themselves with the training requirements that apply to their employees and their business; design and implement effective training programs; and use qualified trainers. In addition, employers should thoroughly document all training activities, and should retain records of employee attendance at all completed trainings. Training records should include the name of the trained employee, the date of training, the type of training and the training provider. It is a best practice for employers to keep documentation of all trainings provided to demonstrate compliance with all applicable laws and regulations.
This is called a key attribute!
There are different types of key attributes!
Primary key is the key that is actually chosen, for example a social security number.
There is also a unique key, say our finger prints! they also uniquely identify humans, but usually we prefer to use social security number when we list people (a unique key could be a primary key if we chose so)
We could also identify people by their social security number and a name, but this is unnecessary, as social security number already gives a full identification. Such a reduntant key is called super key.
I would not because you never know there could be hackers and they could get your card account and spend your money. If they get your card number and you do turn up with less money there is really nothing you can do about it at that point. That's why I wouldn't trust my money to an online bank.
Hope this helps.
Sincerely, Hodctilana