A(n) ____________________ is an application program's or an individual user's picture of the database.

Fill in the blank(s) with the appropriate word(s).


view

Computer Science & Information Technology

You might also like to view...

A secure network without policies to control the people who operate it can be breached by the people who operate it no matter how sophisticated the technology is.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

What type of permission should you set to control access to files and folders by local and network users?

A. Sharing on FAT32 volumes only B. NTFS on NTFS volumes only C. NTFS on exFAT or NTFS volumes D. Sharing on NTFS or exFAT volumes

Computer Science & Information Technology

If a variable, num, contains the value 5, the value of the expression num-- is 4.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which command is used to make sure that the DHCP server starts when the system boots?

A. rcdhcpd start B. rcdhcpd restart C. insserv rcdhcpd D. chkconfig dhcpd on

Computer Science & Information Technology