Data that describes other data is called ________

Fill in the blank(s) with correct word


metadata

Computer Science & Information Technology

You might also like to view...

The GeometricObject and Circle classes are defined in this chapter. Analyze the following code. Which statements are correct?

``` public class Test { public static void main(String[] args) { GeometricObject x = new Circle(3); GeometricObject y = (Circle)(x.clone()); System.out.println(x); System.out.println(y); } }``` a. The program has a compile error because the clone() method is protected in the Object class. b. After you override the clone() method and make it public in the Circle class, the problem can compile and run just fine, but y is null if Circle does not implement the Cloneable interface. c. To enable a Circle object to be cloned, the Circle class has to override the clone() method and implement the java.lang.Cloneable interface. d. If GeometricObject implements Cloneable and Circle overrides the clone() method, the clone() method will work fine to clone Circle objects.

Computer Science & Information Technology

What is a downlevel user logon name used for?

A. Logging into older Windows OSs or using older Windows applications B. Assigning access to lower security shared folders C. Logging into servers further down in the domain structure D. Logging into servers that are marked as "Down" in Server Manager

Computer Science & Information Technology

Before beginning the updates for a transaction, commit any previous updates by executing the ____________________ command.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Application software that is intended for use in a specialized business environment is called ____.

A. enterprise applications B. industry-specific applications C. customized applications D. MIS applications

Computer Science & Information Technology