____ relates to how much one module in a program must rely on another.

A. Coupling
B. Cohesion
C. Orthogonality
D. Reusability


Answer: A

Computer Science & Information Technology

You might also like to view...

Explain why the RPC interface to early implementations of NFS is potentially insecure. The security loophole has been closed in NFS 3 by the use of encryption. How is the encryption key kept secret? Is the security of the key adequate?

What will be an ideal response?

Computer Science & Information Technology

Proxy servers perform operations on ____-level data.

A. application B. header C. data link D. transport

Computer Science & Information Technology

Which of the following is NOT one of the basic rules that must be followed when developing a policy?

A. policy should never conflict with law B. policy must be able to stand up in court if challenged C. policy should be focused on protecting the organization from public embarrassment D. policy must be properly supported and administered

Computer Science & Information Technology

A program with a benign capability that conceals another, sinister purpose is called a

a. hack. b. rogue. c. Trojan horse. d. virus. e. worm.

Computer Science & Information Technology