This file type uses commas to separate data into columns
A) pdf B) csv C) tab-delimited D) jpeg
B
Computer Science & Information Technology
You might also like to view...
A normal distribution is displayed as a bell curve on a chart
Indicate whether the statement is true or false
Computer Science & Information Technology
Unauthorized macro code is called a:
A) warning code. B) malicious code. C) virus code. D) macro virus.
Computer Science & Information Technology