Q:

In a database where the encryption is applied the data is cannot be handled by the unauthorised user without

0

In a database where the encryption is applied the data is cannot be handled by the unauthorised user without


  1. Encryption key
  2. Decryption key
  3. Primary key
  4. Authorised key

All Answers

need an explanation for this answer? contact us directly to get an explanation for this answer

 (b).Decryption key

need an explanation for this answer? contact us directly to get an explanation for this answer

total answers (1)

This question belongs to these collections

Similar questions


need a help?


find thousands of online teachers now