1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hodyreva [135]
3 years ago
6

The security option in MySQL, that when enabled, limits where a file can be loaded from when using the LOAD DATA INFILE command

is called:
(a) secure_file_location
(b) secure_file_priv
(c) safe_file_load
(d) safe_file_location
Computers and Technology
1 answer:
swat323 years ago
6 0

Answer:b) secure_file_priv

Explanation: MYSQL database is the SQL data collection where the command LOAD DATA INFILE is used for the transporting the data-file from the local server to the MYSQL server. This command helps the reading the file's data or text of the client server at rapid speed

The secure_file_priv is the option that is raised from the LOAD DATA INFILE for the limited loading of files from the directories and also makes it secure. Other options are incorrect because they are used for the location and loading.Thus the correct option is option(b).

You might be interested in
Could someone tell me what this means in python? Thanks
alexandr1967 [171]

a python is a snake not a launguage

3 0
3 years ago
A cyberbully is someone who invades another person’s privacy by
e-lub [12.9K]
Insulting or harassing them over the Internet
8 0
4 years ago
Read 2 more answers
What are the differences between message confidentiality and message integrity? Can you have confidentiality without integrity?
Artist 52 [7]

Answer:

message confidentiality

Two or more hosts communicate securely, typically using encryption. The communication cannot be monitored (sniffed) by non trusted hosts. The communication between trusted parties is confidential.

message integrity

The message transported has not been tampered with or altered. A message has integrity when the payload sent is the same as the payload received.

Sending a message confidentially does not guarantee data integrity. Even when two nodes have authenticated each other, the integrity of a message could be compromised during the transmission of a message.

Yes, you can have integrity of a message without confidentiality. One can take a hash or sum of the message on both sides to compare. Often we share downloadable files and provide data integrity using md5 hash sums.

Explanation:

3 0
3 years ago
Mario wants to make his document accessible to technology users. He first needs to access the Accessibility Checker. He can do t
Vlada [557]

Answer: see guidelines in explanation

Explanation:

For Mario to make his document accessible to technology assistants, he needs to do the following;

-Access the accessibility checker by clicking the FileHomeReview tab

-Click the InfoNewOpen option

-Click the Check for IssuesManageDocumentProtect, the document icon

-Then, click Check accessibility option, the accessibility pane will open.

-He needs to read the information about errors, warning, tips and steps to take to make his document accessible to other users.

8 0
4 years ago
If you want to design computing components for cars and medical
Marysya12 [62]

Computer engineering is the course you have to study if you want to design computing components for cars and medical equipment.

<h3>What Is Computer Engineering?</h3>

Computer Engineering is known to be one filed that is made up of the fields of electrical engineering and also that of computer science to form new kind of system hardware or software.

Based on the above, Computer engineering is the course you have to study if you want to design computing components for cars and medical equipment.

Learn more about Computer engineering from

brainly.com/question/24181398

#SPJ1

4 0
3 years ago
Other questions:
  • Write a script that will generate random integers in the range from
    10·1 answer
  • Choose the list of the best uses for word processing software.
    5·1 answer
  • ____ presents a comprehensive model for information security and is becoming the evaluation standard for the security of informa
    5·1 answer
  • Jess and Ann have decided to exchange messages using the Caesar cipher. If the predetermined key is seven places to the left, th
    10·1 answer
  • Once a table is inserted into a publication, which two tabs become available?
    5·1 answer
  • What is wrong with the following declaration? How should it be fixed?
    11·1 answer
  •  How does critically analyzing technology add value to interactions with people in personal and professional contexts?
    7·2 answers
  • Under which menu option of a word processing program does a callout appear?
    7·2 answers
  • Using this statement to answer the following question “FIFA World Cup 2010: (1+9) From Today!” (Ignore Quotation)
    9·1 answer
  • Question 3 of 25 In computer science, what is a developer? A. A person who organizes all the details of a project B. An individu
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!