Each column in a database is called a(n):

A) table. B) record. C) field. D) index.

C

Computer Science & Information Technology

You might also like to view...

A NAC service has discovered a virus on a client laptop. In which of the following locations would the NAC service place the laptop?

A. On the DMZ network B. On the sandbox network C. On the honeypot D. On the quarantine network

Computer Science & Information Technology

_________ devices often pose special challenges to investigators because they can be configured to use advanced encryption and they can be wiped by the user even when the user is not present.

A. Portable B. Desktop computer C. Expansion D. Satellite transceiver

Computer Science & Information Technology