When you ____ records, you store a list of key fields paired with the storage address for the corresponding data record.

A. store
B. tab
C. reference
D. index


Answer: D

Computer Science & Information Technology

You might also like to view...

A game or screen saver that appears desirable or useful but when it runs does something malicious is called a(n) ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following factors is most important in determining the type of tool to be used in a computer forensics investigation?

a. type of crime encountered b. type of information c. type of concealment d. type of suspect device

Computer Science & Information Technology

An intrusion detection system replaces a firewall on your network.

a. true b. false

Computer Science & Information Technology

LTE networks feature speeds of up to __________ download.

A. 50 B. 75 Mbps C. 150 D. 300 Mbps

Computer Science & Information Technology