The protection of database against compromise is known as...
The protection of database against compromise is known as
Data passwording
Data protection
Database encoding
Database security
Correct answer is D
No explanation has been provided for this answer.
Which of the following software replicates itself without being executed by the user? ...
In Microsoft PowerPoint, the command: ctrl + m is used to create ...
Planning and creating websites are stages in ...
The advantages of electronic data processing includes the following except ...
The following are advantages of networking except ...
New messages received are save in the part labelled ...
When performing computer recovery operations after a system crash, the startup disk is used to ...
To show the whole presentation in Microsoft PowerPoint 2007, select slide show from the ...