Shоrt Answer Prоmpt The 'Cоmpаrаtive Method' lesson pаge discusses three key approaches in comparative security analysis. Write a focused response that addresses the following: Part 1: Identify the Three Approaches Name the three methodological approaches presented in the Comparative Method lesson page. Part 2: Explain Each Approach Briefly explain what each approach involves. Part 3: Apply Each Approach For each approach, provide one example of how it could be applied to analyze security challenges. Writing Guidelines Be concise and direct - "all killer, no filler" Focus on methodological approaches (how we compare), not theoretical frameworks (what security means) Clearly distinguish between the three approaches Examples can be simple but should demonstrate you understand when to use each approach This question is worth 30 points (15% of the midterm grade). Quality matters more than length, so demonstrate understanding through precision, not padding. - This is not the question to go on tangents.
Relаtiоnаl Dаtabase Cоnversiоn Question A mid-sized retailer currently stores data in separate flat files (Excel/CSV): Employees.csv (EmployeeID, Name, Title, PayRate, SSN, HomeAddress) Customers.csv (CustID, Name, CreditLimit, PaymentTerms, Status) Sales.csv (SaleID, CustID, EmployeeID, Date, Amount) Management plans to convert to a relational database system. HR wants to ensure sensitive employee data (SSN, PayRate, HomeAddress) are protected.Accounting wants to ensure that salespeople cannot modify customer credit limits or payment terms. Which of the following BEST describes a key benefit of converting to a relational database in this scenario?