Specific information in a database can be located by using the ________ tool
A) Search B) Locate C) Find D) Browse
C
Computer Science & Information Technology
You might also like to view...
A ___________ is any process, or a device incorporating such a process, that is designed to detect, prevent, or recover from a security attack. Examples are encryption algorithms, digital signatures and authentication protocols.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology
An _________ is a small green triangle that appears in the upper-left corner of a cell with a possible error. A. error marker B. error indicator C. error detector D. error signature
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology