A) Keep its logical structure hidden from users
B) Can access control
C) Keeps its physical structure hidden from users
D) Can not hide sensitive information from users
A) Keep its logical structure hidden from users
B) Can access control
C) Keeps its physical structure hidden from users
D) Can not hide sensitive information from users