Data ___________ language allows you to configure the logical security in the database.

Fill in the blank(s) with the appropriate word(s).

control

Computer Science & Information Technology

You might also like to view...

In a ____________ file, records are typically stored in order by a record-key field.

a) chronological b) non-sequential c) sequential d) record-key

Computer Science & Information Technology

In printing systems using ____, a disk accepts output from several users and acts as a temporary storage area for all output until the printer is ready to accept it.

A. phishing B. lagging C. spooling D. spoofing

Computer Science & Information Technology