Case AC 2-2Jennifer is creating a new inventory management table for the pet store where she works. She is spending the time upfront to make sure the data types are all assigned correctly.Jennifer wants to add a field with the answer to the question, "Is this an inventory item?"  The answer to the question would be "yes" or "no."  In this case, she should use the ____ data type.

A. Yes/No
B. True/False
C. On/Off
D. Inventory/Custom


Answer: A

Computer Science & Information Technology

You might also like to view...

?One method of printing a document is to print it directly from an app.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Answer the following statement(s) true (T) or false (F)

1. A hacker weapon called a splog (spam blog) is a fake blog created solely to raise the search engine rank of affiliated websites. 2. Information security is a high priority for protection of the company's information, and it is critical to implement an information security procedure to combat misuse of this information. 3. Smoking areas are targeted by hackers; they regularly use smoking entrances to gain building access, where they pose as employees to gain access to the company network. 4. Downtime refers to a period of time when a system is unavailable, and unplanned downtime can strike at any time for various reasons. 5. Legitimate users who purposely or accidentally misuse their access to the environment and cause some kind of business-affecting incident are called insiders.

Computer Science & Information Technology

Which organization is responsible for maintaining the Request for Comments (RFC) documents that define Internet protocol standards?

a. DOD b. IANA c. InterNIC d. IETF

Computer Science & Information Technology

Jeff, an end user, has plugged in both ends of the same network cable to two adjacent jacks. Both ports are connected to the same switch in the IDF. Which of the following will MOST likely happen?

A. VLAN malfunction B. Broadcast storm C. Quality of Service loss D. Duplicate IP addresses

Computer Science & Information Technology