1.

When the security context enables carefully written stored programs to be set up that provide controlled access to tables for users, it is called __________.

A. fare
B. bad
C. good
D. illegal
E. None of these
Answer» D. illegal


Discussion

No Comment Found