Each column in a database is called a(n):
A) table. B) record. C) field. D) index.
C
Computer Science & Information Technology
You might also like to view...
A NAC service has discovered a virus on a client laptop. In which of the following locations would the NAC service place the laptop?
A. On the DMZ network B. On the sandbox network C. On the honeypot D. On the quarantine network
Computer Science & Information Technology
_________ devices often pose special challenges to investigators because they can be configured to use advanced encryption and they can be wiped by the user even when the user is not present.
A. Portable B. Desktop computer C. Expansion D. Satellite transceiver
Computer Science & Information Technology