The protection of database against compromise is known as...
The protection of database against compromise is known as
Data passwording
Data protection
Database encoding
Database security
Correct answer is D
No explanation has been provided for this answer.
What type of relationship exists between Tables I and II? ...
The process of sending and receiving information from one place to another is called information ...
Which of the following software replicates itself without being executed by the user? ...
The gap between ownership, access, and benefits from computer and it's application is termed dig...
One safety measure to consider in a computer room is ...
The use of Visual Display Unit was a major breakthrough in the ...
Safety measures to be observed when using the computer include all of the following except ...
One characteristics of a dirty mouse is that the mouse ...
To access a website, the URL of the website is typed into the part labelled ...
A Microsoft Office application suites include all the following except ...