Most organizations store their data in a ________ in order to ensure their data are secure, accurate, and consistent
A) formatted workbook B) relational database
C) presentation file D) document
B
Computer Science & Information Technology
You might also like to view...
Which of the following extensions is associated with a video file?
A) .pptx B) .wmv C) .pdf D) .rtf
Computer Science & Information Technology
A security administrator needs to implement a technology that creates a secure key exchange. Neither party involved in the key exchange will have pre-existing knowledge of one another. Which of the following technologies would allow for this?
A. Blowfish B. NTLM C. Diffie-Hellman D. CHAP
Computer Science & Information Technology