Color-coded hats, identification tags and any number of other methods may be used in order to differentiate each twin from the other.
为了方便区别,可以使用编码颜色不同的帽子、识别标签或其他不同方法。
2
The major Security methods in DBMS are as follows: identification, visiting control, trace of audit and copy of database, but as to the sensitive and important database, it needs to be coded.
The information includes an identification code and a portion of a codeword, the codeword contains a coded message with identification codes of all tags in the set.