The first sort level is sometimes referred to as the ________
A) true sort B) best sort C) major sort D) first sort
C
Computer Science & Information Technology
You might also like to view...
The data security manage function is geared around ____ creation and enforcement.
A. procedure B. policy C. standard D. resource
Computer Science & Information Technology
In a database, tables, queries, forms, and reports are referred to as ________
A) relationships B) keys C) properties D) objects
Computer Science & Information Technology
Some ____ available in the Research Tools toolbox include a dictionary and, if you are connected to the Web, a Web search tool.
A. dialogs B. pathways C. indices D. services
Computer Science & Information Technology
Each column in an Access table is called a(n) ________
A) piece B) record C) field D) section
Computer Science & Information Technology