List the names and addresses of all employees who are managers.
What will be an ideal response?
RA: ? fName, lName,address (Employee ? position=‘manager’ (Employee))
TRC: {E.fName, E.lName, E.address | Employee(E) ????E.position = ‘Manager’)}
DRC: {fName, lName, address | Employee(empNo, fName, lName, address, DOB,
sex, position, deptNo) ? (position=’manager’)}
You might also like to view...
Case-Based Critical Thinking QuestionsCase 2Brendan has inherited a form from the person who held his job previously. His manager would like him to make some substantial changes to it in order to make it more user-friendly for the records team. Brendan, however, is not an expert in form properties, so after he opens up the property sheet, he asks you for some advice. Brendan’s boss asks him to create an entirely new form once he is done with his current project. Brendan tells her that her request is not possible. What would be one valid reason for his response?
A. She wants to use a table as the source of the data for the form. B. She wants to use an SQL statement as the source of the data for the form. C. She wants to use a query as the source of the data for the form. D. She wants to use a report as the source of the data for the form.
Which of the following icons is a Play Animations icon?
A.
B.
C.
D.
Screen-door effect refers to the perception that the ____ in an image are surrounded by a thin black border, giving the impression that you are looking through a fine mesh screen.
A. dots B. pixels C. lumens D. squares
Your company has invested an increasing amount in security due to the changing threat landscape. The company is trying to reduce costs, and the CFO has queried the security budget. At the same time, you as the security practitioner are actively requesting additional funding to support new initiatives. These initiatives will mitigate several security incidents that have occurred due to ineffective
controls. You assess the current controls framework and provide recommendations on whether preventative, detective, or corrective controls should be implemented. How should you explain which controls to implement? A. While corrective controls are more costly to implement, they are only needed for real attacks on high value assets. Put controls in place after a real attack has occurred. B. Detective controls are less costly to implement than preventative controls and should be encouraged wherever possible; corrective controls are used during an event or security incident; and preventative controls are hard to achieve in practice with current market offerings. C. Use preventative controls as this will prevent security incidents from occurring in the first place. Detective and corrective controls are redundant compensating controls and are not required if preventative controls are implemented. D. Use preventative controls before an event occurs; use detective controls during an event; and use corrective controls after an event has occurred. Use a combination of controls.