Thursday, June 7, 2007

Question 77

Which of the following is effective as a method to prevent illegal use of a database?

a) Setting access rights
b) Controlling consistency maintenance
c) Encapsulating data
d) Use of duplex files

answer

No comments: