1. Hard-coding a login pair directly into the script
  2. File-based authentication
  3. Data-based authentication
  4. PEAR’S HTTP authentication
4 views

1 Answers

Answer: Option 3

It not only enhances administrative convenience and scalability, but also can be integrated into a larger database infrastructure.

4 views

Related Questions