Most organizations store their data in a ________ in order to ensure their data are secure, accurate, and consistent

A) formatted workbook B) relational database
C) presentation file D) document

B

Computer Science & Information Technology

You might also like to view...

Which of the following extensions is associated with a video file?

A) .pptx B) .wmv C) .pdf D) .rtf

Computer Science & Information Technology

A security administrator needs to implement a technology that creates a secure key exchange. Neither party involved in the key exchange will have pre-existing knowledge of one another. Which of the following technologies would allow for this?

A. Blowfish B. NTLM C. Diffie-Hellman D. CHAP

Computer Science & Information Technology