MCQOPTIONS
Saved Bookmarks
| 1. |
When the security context enables carefully written stored programs to be set up that provide controlled access to tables for users, it is called __________. |
| A. | fare |
| B. | bad |
| C. | good |
| D. | illegal |
| E. | None of these |
| Answer» D. illegal | |