The first sort level is sometimes referred to as the ________

A) true sort B) best sort C) major sort D) first sort


C

Computer Science & Information Technology

You might also like to view...

The data security manage function is geared around ____ creation and enforcement.

A. procedure B. policy C. standard D. resource

Computer Science & Information Technology

In a database, tables, queries, forms, and reports are referred to as ________

A) relationships B) keys C) properties D) objects

Computer Science & Information Technology

Some ____ available in the Research Tools toolbox include a dictionary and, if you are connected to the Web, a Web search tool.

A. dialogs B. pathways C. indices D. services

Computer Science & Information Technology

Each column in an Access table is called a(n) ________

A) piece B) record C) field D) section

Computer Science & Information Technology