____ linked databases can only be accessed by the user who created the link itself.

A. Local
B. Secure
C. Policy
D. Private


Answer: D

Computer Science & Information Technology

You might also like to view...

Enumerated types have the __________ method which returns the position of an enum constant in the declaration list.

a. position b. location c. ordinal d. index

Computer Science & Information Technology

List four type of events you should monitor as part of a security event management program.

What will be an ideal response?

Computer Science & Information Technology

Researchers have known for decades that documents with visual elements are more effective than those that consist of only text.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Find the slope.

A. slope
B. slope
C. slope
D. slope
E. slope

Computer Science & Information Technology