A ____-dimensional array resembles a table in that the variables (elements) are in rows and columns.

A. one
B. two
C. three
D. four


Answer: B

Computer Science & Information Technology

You might also like to view...

According to the CoBIT model, what two types of audits are used to improve an organization's security level?

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Personal data in a presentation can be discovered using:

A) Document Properties. B) the Document Inspector. C) the Accessibility Checker. D) Mark as Final.

Computer Science & Information Technology

Email bombing, as a form of DoS, is characterized by abuser sending identical message repeatedly to a particular address

a. true b. false

Computer Science & Information Technology

___________________ is the only language that computers understand.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology