MCQOPTIONS
Saved Bookmarks
| 1. |
When the security context enables carefully written stored programs to be set up that provide controlled access to tables for users, it is called __________ |
| A. | bad |
| B. | good |
| C. | illegal |
| D. | fare |
| Answer» C. illegal | |