When mathematicians use a two-dimensional array, they often call it a ____ or a table.

A. vector
B. matrix
C. square
D. grid


Answer: B

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. Network access control authenticates users logging into the network and determines what data they can access and actions they can perform. 2. Access requestors are also referred to as clients. 3. A network access server does not include its own authentication services. 4. VLANs are common NAC enforcement methods. 5. The Extensible Authentication Protocol supports multiple authentication methods.

Computer Science & Information Technology

If you want the navigation options to blend into the site design, you need to add a(n) ____ to the list and then write style rules for the items that appear in that list.

A. attribute B. div C. id D. tag

Computer Science & Information Technology

What does halftone printing mean? What are halftone dots?

What will be an ideal response?

Computer Science & Information Technology

Which component may be considered a field replaceable unit or FRU? 

A. LCD screen B. Power supply C. Hard drive D. Motherboard E. All of these

Computer Science & Information Technology