Protection schema -
Protection schema
Views: 0
Votes: 0 (Avg 0.0)
An outline detailing the type of access users may have to a database or application system, given a user’s needtoknow; for example,, read, write, modify, delete, create, execute, and append.
Average rating:
0.0
(0 reviews)
Sign in to manage your flashcard decks and leave a comment.
Discussion (0)
No comments yet. Be the first to share your experience with this term.