____ file formats can only be edited in the program in which they were created.

a. Proprietary
b. Native
c. Lossy
d. Lossless


A. Proprietary

Computer Science & Information Technology

You might also like to view...

Access saves each record as you enter it.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

A records keeper for a local hospital is approached by law enforcement officials. One of them informs him that they are searching for a suspect in a homicide and that they have reason to believe that person was recently examined by that institution. They are asking for specific information regarding distinguishing characteristics, such as scars or birthmarks. They also want to know the person's date of birth. Which of the following actions are appropriate?

a. Tell them to go away until they have a court-issued warrant or subpoena. b. Provide this information without the need for a warrant. c. This information may be provided as long as the scar or birthmark being described is one that is generally visible when the suspect is seen in public. d. Only publically available information, such as a person's date of birth, can be released. e. The date of birth cannot be released without legal authorization.

Computer Science & Information Technology

In a(n) ____________________ selection, action is required for only one outcome of a question.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The Performance Analyzer tool has become so sophisticated that it will catch performance issues in the database

Indicate whether the statement is true or false

Computer Science & Information Technology