The computer software that allows people to interact with a database

A) Database object
B) Database
C) Database management system


C

Computer Science & Information Technology

You might also like to view...

The IT security professional develops policies and ____________________ that are used to identify and mitigate physical and environmental threats to information, information processing personnel, facilities, and equipment.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

In a mail merge, the ________ holds the text that remains constant

Fill in the blank(s) with correct word

Computer Science & Information Technology

When a method is called, the calling object's address is passed to it and stored in the method's ____ pointer.

A. this B. starting C. class D. code

Computer Science & Information Technology

What type of hypervisor would be loaded in a host OS in order to provide virtualization?

A) Type-1 B) Type-2 C) Type-3 D) Type-4

Computer Science & Information Technology