A(n) _____ is an alternative name for a data element in a repository.
A. alias
B. scriptÂ
C. module
D. kernel
Answer: A
Computer Science & Information Technology
You might also like to view...
What is the advantage of chaining in a hash table?
a. No load limit b. The hash table can be smaller c. The hash function is less complicated d. A key-value pair can be deleted
Computer Science & Information Technology
List and briefly describe the six functional characteristic categories that can be used to categorize access controls.
What will be an ideal response?
Computer Science & Information Technology
When an outline level is ________, all subordinate headings and body text are hidden
A) bold B) grayed out C) collapsed D) expanded
Computer Science & Information Technology
Prompts you for input and then uses your answers to generate a customized report.
What will be an ideal response?
Computer Science & Information Technology