Which security technique limits access by unauthorized users to parts of an enterprise database?
Consider the following table as well as the Dept1_Parts and Dept2_Parts relations shown in the exhibit: Which of the following relational algebraic expressions would result in the given table?