The key value itself does not have to be entered explicitly; it can also be inserted as a(n) _____ to a node in the source document.

A. ?pointer
B. ?reference
C. ?extension
D. ?ancestor


Answer: B

Computer Science & Information Technology

You might also like to view...

A hospital proposes to introduce a policy that any member of clinical staff (doctors or nurses) who takes or authorises actions that leads to a patient being injured will be subject to criminal charges. Explain why this is a bad idea, which is unlikely to improve patient safety and why it is likely to adversely effect the resilience of the organization.

What will be an ideal response?

Computer Science & Information Technology

Which of the following lists follows Excel's order of operations?

A) Parentheses Exponentiation Addition and subtraction Multiplication and division B) Parentheses Exponentiation Multiplication and division Addition and subtraction C) Exponentiation Parentheses Multiplication and division Addition and subtraction D) Exponentiation Parentheses Addition and subtraction Multiplication and division

Computer Science & Information Technology

Instant messaging uses ____ technology, which lets one computing device identify the status of another.

A. asynchronous B. threaded C. routed D. presence

Computer Science & Information Technology

When each module performs one well-defined task, we say that it is ___.

a. loosely coupled b. highly coupled c. cohesive d. not easily reused

Computer Science & Information Technology