1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Yuri [45]
3 years ago
5

In a​ database, a​ table, which is a group of similar​ rows, is also called a​ ________.

Computers and Technology
1 answer:
AURORKA [14]3 years ago
3 0
It is called a File

A table or a file consists of rows and columns and can be referred to as a collection of data held in a structured format within a database. In both relational and flat file databases, a table can be referred to as a set of data values that use both rows and columns.



You might be interested in
If you Buy my group clothing in R.o.b.l.o.x for a donation i will make you brainliest
erastova [34]

Answer:kk ima do it

Explanation:

7 0
3 years ago
Read 2 more answers
Identify the true statements about the approach to privacy around the world. a. Uncertainty concerning the nature, extent, and v
Thepotemich [5.8K]

Answer:

a. Uncertainty concerning the nature, extent, and value of privacy is widespread.

d. Significant disagreement about privacy exists within the United States.

6 0
3 years ago
Business Rules constraints falls into two categories:
SSSSS [86.1K]

Business-rules constraints fall into two categories: field constraints within tables, and. relationship constraints between tables.

6 0
3 years ago
Jax needs to write a block of code that will organize a list of items alphabetically. Which function should he use? append() pri
rusak2 [61]

In python, the sort() function will alphabetically sort a list of strings

3 0
3 years ago
Refer to the exhibit. If a hacker on the outside network sends an IP packet with source address 172.30.1.50, destination address
Luden [163]

Answer:

The packet is dropped

Explanation:

To see why we need to understand the ACL or Access-control list that is a list of permissions that specify which users can access or modify certain things in a system. Because the source IP  doesn't have any parameter and is just a plain IP and packet the Cisco firewall will drop the packet based on the ACL rules, in other words, the Cisco firewall doesn't have any parameter that allows it to verify the permission-level of the sender, therefore, the packet will drop.  

7 0
3 years ago
Other questions:
  • Which javascript method should you use if you want to specify a message string to appear on your web page as it loads?
    13·1 answer
  • When you close a file, what happens to the undo history list for that file?
    5·1 answer
  • Which of the following is an example of indirect perception checking?
    7·2 answers
  • 1. Actuators apply mechanical force in the form of pressure to overcome
    10·1 answer
  • Which type of microphone uses two metal plates?
    7·1 answer
  • Could someone give an example or tell me what all of these mean? (For internet source citing)
    10·1 answer
  • (Game Design) Creating and manipulating data structures is one of the primary functions of a development environment.
    12·2 answers
  • Complete the function to return the factorial of the parameter,
    9·2 answers
  • Can some one please help
    9·1 answer
  • What are the four components of security documentation?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!