Arranging data alphabetically in a table is referred to as ________

Fill in the blank(s) with correct word

sorting

Computer Science & Information Technology

You might also like to view...

Which command would be used to view two parts of a document at the same time?

A. Arrange all B. New window C. Split panes D. View side by side

Computer Science & Information Technology

The ____ attack enables one host to claim that it has the IP address of another. It is most effective where trusted relationships exist between machines networked using TCP/IP.

A. denial of service B. TCP SYN flood C. IP spoofing D. IP session hijacking

Computer Science & Information Technology