This file type uses commas to separate data into columns

A) pdf B) csv C) tab-delimited D) jpeg

B

Computer Science & Information Technology

You might also like to view...

A normal distribution is displayed as a bell curve on a chart

Indicate whether the statement is true or false

Computer Science & Information Technology

Unauthorized macro code is called a:

A) warning code. B) malicious code. C) virus code. D) macro virus.

Computer Science & Information Technology