

MCQOPTIONS
Saved Bookmarks
1. |
When the security context enables carefully written stored programs to be set up that provide controlled access to tables for users, it is called __________ |
A. | bad |
B. | good |
C. | illegal |
D. | fare |
Answer» C. illegal | |