Problem:
Question 1: How is a composite key implemented in a relational database model?
Question 2: Discuss in your own words the importance of balancing security and business functionality. Determine why upper management buy-in for a security program is essential for the program success and compliance of end users.
Please do not provide cut and paste answers and please include a source.