When the security context enables carefully written stored programs to be set up that provide controlled access to tables for users, it is called __________
(a) good
(b) bad
(c) illegal
(d) fare
I have been asked this question during an interview.
Query is from Security for Stored Programs and Views in division Stored Programs of MySQL