Q. In a database where the encryption is applied the data is cannot be handled by the unauthorised user without (Solved)
1. encryption key
2. decryption key
3. primary key
4. authorised key
- b. decryption key
1. encryption key
2. decryption key
3. primary key
4. authorised key