Watch this video on YouTube
Roger is working within a database. The data in the database is encrypted, but Roger doesn't notice the encryption. Which method of encryption is integrated within the actual database processes and, therefore, not noticeable by the user?