Sometimes a group of related files is called a _______.

a) field
b) database
c) collection
d) byte


Answer: B

Computer Science & Information Technology

You might also like to view...

WPA and WPA2 can implement enterprise mode authentication, where the access point passes authentication information to a _____ for validation.

A. Remote Authentication Dial-In User Service B. Circumference C. Remote Access Server D. One ring to control them all

Computer Science & Information Technology

All Uniform Resource Locators consist of six parts.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The item indicated with the arrow in the accompanying figure is the XML Schema namespace _____.

A. URL B. URC C. URI D. URR

Computer Science & Information Technology

A binary tree is a tree in which no node can have more than two subtrees.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology