The computer software that allows people to interact with a database
A) Database object
B) Database
C) Database management system
C
Computer Science & Information Technology
You might also like to view...
The IT security professional develops policies and ____________________ that are used to identify and mitigate physical and environmental threats to information, information processing personnel, facilities, and equipment.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
In a mail merge, the ________ holds the text that remains constant
Fill in the blank(s) with correct word
Computer Science & Information Technology
When a method is called, the calling object's address is passed to it and stored in the method's ____ pointer.
A. this B. starting C. class D. code
Computer Science & Information Technology
What type of hypervisor would be loaded in a host OS in order to provide virtualization?
A) Type-1 B) Type-2 C) Type-3 D) Type-4
Computer Science & Information Technology