A ________database has data divided into several tables that can be related to each other by a common field

A) hierarchical B) relational C) common D) multiple-table

B

Computer Science & Information Technology

You might also like to view...

Which Cisco IOS extended ACL port number keyword would be used to not match a specific port number?

A) not B) qe C) neq D) !=

Computer Science & Information Technology

Which of the following is a serverless security risk due to the poor design of identity and access controls, paving the way for attackers to identify missing resources, such as open APIs and public cloud storage, and leading to system business logic breakage and execution flow disruption?

A. Injection B. Broken authentication C. Sensitive data exposure D. XML external entities (XXE)

Computer Science & Information Technology