1.

In a database where the encryption is applied the data is cannot be handled by the unauthorised user without

A. Encryption key
B. Decryption key
C. Primary key
D. Authorised key
Answer» C. Primary key


Discussion

No Comment Found