When a business wants to secure the design of certain objects in a database, a(n) ________ version of the database is provided to users
A) secure
B) encrypted
C) locked-down
D) decrypted
C
Computer Science & Information Technology
You might also like to view...
An SQL SELECT statement is used to retrieve reports from tables in a database
Indicate whether the statement is true or false
Computer Science & Information Technology
Briefly describe an algorithm for finding the largest key value in a binary search tree.
What will be an ideal response?
Computer Science & Information Technology