Related records are kept in a _________.

A. data file
B. data chain
C. record file
D. file sheet


Answer: A

Computer Science & Information Technology

You might also like to view...

Discuss file associations, with regard to operating systems and browsers, and include what happens when there is no file association for a specific file.

What will be an ideal response?

Computer Science & Information Technology

What is another term used for a security weakness?

A. threat B. vulnerability C. risk D. opportunity

Computer Science & Information Technology

You use the pinch/split interaction when you want to scroll through a page.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Let's say you have artwork that contains many symbol instances of many different symbols. What would be the easiest way to select all the instances of a single symbol?

What will be an ideal response?

Computer Science & Information Technology