The method of access which uses key transformation is known as
Answer: B
No answer description available for this question.