Putting data items in order is called ____.
A. swapping
B. batch processing
C. sorting
D. data hiding
Answer: C
You might also like to view...
The const_cast operator is needed when __________ data must be treated as ___________ data.
a. const, const b. Non-const, const c. const, non-const d. Non-const, non-const
Consider the modified deterministic scale-free network model as discussed in problem 18. Now, estimate the following:
(a) Scaling exponent of the deterministic scale-free model (b) Scaling nature of the leaf hub nodes
?You work for a company that is growing. Originally, all the users in all departments had access to all the data in the database. It is considered a security risk. What is an appropriate action to reduce the risk?
A. ?Install a two-step login procedure, where the user has to key in additional information for logging in B. Install and provide stronger anti-virus software on the users' computers C. Tweak the firewall parameters so that outgoing traffic can be better controlled D. Assign roles and privileges to users so that only job-relevant data is accessible to the user.
What happens when you click an item on the Office Clipboard?
A. The item is moved to the system Clipboard. B. A ScreenTip appears. C. The item is deleted from the Office Clipboard. D. The item is pasted in the document at the location of the insertion point.