A database _____________is organized into rows and columns.
a. grid
b. matrix
c. table
d. spreadsheet
c. table
Computer Science & Information Technology
You might also like to view...
Which of the following should be mitigated by employing proper coding techniques when developing software?
A. Distributed denial of service attacks B. Buffer overflows C. War driving D. Packet sniffing
Computer Science & Information Technology
Authentication is the relationship between machines that are authorized to connect to one another
a. true b. false
Computer Science & Information Technology