In databases, a data category is called a ________

A) table B) worksheet C) record D) field

D

Computer Science & Information Technology

You might also like to view...

During which step of the attacker's methodology, in-depth information about the target, such as user accounts and open shares, is collected?

a. Reconnaissance b. Scanning and enumeration c. Gaining access d. Escalation of privilege

Computer Science & Information Technology

What type of drive is best used in a rugged terrain such as building the ice roads in Alaska?

A) SCSI B) eSATA C) SATA D) SSD

Computer Science & Information Technology