Specific information in a database can be located by using the ________ tool

A) Search B) Locate C) Find D) Browse

C

Computer Science & Information Technology

You might also like to view...

A ___________ is any process, or a device incorporating such a process, that is designed to detect, prevent, or recover from a security attack. Examples are encryption algorithms, digital signatures and authentication protocols.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

An _________ is a small green triangle that appears in the upper-left corner of a cell with a possible error. A. error marker B. error indicator C. error detector D. error signature

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology