A data ____ table describes the fields you plan to maintain in a table.

A. structure
B. definition
C. map
D. linked


Answer: B

Computer Science & Information Technology

You might also like to view...

The ______ is a security technique associated with the use of credit cards at the time of purchase that checks additional digits printed on the back of the credit cards.  

A. Address Verification System B. Advanced Authorization C. Payment Card Industry security standard D. Card Verification Number

Computer Science & Information Technology

Under Windows, each active program runs in its own __________.

a. partition b. region c. window d. task area

Computer Science & Information Technology

Which of the following is NOT a method to eliminate a border when combining cells in a table?

A) Erase the border. B) Select the cells and click Merge Cells. C) Select cells, right-click, and select Merge Cells. D) Highlight the border and press Delete.

Computer Science & Information Technology

The ____ lets you extend their functionality and integrate virus scanning into their set of abilities.

A. Border Gateway Protocol (BGP) B. Open Shortest Path First (OSPF) C. Open Platform for Security (OPSEC) D. Content Vectoring Protocol (CVP)

Computer Science & Information Technology