A(n) _____ is an alternative name for a data element in a repository.

A. alias
B. script 
C. module
D. kernel


Answer: A

Computer Science & Information Technology

You might also like to view...

What is the advantage of chaining in a hash table?

a. No load limit b. The hash table can be smaller c. The hash function is less complicated d. A key-value pair can be deleted

Computer Science & Information Technology

List and briefly describe the six functional characteristic categories that can be used to categorize access controls.

What will be an ideal response?

Computer Science & Information Technology

When an outline level is ________, all subordinate headings and body text are hidden

A) bold B) grayed out C) collapsed D) expanded

Computer Science & Information Technology

Prompts you for input and then uses your answers to generate a customized report.

What will be an ideal response?

Computer Science & Information Technology