In the process of updating a file
a. The file is kept in order of the primary key.
b. The file order is destroyed.
c. The file is kept in order of the secondary key.
d. The file is kept in order of a foreign key.
a. The file is kept in order of the primary key.
Computer Science & Information Technology
You might also like to view...
The Macintosh computer is manufactured by IBM
Indicate whether the statement is true or false
Computer Science & Information Technology
Trusted ____________________ is critical in the case of chain of custody, because any perceived deviation from the specified protocols for the process will generally lead to the evidence being rendered inadmissible in court.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology