The code that relational database management systems use to perform their database task is referred to as .....
Chip is a common nickname for a (n):
The purpose of the primary key in a database is to:
A _________ contains specific rules and words that express the logical steps of an algorithm.
The design of the network is called the network:
The most frequently used instructions of a computer program are likely to be fetched from:
The ____________ contains data descriptions and defines the name, data type, and length of each field in the database
Personal logs or journal entries posted on the Web are known as:
A(n) _______ uses pictures (called icons) and menus displayed on the screen to send commands to the computer system.
The _____ manual tells you how to use a software program.
Which of the following is NOT a type of broadband Internet connection?
Software, such as viruses, worms and Trojan horses, that has a malicious intent, is known as:
Making a field ______ meAns : that it cannot be left blank.
_________ is the process of finding errors in software code.
____________ are viruses that are triggered by the passage of time or on a certain date.