Computers and Technology Problem Solver - Get Instant Explanations
Maintain a Database Security (Inference Detection Algorithm)Consider a database containing personnel information, including names, addresses, and salaries of employees. Individually, the name, address, and salary information is available to a subordinate role, such as Clerk, but the association of names and salaries is restricted to a superior role, such as Administrator. 1. With this information, how could you construct your database and tables? Design your database and draw a database schema first. 2. Suppose that administrators wants to add a new attribute, employee start date, which is not sensitive. Where would it be? Consider not comprimising the relationship between employee and salary. Draw your new schema
Consider the following method, which implements a recursive binary search. /** Returns an index in arr where the value x appears if x appears* in arr between arr[left] and arr[right], inclusive;* otherwise returns -1. * Precondition: arr is sorted in ascending order. * left >= 0, right < arr. Length, arr. Length > 0*/public static int bSearch(int[] arr, int left, int right, int x){if (right >= left){int mid = (left + right) / 2;if (arr[mid] == x){return mid;}else if (arr[mid] > x){return bSearch(arr, left, mid - 1, x);}else{return bSearch(arr, mid + 1, right, x);}}return -1;}The following code segment appears in a method in the same class as bSearch. int[] nums = {10, 20, 30, 40, 50};int result = bSearch(nums, 0, nums. Length - 1, 40);How many times will the bSearch method be called as a result of executing the code segment, including the initial call?11A22B33C44D55E