1.

When the security context enables carefully written stored programs to be set up that provide controlled access to tables for users, it is called __________

A. bad
B. good
C. illegal
D. fare
Answer» C. illegal


Discussion

No Comment Found