This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: Pointing devices (93) RFID (111) Speech recognition (97) Supercomputer (86) Computer Software Application software (124) COTS software (124) Custom software (124) Groupware (135) HTML (154) Machine language (150) Operating system (140) Presentation graphics software (134) Software suites (129) System software (140) Data Resource Management Data dependence (195) Data integration (195) Data integrity (195) Data mining (192) Data redundancy (195) Data warehouse (191) Database (174) Database administrator (DBA) (180) Database management approach (196) Database management systems (DBMS) (196) Field (170) File (173) Record (170) Relational model (176) Structured Query Language (198) From the Labs: Excel What is the strength of a spreadsheet? Worksheets vs. Workbook Functions and Formulas Relative and Absolute Cell Referencing The IF statement Access Database Table Record Field Primary Key Foreign Key...
View Full Document
This note was uploaded on 09/30/2010 for the course MIS 388 taught by Professor Kohers during the Spring '08 term at Sam Houston State University.
- Spring '08