The security context when a user creates a stored program that accesses sensitive data but forgets that other people who can invoke the object have the same access is . . . . . . . .
A. good
B. bad
C. illegal
D. fare
Answer: Option B
Related Questions on MySQL Miscellaneous
How is communication established with MySQL?
A. SQL
B. Network calls
C. A programming language like C++
D. APIs
Which type of database management system is MySQL?
A. Object-oriented
B. Hierarchical
C. Relational
D. Network
Join The Discussion