Looking up values in a table is often referred to as

a) loading a table
b) sorting a table
c) searching a table
d) defining a table


c) searching a table

Computer Science & Information Technology

You might also like to view...

A(n) __________ allows a program to walk through the collection and remove elements from the collection.

a. Set. b. Queue. c. Iterator. d. List.

Computer Science & Information Technology

____ access behaves the same as private access, in that it permits access only to member or friend functions, but it allows any derived class to inherit this restriction.

A. Private B. Protected C. Public D. Package

Computer Science & Information Technology

With ____ tags, one set of tags is placed around another set of tags so that both sets apply to the text they surround.

A. nested B. nonbreaking C. ordered D. unordered

Computer Science & Information Technology

Program instructions and data must be placed in the computer's ____________________ to allow the computer to carry out the program instructions.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology