In which of the following situations does file-based authentication become inconvenient.
i) small list
ii) large number of user
iii) users are being regularly added
iv) static authentication
a) i) and iv)
b) i) and iii)
c) ii) and iii)
d) ii) and iv)
Answer: c
Explanation: Such requirements are better satisfied by implementing a database based solution.
Related Posts
People overcome natural language problems by _____________
The integrated circuit was invented by Jack Kilby of _____________
Research scientists all over the world are taking steps towards building computers with circuits patterned after the complex interconnections existing among the human brain’s nerve cells. What name is given to such type of computers?
Which type of actuator generates a good deal of power but tends to be messy?
In LISP, the function evaluates both and is _____________
Which of the following have people traditionally done better than computers?
A bidirectional feedback loop links computer modeling with _____________
Join The Discussion