In the context of database security, user ______ management allows access to data on an as-needed basis.

Fill in the blank(s) with the appropriate word(s).

rights

Computer Science & Information Technology

You might also like to view...

Discuss whether it is possible to improve upon the ‘pull’ model of service discovery by multicasting (or broadcasting) and caching replies to queries.

What will be an ideal response?

Computer Science & Information Technology

Suppose that outFile is an ofstream variable and output is to be stored in the file outputData.out. Which of the following statements opens the file outputData.out and associates outFile to the output file?

A. outFile("outputData.out"); B. outFile.open("outputData.out"); C. open(outFile,"outputData.out"); D. open.outFile("outputData.out");

Computer Science & Information Technology