Question 77
Which of the following is effective as a method to prevent illegal use of a database?
a) Setting access rights
b) Controlling consistency maintenance
c) Encapsulating data
d) Use of duplex files
Which of the following is effective as a method to prevent illegal use of a database?
a) Setting access rights
b) Controlling consistency maintenance
c) Encapsulating data
d) Use of duplex files
Posted by
vitec
at
10:08 PM
Labels: SW-2002-AM
No comments:
Post a Comment