Data ___________ language allows you to configure the logical security in the database.
Fill in the blank(s) with the appropriate word(s).
control
Computer Science & Information Technology
You might also like to view...
In a ____________ file, records are typically stored in order by a record-key field.
a) chronological b) non-sequential c) sequential d) record-key
Computer Science & Information Technology
In printing systems using ____, a disk accepts output from several users and acts as a temporary storage area for all output until the printer is ready to accept it.
A. phishing B. lagging C. spooling D. spoofing
Computer Science & Information Technology