What is a database?

a. flat files used to store data
b. a data file holding a single file
c. simply a collection of data"
d. a structured collection of related files and data


Answer: d. a structured collection of related files and data

Computer Science & Information Technology

You might also like to view...

The aim of a high-level model like the EBK is to provide a strategic ____ that specifies all of the commonly accepted activities and inter-relationships associated with good security.

A. toolkit B. plan C. roadmap D. framework

Computer Science & Information Technology

The (0,0) of a canvas is located at ___.

A. its top left corner B. its lower left corner C. its top right corner D. its lower right corner E. its center

Computer Science & Information Technology

The ________ rule states that secondary evidence, or a copy, is inadmissible in court when the original exists. When photographing hardware evidence, each item should be photographed as a whole, and then the _________ should be photographed

a. Best evidence b. Exclusionary c. Hearsay d. Discovery

Computer Science & Information Technology

Cyberbullying is essentially the same thing as cyberstalking, but the parties involved in cyber bullying are children or adolescents.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology