InterviewSolution
Saved Bookmarks
| 1. |
When the security context enables carefully written stored programs to be set up that provide controlled access to tables for users, it is called __________(a) bad(b) good(c) illegal(d) fareThe question was asked in an interview for job.This intriguing question originated from Putting PHP to Work topic in section MySQL Programs Using Perl DBI and PHP of MySQL |
|
Answer» Right choice is (b) good |
|