

MCQOPTIONS
Saved Bookmarks
1. |
When the security context enables carefully written stored programs to be set up that provide controlled access to tables for users, it is called __________. |
A. | fare |
B. | bad |
C. | good |
D. | illegal |
E. | None of these |
Answer» D. illegal | |