Multiple Choice
What technique is used to identify the person who is attempting to access the DBMS?
A) encryption
B) authentication
C) synchronization
D) viewing
Correct Answer:

Verified
Correct Answer:
Verified
Related Questions
Q33: What do key integrity constraints consist of?<br>A)smart
Q34: Which of the following does a DBMS
Q35: If you want to constrain a Bonus
Q36: Which of the following is a database-as-a-service
Q37: Which of the following is not a
Q39: Which of the following is information that
Q40: Which of the following is an authentication
Q41: Which Access feature restricts a field to
Q42: Which of the following is information that
Q43: Explain how privacy and security are related