A data ____ table describes the fields you plan to maintain in a table.
A. structure
B. definition
C. map
D. linked
Answer: B
You might also like to view...
The ______ is a security technique associated with the use of credit cards at the time of purchase that checks additional digits printed on the back of the credit cards.
A. Address Verification System B. Advanced Authorization C. Payment Card Industry security standard D. Card Verification Number
Under Windows, each active program runs in its own __________.
a. partition b. region c. window d. task area
Which of the following is NOT a method to eliminate a border when combining cells in a table?
A) Erase the border. B) Select the cells and click Merge Cells. C) Select cells, right-click, and select Merge Cells. D) Highlight the border and press Delete.
The ____ lets you extend their functionality and integrate virus scanning into their set of abilities.
A. Border Gateway Protocol (BGP) B. Open Shortest Path First (OSPF) C. Open Platform for Security (OPSEC) D. Content Vectoring Protocol (CVP)