When the security context enables carefully written stored programs to be set up that provide controlled access to tables for users, it is called __________
(a) bad
(b) good
(c) illegal
(d) fare
The question was asked in an interview for job.
This intriguing question originated from Putting PHP to Work topic in section MySQL Programs Using Perl DBI and PHP of MySQL