A table that exists in a different file created by an application such as Access or Excel

a. Connected table
b. Linked table
c. Related table


B

Computer Science & Information Technology

You might also like to view...

____ are the physical areas that the organization has chosen to certify as secure.

A. Secure perimeters B. Secure boundaries C. Secure spaces D. Secure zones

Computer Science & Information Technology

After a device is __________, the operating system knows it exists and knows how to communicate with it.

a. read from b. written to c. accessed d. opened

Computer Science & Information Technology

What does the command $servers="Server1", "Server2" do?

A. creates an array variable named $servers B. creates a profile named servers C. displays the name of Server1 and Server2 D. creates two VMs named Server1 and Server2

Computer Science & Information Technology

The mobile station consists of mobile equipment (handset) and, in the case of a ________ network, a Subscriber Identity Module (SIM)

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology