Midterm
1. (TCO A) What are the three goals of security in computing? For each goal, list two controls that can be implemented to help achieve that goal. 2. (TCO A) Cite a real-world database situation in which the sensitivity of an aggregate is greater than that of its constituent values. Then, cite a database situation in which […]