Related records are kept in a _________.
A. data file
B. data chain
C. record file
D. file sheet
Answer: A
Computer Science & Information Technology
You might also like to view...
Discuss file associations, with regard to operating systems and browsers, and include what happens when there is no file association for a specific file.
What will be an ideal response?
Computer Science & Information Technology
What is another term used for a security weakness?
A. threat B. vulnerability C. risk D. opportunity
Computer Science & Information Technology
You use the pinch/split interaction when you want to scroll through a page.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology
Let's say you have artwork that contains many symbol instances of many different symbols. What would be the easiest way to select all the instances of a single symbol?
What will be an ideal response?
Computer Science & Information Technology