Question
1. What are three goals of safety in computing? For each goal, list two controls that be able to be implemented to help achieve that goal.
2. Cite a real-world database state in that the sensitivity of an aggregate is greater than that of its constituent values.
Then, cite a database situation in that the sensitivity of an aggregate is fewer than that of its constituent values.
3. Assume you have a high capacity network connection coming into your home, and you also have a wireless network access point. Also assume you do not use the full ability of your network link. List three reasons you might still want to stop an outsider obtaining free network contact by intruding into your wireless network.