subject

Match the description to the method below for protecting databases. Methods may match more than one description.
Method: Views
Records may be restricted
Permissions are set via internal access controls
Integration with system security is possible
Data is extracted from tables
Logging is a common implementation
Activity may be monitored and acted upon​

ansver
Answers: 2

Another question on Computers and Technology

question
Computers and Technology, 23.06.2019 15:00
Based on the current economic situation do you expect the employment demand for graduating engineers to increase or decrease? explain the basis for your answer. with a significant economic recovery, what do you think will happen to future enrollments in graduating engineering programs?
Answers: 1
question
Computers and Technology, 23.06.2019 18:30
List 3 items that were on kens resume that should have been excluded
Answers: 1
question
Computers and Technology, 25.06.2019 01:00
What phrase indicates someone has knowledge and understanding of computer,internet,mobile devices and related technologies?
Answers: 1
question
Computers and Technology, 25.06.2019 05:00
Brad wants to buy flowers for his friend with 33 dollars.the daisies are 1 dollar each and the roses are 2 dollars each he buy 3 more daisies than roses how much did the roses cost
Answers: 2
You know the right answer?
Match the description to the method below for protecting databases. Methods may match more than one...
Questions
question
Social Studies, 04.02.2021 20:30
Questions on the website: 13722360