When a business wants to secure the design of certain objects in a database, a(n) ________ version of the database is provided to users

A) secure
B) encrypted
C) locked-down
D) decrypted

C

Computer Science & Information Technology

You might also like to view...

An SQL SELECT statement is used to retrieve reports from tables in a database

Indicate whether the statement is true or false

Computer Science & Information Technology

Briefly describe an algorithm for finding the largest key value in a binary search tree.

What will be an ideal response?

Computer Science & Information Technology