A database _____________is organized into rows and columns.

a. grid
b. matrix
c. table
d. spreadsheet

c. table

Computer Science & Information Technology

You might also like to view...

Which of the following should be mitigated by employing proper coding techniques when developing software?

A. Distributed denial of service attacks B. Buffer overflows C. War driving D. Packet sniffing

Computer Science & Information Technology

Authentication is the relationship between machines that are authorized to connect to one another

a. true b. false

Computer Science & Information Technology