If a database does not contain a primary key, records are sorted by the ________

A) name field

B) secondary key

C) order they were entered into the database

D) record number


C

Computer Science & Information Technology

You might also like to view...

A Turing machine can produce output on the same tape upon which the input exists.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In IPsec, key management is accomplished through a protocol known as ____.

A. Encapsulating Security Payload (ESP) B. ISAKMP/Oakley C. Authentication Header (AH) D. L2TP

Computer Science & Information Technology

Methods in a class are static instance methods by default.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A _____ is an optional software application that adds functionality to your browser.

A. cache B. plug-in C. portal D. page tool

Computer Science & Information Technology