When you ____ records, you store a list of key fields paired with the storage address for the corresponding data record.
A. store
B. tab
C. reference
D. index
Answer: D
Computer Science & Information Technology
You might also like to view...
A game or screen saver that appears desirable or useful but when it runs does something malicious is called a(n) ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
Which of the following factors is most important in determining the type of tool to be used in a computer forensics investigation?
a. type of crime encountered b. type of information c. type of concealment d. type of suspect device
Computer Science & Information Technology
An intrusion detection system replaces a firewall on your network.
a. true b. false
Computer Science & Information Technology
LTE networks feature speeds of up to __________ download.
A. 50 B. 75 Mbps C. 150 D. 300 Mbps
Computer Science & Information Technology