Which of the following describes all of the categories of data pertaining to one person, place, thing, event, or idea within a table row?

A) record B) field C) query D) database


A

Computer Science & Information Technology

You might also like to view...

The enumeration FileAccess is used to ________.

a) control future users’ access to a file a) control future users’ access to a file b) control program access to a file c) control the amount of updating that can be done on a file at once d) FileAccess is a method, not an enumeration. c) control the amount of updating that can be done on a file at once d) FileAccess is a method, not an enumeration.

Computer Science & Information Technology

The two primary stack operations are

a. push and pull b. push and pop c. insert and delete d. append and delete e. None of these

Computer Science & Information Technology

Modify rolo from this chapter so that a person running the program can keep their phone book file in whatever directory they prefer. This can be done by requiring that the user have set a variable called PHONEBOOK to be the name of the phone book file. Check to make sure that it's a valid file and default to the phone book file being in their $HOME directory if the variable's not set.

Here is an example: $ PHONEBOOK=/users/steve/personal lu Gregory Gregory 973-747-0370 $ PHONEBOOK=/users/pat/phonebook lu Toritos El Toritos 973-945-2236 $ In the preceding example, we assume that the user steve has been granted read access to pat's phone book file. Solution

Computer Science & Information Technology

__________ methods enable a program to view a portion of a collection.

a. Focus-view. b. Range-view. c. Delimiter-view. d. Subset-view.

Computer Science & Information Technology